Nothing Special   »   [go: up one dir, main page]

CN110324482A - A kind of information management-control method of the mobile phone based on face recognition - Google Patents

A kind of information management-control method of the mobile phone based on face recognition Download PDF

Info

Publication number
CN110324482A
CN110324482A CN201810277692.2A CN201810277692A CN110324482A CN 110324482 A CN110324482 A CN 110324482A CN 201810277692 A CN201810277692 A CN 201810277692A CN 110324482 A CN110324482 A CN 110324482A
Authority
CN
China
Prior art keywords
mobile phone
information
facial information
face recognition
facial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810277692.2A
Other languages
Chinese (zh)
Inventor
余坤鸿
林培川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shendun Network Security Information Center Co Ltd
Original Assignee
Shendun Network Security Information Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shendun Network Security Information Center Co Ltd filed Critical Shendun Network Security Information Center Co Ltd
Priority to CN201810277692.2A priority Critical patent/CN110324482A/en
Publication of CN110324482A publication Critical patent/CN110324482A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)

Abstract

A kind of information management-control method of the mobile phone based on face recognition, the information management-control method are suitable for the mobile phone with face recognition, include the following steps: to wake up mobile phone screen, face recognition function is opened and persistently opened in the use process of mobile phone;Certain interval of time carries out the detection of facial information to operator;The facial information that will test is compared with pre-stored facial information;If facial information mismatches, system carries out privacy information to block processing.The present invention judges whether to block privacy information, avoids the problem that leakage of private information caused by the mobile phone unlocking manner of traditional single authentication, improve the safety of mobile phone by real-time detection facial information.

