CN111866267A - Privacy protection method, terminal and storage medium - Google Patents
Privacy protection method, terminal and storage medium Download PDFInfo
- Publication number
- CN111866267A CN111866267A CN202010536118.1A CN202010536118A CN111866267A CN 111866267 A CN111866267 A CN 111866267A CN 202010536118 A CN202010536118 A CN 202010536118A CN 111866267 A CN111866267 A CN 111866267A
- Authority
- CN
- China
- Prior art keywords
- face image
- user
- mobile phone
- screen
- privacy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephone Function (AREA)
Abstract
The application relates to the technical field of mobility and discloses a privacy protection method, a terminal and a storage medium. The method comprises the steps of obtaining at least one first face image and at least one second face image; judging as a first face image and/or a second face image according to the distance between the user and the terminal screen; if the first face image and/or the second face image meet preset conditions, outputting reminding information and/or hiding screen display content and/or adjusting screen display parameters. The method and the device can protect the information safety of the user when the user uses the mobile phone, provide more humanized operation and greatly improve the use experience of the user.
Description
Technical Field
The present application relates to the field of mobile technologies, and in particular, to a privacy protection method, a terminal, and a storage medium.
Background
With the rapid development of mobile communication technology, smart phones are also developing towards large screens. Various information of people is interacted through electronic equipment or mobile phone software, and the use occasion of the mobile phone can be any public place, so that the safety problem of the information is particularly important when the mobile phone is used. For example, when we are dealing with messages on a mobile phone, this time it is completely exposed to someone else's view, and if the peeping view comes from behind, we are completely imperceptible. Without knowing about this, the privacy may be lost greatly, especially when the privacy is revealed, especially when the privacy information is related to individuals, some confidential information of companies, and the like.
Some terminal applications scan the sight line through a front camera, once the sight line of a stranger is detected, the screen is automatically switched to a camera lens interface, and the screen is not switched to an operation interface again until the stranger shifts the sight line. This function, on the one hand, can abruptly interrupt the user interface, making it embarrassing for both the user and the eavesdropper. On the other hand, in a crowded public place, the terminal cannot be operated normally in case of emergency. Therefore, how to improve the privacy protection prompting effect in the prior art, which is convenient for public use and further improves the user experience is a technical problem to be solved urgently at present.
The foregoing description is provided for general background information and is not admitted to be prior art.
Disclosure of Invention
The application aims to provide a privacy protection method, a terminal and a storage medium, which can protect the information safety of a user when the user uses a mobile phone, and meanwhile, the method is more humanized in operation and more convenient to use in public places, so that the use experience of the user is greatly improved.
In order to solve the above problem, the present application provides a privacy protection method, including:
acquiring at least one first face image and at least one second face image;
Judging as a first face image and/or a second face image according to the distance between the user and the terminal screen;
if the first face image and/or the second face image meet preset conditions, outputting reminding information and/or hiding screen display content and/or adjusting screen display parameters.
Optionally, before the face image is obtained, the user starts a protection mode; the protection mode includes at least one of the following modes: a security mode or privacy mode, and/or a self-timer mode.
Optionally, before the acquiring the face image, the method further includes: and inputting the face image of the user, and setting the face image as a first preset face image.
Optionally, the preset condition is at least one of the following conditions: the first face image or the second face image is not matched with the first preset face image; and/or the first face image is matched with the first preset face image, but the second face image is not matched with the first preset face image.
Optionally, in the security mode or the peep-proof mode, if it is determined that the first face image does not satisfy the preset condition, the other face image information is continuously determined, and if the second face image satisfies the preset condition, a prompt message is output and/or screen display content is hidden and/or screen display parameters are adjusted.
Optionally, in the personal self-timer mode, if it is determined that the first face image does not satisfy the preset condition, no reminding information is output; or if the first face image is judged not to meet the preset condition, continuing to judge the information of other face images, and if the second face image meets the preset condition, outputting reminding information and/or adjusting screen display parameters.
Optionally, the reminding information includes at least one of the following: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound.
Optionally, the adjusting the screen display parameter includes at least one of: a dark screen color, a screen off, or a screen displaying a particular picture.
Optionally, if the first face image and/or the second face image do not satisfy the preset condition, closing the reminding information, displaying the screen content and/or restoring the screen display parameters.
Optionally, when the user receives the reminding information, the protection mode is not closed; and/or the user closes the protection mode or closes the reminding message, and then the protection mode is closed.
In order to solve the above problem, the present application further provides a privacy protecting apparatus, including:
The system comprises an acquisition unit, a processing unit and a display unit, wherein the acquisition unit is used for acquiring face images, and at least two face images are acquired;
the first judging unit is used for sequentially judging a first face image and a second face image according to the face distance when the user operates the terminal;
the second judging unit is used for judging whether the second face image meets the preset condition or not;
and the execution unit is used for outputting reminding information if the second face image meets the preset condition.
Optionally, the obtaining unit further includes: and the storage unit is used for storing the face image of the user as a first preset face image.
Optionally, the obtaining unit further includes: and the face image storage module is used for storing the face image of the second user as a second preset face image.
In order to solve the above problem, the present application further provides a terminal, including:
at least one processor; and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the privacy protecting method described above.
To solve the above problem, the present application also provides a computer-readable storage medium storing a computer program, including: the computer program, when executed by a processor, implements the privacy preserving method described above.
According to the privacy protection method, at least one first face image and at least one second face image are obtained; judging as a first face image and/or a second face image according to the distance between the user and the terminal screen; if the first face image and/or the second face image meet preset conditions, outputting reminding information and/or hiding screen display content and/or adjusting screen display parameters. The method and the device can protect the information safety of the user when the user uses the mobile phone, provide more humanized operation and greatly improve the use experience of the user.
Drawings
Fig. 1 is a flowchart of a privacy protecting method according to a first embodiment of the present application;
fig. 2 is a flowchart of a privacy protecting method according to a second embodiment of the present application;
fig. 3 is a flowchart of a privacy protecting method according to a third embodiment of the present application;
fig. 4 is a flowchart of a privacy protecting method according to a fourth embodiment of the present application;
FIG. 5 is a schematic diagram of a privacy preserving apparatus according to an embodiment of the present application;
fig. 6 is a schematic diagram of a terminal according to an embodiment of the present application.
Detailed Description
The following describes in detail a specific embodiment of the privacy protecting method provided in the present application with reference to the drawings.
The first embodiment of the application relates to a privacy protection method which is applied to a mobile terminal. The core of this embodiment: and acquiring the face images, and judging whether to acquire a plurality of face images. If the face images are judged to be multiple, reminding information is output, screen display content is hidden, and/or screen display parameters are adjusted. Further, the reminding information comprises at least one of the following: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound.
The following describes implementation details of the privacy protection method of the present embodiment in detail, and the following is only provided for easy understanding and is not necessary for implementing the present embodiment.
Please refer to fig. 1, which is a flowchart illustrating a privacy protection method according to a first embodiment of the present application. The method comprises the following specific steps:
Specifically, when the user opens the mobile phone, the screen of the mobile phone is lighted, that is, the mobile phone is in a working state. For example, in a public place with more people, the user selects to turn on the protection mode switch, and the mobile phone responds to the turning on of the protection mode switch. The protection mode includes at least one of: a security mode, otherwise known as a peep-proof mode, a personal self-timer mode. In practice, all modes may also be included according to user requirements.
When the mobile phone raises the front camera, the mobile phone does not enter a camera shooting interface, and only the work of acquiring the face image is carried out. The mobile phone uploads the acquired face image to a mobile phone chip for processing, and the next step 102 of the process is entered.
And 102, judging whether a plurality of face images are acquired.
Specifically, the number of face images in the current scene is identified through physical devices in the mobile phone and the face detection function of the camera. And sequentially defining the first face image, the second face image, the third face image, the fourth face image and the Nth face image according to the distance between the face and the mobile phone screen when the user operates the mobile phone. Therefore, the first face image is the closest to the mobile phone screen by default, and so on. For example, the number of face images in the current scene is two face images. According to the distance between the two face images and the mobile phone screen, the first face image is acquiescent to be closest to the mobile phone screen and is defined as the first face image and the second face image in sequence through calculation of a sensor in the mobile phone.