Description

A kind of information management-control method of the mobile phone based on face recognition
Technical field
The present invention relates to mobile phone information safety fields, and in particular to a kind of message tube prosecutor of the mobile phone based on face recognition Method.
Background technique
With the continuous development of science and technology, the function of mobile phone gradually increases, and it is convenient to bring to people's life, more becomes people Can not or scarce electronic equipment, a large amount of privacy information is often stored in mobile phone, such as address list, short message, chat record, electronics Mail, payment information and photo etc..The safety of privacy information also gradually draws attention, and the function of locking is designed in mobile phone, To protect the privacy information safety of user.But the form of mobile phone unlocking mechanism or single authentication at this stage, mobile phone screen point An authentication is carried out when bright can unlock mobile phone, and the state of locking is entered when ceasing screen.Once using mobile phone mistake in user It is grabbed in journey by criminal, criminal only needs to touch screen and mobile phone screen is kept to be always on i.e. sustainable mobile phone unlock State, criminal can obtain user privacy information to sell or extort, and safety is low.
Summary of the invention
To solve the above-mentioned problems, this patent provides a kind of information management-control method of mobile phone based on face recognition, passes through Real-time detection facial information judges whether to block privacy information, avoids privacy caused by the mobile phone unlocking manner of traditional single authentication The problem of information leakage, improves the safety of mobile phone.
A kind of information management-control method of the mobile phone based on face recognition, the information management-control method are suitable for having face recognition Mobile phone, include the following steps:
Mobile phone screen is waken up, face recognition function is opened and persistently opened in the use process of mobile phone;
Certain interval of time carries out the detection of facial information to operator;
The facial information that will test is compared with pre-stored facial information;
If facial information mismatches, system carries out privacy information to block processing.
The present invention is based on the mobile phones with face recognition, and when mobile phone screen is lighted, face recognition function is opened and in hand Persistently opened in the use process of machine, to operator carry out real-time face information detection, and with prior typing mobile phone database In facial information be compared, if facial information matches, system do not start the mechanism that privacy information blocks, do not influence operator Normal use.When mobile phone is grabbed by criminal, have to last for touching screen to keep mobile phone screen to be always on, due to Mobile phone have full screen face recognition function, system can real-time detection facial information, can horse by being compared with database The non-owner of upper identification operator, system carry out privacy information to block processing, read privacy information in mobile phone can not Protect the safety of privacy information.The present invention judges whether to block privacy information, avoid traditional single by real-time detection facial information The problem of leakage of private information caused by the mobile phone unlocking manner of secondary verifying, improve the safety of mobile phone.
It further include guest mode in the present invention, guest mode includes the following steps:
Mobile phone screen is waken up, opens guest mode by preset touch gestures;
The facial information of the visitor of the first bit manipulation mobile phone is detected and stored;
Certain interval of time carries out the detection of facial information to operator;
The facial information that will test is compared with the facial information of visitor, if facial information mismatches, system is to privacy Information carries out blocking processing;
It exits guest mode to need to carry out breath screen to mobile phone, and removes the facial information of the visitor of storage.
When needing mobile phone giving other people in use, since mobile phone only records the facial information of mobile phone owner, therefore need to open Guest mode is opened, interim is visitor's typing of the first bit manipulation mobile phone and the facial information for storing visitor, in order to pass through mobile phone Real-time face identification verifying, guarantee normal operation.When visitor terminates using mobile phone need to only breath screen be carried out to mobile phone Operation, system remove the facial information of the visitor temporarily stored, and guest mode is closed.Visitor is grabbed in the process using mobile phone When, mobile phone only records the facial information of first visitor, record facial information can't be continued, when third party's operation display, System can identify the non-owner of operator or visitor at once, and system carries out privacy information to block processing in turn, protect hand The safety of privacy information in machine.
Heretofore described touch gestures are long-pressing screen or double-click screen.Enter visit by pre-set touch gestures Objective mode, settable opening ways are long-pressing screen, any position long-pressing regular hour while face of the operator in screen Infomation detection is double-clicked same by that can enter guest mode, or setting opening ways to double-click screen in screen any position When facial information detection by the way that guest mode can be entered.
It further include game mode in the present invention, game mode includes the following steps:
When opening game application, face recognition function is closed;
When exiting game application or switching other application interface, face recognition function is opened;
Certain interval of time carries out the detection of facial information to operator;
The facial information that will test is compared with the facial information in database;
If facial information mismatches, system carries out privacy information to block processing.
When running game in application, since the operation in game process is more acutely and rapid, real-time face identification is reduced Success rate, cause mobile phone picture to be blocked, influence the game experiencing of operator.Therefore running game is in application, face recognition function It can close, guarantee game experiencing.Screen is reopened when user exits game application, switching other application interface or breath screen When, face recognition function is opened, and guarantees the safety of the privacy information outside game application.
The interval time of the facial recognition scan is 30s.
Compared with prior art, this patent provide a kind of mobile phone unlocking method the utility model has the advantages that
In the present invention system can real-time detection facial information, by being compared with database, judge whether to privacy information into Row blocks processing, protects the safety of privacy information in mobile phone.Judge whether to block privacy information by real-time detection facial information, It avoids the problem that leakage of private information caused by the mobile phone unlocking manner of traditional single authentication, improves the safety of mobile phone.
Detailed description of the invention
Fig. 1 is the unlocking method flow chart of this patent embodiment;
Fig. 2 is the guest mode flow chart of this patent embodiment;
Fig. 3 is the game mode flow chart of this patent embodiment.
Specific embodiment
In the following with reference to the drawings and specific embodiments, specific implementation of the patent mode is further described.
Embodiment
As shown in Figure 1, a kind of information management-control method of the mobile phone based on face recognition, which is suitable for tool There is the mobile phone of face recognition, includes the following steps:
Mobile phone screen is waken up, face recognition function is opened and persistently opened in the use process of mobile phone;
Certain interval of time carries out the detection of facial information to operator;
The facial information that will test is compared with pre-stored facial information;
If facial information mismatches, system carries out privacy information to block processing.
The present embodiment is based on the mobile phone with face recognition, when mobile phone screen is lighted, face recognition function open and Persistently opened in the use process of mobile phone, to operator carry out real-time face information detection, and with prior typing data in mobile phone Facial information in library is compared, if facial information matches, system does not start the mechanism that privacy information blocks, do not influence to operate The normal use of person.When mobile phone is grabbed by criminal, have to last for touching screen to keep mobile phone screen to be always on, by In mobile phone have full screen face recognition function, system can real-time detection facial information, by being compared with database The identification non-owner of operator, system carry out privacy information to block processing at once, read privacy information in mobile phone can not Fetch protection the safety of privacy information.The present invention judges whether to block privacy information by real-time detection facial information, avoids tradition The problem of leakage of private information caused by the mobile phone unlocking manner of single authentication, improve the safety of mobile phone.
As shown in Fig. 2, further including guest mode in the present embodiment, guest mode includes the following steps:
Mobile phone screen is waken up, opens guest mode by preset touch gestures;
The facial information of the visitor of the first bit manipulation mobile phone is detected and stored;
Certain interval of time carries out the detection of facial information to operator;
The facial information that will test is compared with the facial information of visitor, if facial information mismatches, system is to privacy Information carries out blocking processing;
It exits guest mode to need to carry out breath screen to mobile phone, and removes the facial information of the visitor of storage.
When needing mobile phone giving other people in use, since mobile phone only records the facial information of mobile phone owner, therefore need to open Guest mode is opened, interim is visitor's typing of the first bit manipulation mobile phone and the facial information for storing visitor, in order to pass through mobile phone Real-time face identification verifying, guarantee normal operation.When visitor terminates using mobile phone need to only breath screen be carried out to mobile phone Operation, system remove the facial information of the visitor temporarily stored, and guest mode is closed.Visitor is grabbed in the process using mobile phone When, mobile phone only records the facial information of first visitor, record facial information can't be continued, when third party's operation display, System can identify the non-owner of operator or visitor at once, and system carries out privacy information to block processing in turn, protect hand The safety of privacy information in machine.
Heretofore described touch gestures are long-pressing screen or double-click screen.Enter visit by pre-set touch gestures Objective mode, settable opening ways are long-pressing screen, any position long-pressing regular hour while face of the operator in screen Infomation detection is double-clicked same by that can enter guest mode, or setting opening ways to double-click screen in screen any position When facial information detection by the way that guest mode can be entered.
As shown in figure 3, further including game mode in the present embodiment, game mode includes the following steps:
When opening game application, face recognition function is closed;
When exiting game application or switching other application interface, face recognition function is opened;
Certain interval of time carries out the detection of facial information to operator;
The facial information that will test is compared with the facial information in database;
If facial information mismatches, system carries out privacy information to block processing.
When running game in application, since the operation in game process is more acutely and rapid, real-time face identification is reduced Success rate, cause mobile phone picture to be blocked, influence the game experiencing of operator.Therefore running game is in application, face recognition function It can close, guarantee game experiencing.Screen is reopened when user exits game application, switching other application interface or breath screen When, face recognition function is opened, and guarantees the safety of the privacy information outside game application.
The interval time of the facial recognition scan is 30s.
It obviously, is not the restriction to this patent although this patent is disclosed with above-described embodiment.Any this field it is general Logical technical staff can make possible variation in the spirit and scope for not departing from this patent on the basis of the above description And modification.Therefore, the protection scope of this patent should be subject to the range that claims of this patent are defined.