If it is determined that only one face image is obtained, i.e. the user himself/herself, the next step 103 of the process need not be entered. If a plurality of face images are obtained, the next step 103 of the process needs to be entered.
And step 103, outputting the reminding information.
Specifically, the reminding information includes at least one of the following: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound. Further, the screen display content is hidden and/or the screen display parameters are adjusted. The adjusting screen display parameters comprises at least one of: a dark screen color, a screen off, or a screen displaying a particular picture.
For example, when one face image or a plurality of face images are recognized, that is, the sight of other people steals the mobile phone screen of the user. The mobile phone can flash the indicator light to prompt the privacy of the mobile phone of the user to be stolen and protected. And the brightness and the color of the screen are adjusted to be dark, the screen is turned off or a specific picture is displayed.
More optimally, different protection modes can be provided according to different scenes in the embodiment. The protection mode includes at least one of: a security mode, otherwise known as a peep-proof mode, a personal self-timer mode. In practice, all modes may be set according to user requirements.
For example, in the personal self-timer mode, if there are a plurality of face images, a reminder message is output. When the user and the whole family are self-photographed together, the reminding information can be output firstly due to privacy protection, and the user can close the reminding.
The mobile phone flickering indicating lamp can play a role in timely reminding the user, meanwhile, the mobile phone cannot jump to an interface shot by a camera, and the interface which is operated by the user cannot be suddenly influenced. And when the emergency situation that the crowd is crowded is met, for example, a mobile phone needs to be turned on to make a call, the indicating lamp flickers to remind the vision of strangers around, but the user can select to continue operating the mobile phone interface. Therefore, the operation is more humanized, the public places are more convenient, and the user can not delay urgent events due to special conditions.
And 104, the user operates the closing reminding information.
Specifically, the user may turn off the indicator light to signal that an alert has been received, such as when the phone flashes the indicator light to indicate that the user's privacy of the phone is being stolen. While not abruptly affecting the interface the user is operating. When the emergency situation that people are crowded is met, for example, a mobile phone needs to be turned on to make a call, the indicating lamp flickers to remind the vision of strangers around, but the user can select to receive the reminding signal, turn off the indicating lamp and continue to operate the mobile phone interface, so that the operation is more humanized, and the emergency situation cannot be delayed due to special situations.
Therefore, the embodiment reminds the user of privacy safety by acquiring the face images and judging whether to acquire a plurality of face images. The implementation mode can greatly protect the information safety of the user when using the mobile phone.
A second embodiment of the present application relates to a privacy protection method applied to a mobile terminal, including: and acquiring the face images, and judging whether to acquire a plurality of face images. And further, judging whether the face image is unmatched with a preset face image or not, and if the face image is unmatched with the preset face image, outputting reminding information and/or hiding screen display content and/or adjusting screen display parameters. The reminding information comprises at least one of the following: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound.
The following describes implementation details of the privacy protection method of the present embodiment in detail, and the following is only provided for easy understanding and is not necessary for implementing the present embodiment.
Please refer to fig. 2, which is a flowchart illustrating a privacy protecting method according to a second embodiment of the present application. The method comprises the following specific steps:
Specifically, when the user opens the mobile phone, the screen of the mobile phone is lighted, that is, the mobile phone is in a working state. For example, in a public place with more people, the user selects to turn on the protection mode switch, and the mobile phone responds to the turning on of the protection mode switch. The protection mode includes at least one of: a security mode, otherwise known as a peep-proof mode, a personal self-timer mode. In practice, all modes may also be included according to user requirements.
When the mobile phone raises the front camera, the mobile phone does not enter a camera shooting interface, and only the work of acquiring the face image is carried out. The mobile phone uploads the acquired face image to the mobile phone chip for processing, and the next step 202 of the process is entered.
Specifically, the number of face images in the current scene is identified through physical devices in the mobile phone and the face detection function of the camera. And sequentially defining the first face image, the second face image, the third face image, the fourth face image and the Nth face image according to the distance between the face and the mobile phone screen when the user operates the mobile phone. Therefore, the first face image is the closest to the mobile phone screen by default, and so on. For example, the number of face images in the current scene is two face images. According to the distance between the two face images and the mobile phone screen, the first face image is acquiescent to be closest to the mobile phone screen and is defined as the first face image and the second face image in sequence through calculation of a sensor in the mobile phone.
If it is determined that only one face image is obtained, i.e. the user himself, then the next step 203 of the process need not be entered. And/or, if it is determined that a plurality of face images are acquired, the next step 203 of the process or the step 204 is directly entered.
Specifically, after the user turns on the protection mode, the method further includes: and inputting the face image of the user, and setting the face image as a first preset face image.
By judging whether the face images are matched with preset face images or not, if at least one face image is not matched, the user is reminded to pay attention to privacy safety, and the next step 204 of the process is needed. And/or if all the face images are matched, no reminding message needs to be output.
And step 204, outputting reminding information.
Specifically, the reminding information includes at least one of the following: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound. Further, the screen display content is hidden and/or the screen display parameters are adjusted. The adjusting screen display parameters comprises at least one of: a dark screen color, a screen off, or a screen displaying a particular picture.
For example, when one face image or a plurality of face images are recognized, that is, the sight of other people steals the mobile phone screen of the user. The mobile phone can flash the indicator light to prompt the privacy of the mobile phone of the user to be stolen and protected. And the brightness and the color of the screen are adjusted to be dark, the screen is turned off or a specific picture is displayed.
More optimally, different protection modes can be provided according to different scenes in the embodiment. The protection mode includes at least one of: a security mode, otherwise known as a peep-proof mode, a personal self-timer mode. In practice, all modes may be set according to user requirements.
For example, in the personal self-timer mode, if there are a plurality of face images, a reminder message is output. When the user and the whole family are self-photographed together, the reminding information can be output firstly due to privacy protection, and the user can close the reminding.
The mobile phone flickering indicating lamp can play a role in timely reminding the user, meanwhile, the mobile phone cannot jump to an interface shot by a camera, and the interface which is operated by the user cannot be suddenly influenced. And when the emergency situation that the crowd is crowded is met, for example, a mobile phone needs to be turned on to make a call, the indicating lamp flickers to remind the vision of strangers around, but the user can select to continue operating the mobile phone interface. Therefore, the operation is more humanized, the public places are more convenient, and the user can not delay urgent events due to special conditions.
Specifically, the user may turn off the indicator light to signal that an alert has been received, such as when the phone flashes the indicator light to indicate that the user's privacy of the phone is being stolen. While not abruptly affecting the interface the user is operating. When the emergency situation that people are crowded is met, for example, a mobile phone needs to be turned on to make a call, the indicating lamp flickers to remind the vision of strangers around, but the user can select to receive the reminding signal, turn off the indicating lamp and continue to operate the mobile phone interface, so that the operation is more humanized, and the emergency situation cannot be delayed due to special situations.
Therefore, the embodiment can accurately protect the information safety of the user when using the mobile phone, simultaneously provides more humanized operation, and greatly improves the use experience of the user.
A third embodiment of the present application relates to a privacy protection method applied to a mobile terminal, including: acquiring a face image, and judging whether the first face image is matched with a preset face image or not; and further, judging whether a second face image exists or not, and if so, outputting reminding information and/or hiding screen display content and/or adjusting screen display parameters. The reminding information comprises at least one of the following: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound.
The following describes implementation details of the privacy protection method of the present embodiment in detail, and the following is only provided for easy understanding and is not necessary for implementing the present embodiment.