Claims (5)

1. a kind of information management-control method of the mobile phone based on face recognition, which is characterized in that the information management-control method is suitable for tool There is the mobile phone of face recognition, includes the following steps:
Mobile phone screen is waken up, face recognition function is opened and persistently opened in the use process of mobile phone;
Certain interval of time carries out the detection of facial information to operator;
The facial information that will test is compared with pre-stored facial information;
If facial information mismatches, system carries out privacy information to block processing.
2. a kind of information management-control method of mobile phone based on face recognition according to claim 1, which is characterized in that also wrap Guest mode is included, guest mode includes the following steps:
Mobile phone screen is waken up, opens guest mode by preset touch gestures;
The facial information of the visitor of the first bit manipulation mobile phone is detected and stored;
Certain interval of time carries out the detection of facial information to operator;
The facial information that will test is compared with the facial information of visitor, if facial information mismatches, system is to privacy Information carries out blocking processing;
It exits guest mode to need to carry out breath screen to mobile phone, and removes the facial information of the visitor of storage.
3. a kind of information management-control method of mobile phone based on face recognition according to claim 1, which is characterized in that also wrap Game mode is included, game mode includes the following steps:
When opening game application, face recognition function is closed;
When exiting game application or switching other application interface, face recognition function is opened;
Certain interval of time carries out the detection of facial information to operator;
The facial information that will test is compared with the facial information in database;
If facial information mismatches, system carries out privacy information to block processing.
4. a kind of locking means of mobile phone according to any one of claims 1 to 3, which is characterized in that the face recognition The interval time of scanning is 30s.
5. a kind of information management-control method of mobile phone based on face recognition according to claim 2, which is characterized in that described Touch gestures are that long-pressing screen or double-click on touch screen.
CN201810277692.2A 2018-03-31 2018-03-31 A kind of information management-control method of the mobile phone based on face recognition Withdrawn CN110324482A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810277692.2A CN110324482A (en) 2018-03-31 2018-03-31 A kind of information management-control method of the mobile phone based on face recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810277692.2A CN110324482A (en) 2018-03-31 2018-03-31 A kind of information management-control method of the mobile phone based on face recognition