Please refer to fig. 3, which is a flowchart illustrating a privacy protecting method according to a third embodiment of the present application. The method comprises the following specific steps:
Specifically, when the user opens the mobile phone, the screen of the mobile phone is lighted, that is, the mobile phone is in a working state. For example, in a public place with more people, the user selects to turn on the protection mode switch, and the mobile phone responds to the turning on of the protection mode switch. The protection mode includes at least one of: a security mode, otherwise known as a peep-proof mode, a personal self-timer mode. In practice, all modes may also be included according to user requirements.
After the user starts the protection mode, the method further comprises the following steps: and inputting the face image of the user, and setting the face image as a first preset face image.
When the mobile phone raises the front camera, the mobile phone does not enter a camera shooting interface, and only the work of acquiring the face image is carried out. The acquiring of the face image comprises: at least two face images are obtained. The mobile phone uploads the acquired face image to the mobile phone chip for processing, and the next step 302 of the process is entered.
Specifically, the face image in the current scene is identified through the physical device in the mobile phone and the face detection function of the camera. For example, a first face image in a current scene is identified according to a distance between a face and a mobile phone screen when the user operates the mobile phone. The default first face image is closest to a mobile phone screen and is defined as the first face image through calculation of a sensor in the mobile phone. The preset condition is at least one of the following conditions: the face image is not matched with the first preset face image; and/or the number of the face images is multiple.
And judging whether the first face image is the user himself or not according to the face image which is input into the user in advance, namely the first preset face image. If the first face image is determined to be the user himself, the first face image may proceed to the next step 303 of the process. And/or if the first face image is determined not to be the user himself, the first face image does not need to enter the next step 303 of the process.
Specifically, the number of face images in the current scene is identified through physical devices in the mobile phone and the face detection function of the camera. And sequentially defining the first face image, the second face image, the third face image, the fourth face image and the Nth face image according to the distance between the face and the mobile phone screen when the user operates the mobile phone. Therefore, the first face image is the closest to the mobile phone screen by default, and so on. For example, the number of face images in the current scene is two face images. According to the distance between the two face images and the mobile phone screen, the first face image is acquiescent to be closest to the mobile phone screen and is defined as the first face image and the second face image in sequence through calculation of a sensor in the mobile phone.
If it is determined that only one face image is obtained, i.e. the user himself, then the next step 304 of the process need not be entered. And/or if the second face image is acquired, that is, the second face image is determined to exist, entering the next step 304 of the process.
And step 304, outputting the reminding information.
Specifically, the reminding information includes at least one of the following: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound. Further, the screen display content is hidden and/or the screen display parameters are adjusted. The adjusting screen display parameters comprises at least one of: a dark screen color, a screen off, or a screen displaying a particular picture.
For example, when the first face image is recognized not to be the user himself, or the second face image is recognized, that is, the sight of other people steals the mobile phone screen of the user. The mobile phone can flash the indicator light to prompt the privacy of the mobile phone of the user to be stolen and protected. And the brightness and the color of the screen are adjusted to be dark, the screen is turned off or a specific picture is displayed. Similarly, the appearance of the third face image and the Nth face image is the same, namely, the sight of other people steals the mobile phone screen of the user.
More optimally, different protection modes can be provided according to different scenes in the embodiment. The protection mode includes at least one of: a security mode, otherwise known as a peep-proof mode, a personal self-timer mode. In practice, all modes may be set according to user requirements.
For example, in the personal self-timer mode, if there are a plurality of face images, a reminder message is output. When the user and the whole family are self-photographed together, the reminding information can be output firstly due to privacy protection, and the user can close the reminding.
For example, in the security mode or the peep-proof mode, if the face image is not matched with a preset face image, reminding information is output. This is suitable for use in crowded public areas. The mobile phone flickering indicating lamp can play a role in timely reminding the user, meanwhile, the mobile phone cannot jump to an interface shot by a camera, and the interface which is operated by the user cannot be suddenly influenced. And when the emergency situation that the crowd is crowded is met, for example, a mobile phone needs to be turned on to make a call, the indicating lamp flickers to remind the vision of strangers around, but the user can select to continue operating the mobile phone interface. Therefore, the operation is more humanized, the public places are more convenient, and the user can not delay urgent events due to special conditions.
Specifically, the user may turn off the indicator light to signal that an alert has been received, such as when the phone flashes the indicator light to indicate that the user's privacy of the phone is being stolen. While not abruptly affecting the interface the user is operating. When the emergency situation that people are crowded is met, for example, a mobile phone needs to be turned on to make a call, the indicating lamp flickers to remind the vision of strangers around, but the user can select to receive the reminding signal, turn off the indicating lamp and continue to operate the mobile phone interface, so that the operation is more humanized, and the emergency situation cannot be delayed due to special situations.
Therefore, the embodiment prompts the user to carry out privacy protection operation through the flashing of the indicating lamp, so that the safety of information of the user when the user uses the mobile phone can be protected, the prompting effect on privacy protection in the prior art can be improved, the operation is more humanized, public places are more convenient, and the use experience of the user is greatly improved.
A fourth embodiment of the present application relates to a privacy protection method applied to a mobile terminal, including: acquiring a face image, and judging whether the first face image is matched with a preset face image or not; and further, judging whether the second face image is matched with the preset face image, if not, outputting a reminding message, hiding the screen display content and/or adjusting the screen display parameters. The reminding information comprises at least one of the following: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound.
The following describes implementation details of the privacy protection method of the present embodiment in detail, and the following is only provided for easy understanding and is not necessary for implementing the present embodiment.
Please refer to fig. 4, which is a flowchart illustrating a privacy protecting method according to a fourth embodiment of the present application. The method comprises the following specific steps:
Specifically, when the user opens the mobile phone, the screen of the mobile phone is lighted, that is, the mobile phone is in a working state. For example, in a public place with more people, the user selects to turn on the protection mode switch, and the mobile phone responds to the turning on of the protection mode switch. The protection mode includes at least one of: a security mode, otherwise known as a peep-proof mode, a personal self-timer mode. In practice, all modes may also be included according to user requirements.
After the user starts the protection mode, the method further comprises the following steps: and inputting the face image of the user, and setting the face image as a first preset face image.
When the mobile phone raises the front camera, the mobile phone does not enter a camera shooting interface, and only the work of acquiring the face image is carried out. The acquiring of the face image comprises: at least two face images are obtained. The mobile phone uploads the acquired face image to a mobile phone chip for processing, and the next step 402 of the process is entered.
In step 402, it is determined whether the first face image is the user himself.
Specifically, the number of face images in the current scene is identified through physical devices in the mobile phone and the face detection function of the camera. And sequentially defining the first face image, the second face image, the third face image, the fourth face image and the Nth face image according to the distance between the face and the mobile phone screen when the user operates the mobile phone. Therefore, the first face image is the closest to the mobile phone screen by default, and so on. For example, the number of face images in the current scene is two face images. According to the distance between the two face images and the mobile phone screen, the first face image is acquiescent to be closest to the mobile phone screen and is defined as the first face image and the second face image in sequence through calculation of a sensor in the mobile phone.
And judging whether the first face image is the user himself or not according to the face image which is input into the user in advance, namely the first preset face image. If the first face image is determined to be the user himself, the first face image may proceed to the next step 403 of the process. And/or, if the first face image is determined not to be the user himself, the first face image does not need to enter the next step 403 of the flow.
Further, if the second face image is defined as calculated by a sensor in the mobile phone, the next step 403 of the process is executed to calculate and compare the similarity of the face images. Similarly, there may be a third face image, a fourth face image and an nth face image, and the next step 403 in the process is also entered to calculate and compare the similarity of the face images.
Specifically, according to the judgment of the previous step 402, it is assumed that the first face image is closest to the mobile phone screen and is the user himself. Therefore, whether the second face image and the Nth face image possibly appearing later are matched with the preset face image is directly judged. The method for judging matching of the preset face images is to calculate and compare the similarity of the face images. Positioning, correcting and face segmenting the acquired face image by a face detection technology, namely standardized feature extraction; the nose, eyes and mouth of the human face are regarded as characteristic points, and the positions of the characteristic points are marked to calculate the similarity. And measuring the distance and the angle of the acquired face image and the preset face image and each characteristic point of the two face images, calculating to obtain the similarity of the two faces, and finally informing a calculation result to a computer of the mobile terminal, wherein the calculation result is similar or dissimilar. If the calculation results are similar, the second face image matches the preset face image, and the process returns to step 402 to determine whether the user is the user himself. And/or, if the calculation results are not similar, the second face image does not match the preset face image, and then the next step 404 of the flow is entered.