Publications (1)

Publication Number Publication Date
CN110324482A true CN110324482A (en) 2019-10-11

Family

ID=68111890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810277692.2A Withdrawn CN110324482A (en) 2018-03-31 2018-03-31 A kind of information management-control method of the mobile phone based on face recognition

Country Status (1)

Country Link
CN (1) CN110324482A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866236A (en) * 2019-11-20 2020-03-06 Oppo广东移动通信有限公司 Private picture display method, device, terminal and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577732A (en) * 2012-07-24 2014-02-12 联想(北京)有限公司 Information processing method and device and electronic device
CN104102868A (en) * 2014-07-31 2014-10-15 中山市品汇创新专利技术开发有限公司 Multi-modal USB key authentication method based on face recognition technology
CN104573440A (en) * 2014-12-18 2015-04-29 百度在线网络技术(北京)有限公司 Data viewing method and device
WO2016145624A1 (en) * 2015-03-18 2016-09-22 华为技术有限公司 Information processing method and mobile terminal
CN107358111A (en) * 2017-08-28 2017-11-17 维沃移动通信有限公司 A kind of method for secret protection and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103577732A (en) * 2012-07-24 2014-02-12 联想(北京)有限公司 Information processing method and device and electronic device
CN104102868A (en) * 2014-07-31 2014-10-15 中山市品汇创新专利技术开发有限公司 Multi-modal USB key authentication method based on face recognition technology
CN104573440A (en) * 2014-12-18 2015-04-29 百度在线网络技术(北京)有限公司 Data viewing method and device
WO2016145624A1 (en) * 2015-03-18 2016-09-22 华为技术有限公司 Information processing method and mobile terminal
CN107358111A (en) * 2017-08-28 2017-11-17 维沃移动通信有限公司 A kind of method for secret protection and mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866236A (en) * 2019-11-20 2020-03-06 Oppo广东移动通信有限公司 Private picture display method, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
CN106325562B (en) Apparatus, system, and method for registering and verifying handwritten signatures and archiving handwritten information
CN105378743B (en) It is authorized using biological characteristic validation to by the access right of content of edit
WO2017012302A1 (en) Message display method and apparatus
CN108171137B (en) Face recognition method and system
US20040139333A1 (en) Information storing apparatus
US20130318625A1 (en) Method for protecting data stored in device and device thereof
CN209460835U (en) A kind of access control system
CN107633169A (en) A kind of terminal unlock method, terminal and computer-readable recording medium
CN107767133A (en) Virtual card opens chucking method, apparatus and system, storage medium
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
JP6151519B2 (en) Security card management service system and security card management service method
CN109543390A (en) A kind of information security management method and system
CN105320859B (en) A kind of authority control method and device
CN106503628A (en) method and device for fingerprint matching
CN109960907A (en) A kind of method for identifying ID and equipment
CN105703909A (en) Authentication method and electronic equipment
CN110324482A (en) A kind of information management-control method of the mobile phone based on face recognition
CN108288316A (en) Access card mandate register method and device
JP2005122266A (en) System and method for card-usage transaction processing, and program for card-usage transaction processing
CN109101800A (en) A kind of information management-control method of mobile phone
CN103902866A (en) File protection system and method
CN108229125A (en) A kind of control method and electronic equipment
US11372961B2 (en) Method and device for assigning application usage permission
CN110321684A (en) A kind of information management-control method of the electronic equipment based on face recognition
CN107025398B (en) Method for controlling terminal equipment to switch working state and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20191011