If a third face image appears in the scene, the face detection process is finished to judge whether the third face image is matched with the preset face image or not according to the steps of the second face image. Likewise, the same is true for the nth face image.
Further, whether the first face image is matched with a preset face image or not is judged.
Specifically, it is determined in the previous step 402 that the first face image is not the user himself/herself as a default. Therefore, whether the first face image is matched with the preset face image or not is directly judged. If the calculation results are similar, the first face image matches the preset face image, and the process returns to step 402 to determine whether the first face image is the user himself. And/or if the calculation results are not similar, the first face image does not match the preset face image, and then the next step 404 of the flow is entered.
And step 404, outputting reminding information.
Specifically, the reminding information includes at least one of the following: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound. Further, the screen display content is hidden and/or the screen display parameters are adjusted. The adjusting screen display parameters comprises at least one of: a dark screen color, a screen off, or a screen displaying a particular picture.
For example, an indicator light may be blinked to indicate to the user that privacy needs to be protected. When the first face image or the second face image is recognized to be not the user, namely the sight of other people steals the mobile phone screen of the user. The mobile phone can flash the indicator light to prompt the privacy of the mobile phone of the user to be stolen and protected. And the brightness and the color of the screen are adjusted to be dark, the screen is turned off or a specific picture is displayed. Similarly, the appearance of the third face image and the Nth face image is the same, namely, the sight of other people steals the mobile phone screen of the user.
The mobile phone flickering indicating lamp can play a role in timely reminding the user, meanwhile, the mobile phone cannot jump to an interface shot by a camera, and the interface which is operated by the user cannot be suddenly influenced. And when the emergency situation that the crowd is crowded is met, for example, a mobile phone needs to be turned on to make a call, the indicating lamp flickers to remind the vision of strangers around, but the user can select to continue operating the mobile phone interface. Therefore, the operation is more humanized, the public places are more convenient, and the user can not delay urgent events due to special conditions.
Specifically, for example, when the mobile phone flashes an indicator light to indicate that the privacy of the mobile phone of the user is being stolen, the user may turn off the indicator light to signal that a reminder has been received, return to step 402, and continue to protect the privacy of the user in the always-on protection mode. If the user does not turn off the indicator light, the next step 406 of the process is entered, i.e. the user selects to turn off the screen light of the mobile phone or turn off the protection mode.
Therefore, on one hand, the mobile phone flickering indicator light plays a role in timely reminding the user, the mobile phone indicator light is selected to be turned off, the user is acquiescent with the ambient scene environment, and the ambient environment is known to have no unsafe influence on the privacy of the user. For example, when the user encounters an emergency situation that people are crowded, the mobile phone needs to be turned on to make a call, the indicating lamp flickers to remind the vision of strangers around, and the user selects to turn off the indicating lamp so as to continue to operate the original interface of the mobile phone and avoid delaying the emergency situation due to special situations.
On the other hand, the user selects not to turn off the indicator light, and can select to turn off the mobile phone screen. For example, when the user is in a crowded car, personal information in the screen of the mobile phone is completely exposed to the sight of strangers. Under the unavoidable condition, the user can also play a role in privacy protection by selecting to suspend the mobile phone to work. Similarly, the user can select to turn off the mobile phone protection mode without turning off the indicator lamp. For example, the user plays a mobile phone with family at home, watches the same mobile phone program together, or the individual self-timer mode, and at this moment, the protection mode can be closed, so that the human face detection identification and the mobile phone flickering indicator lamp can not occur, and the power consumption of the mobile phone can be reduced.
Specifically, the user selects not to turn off the indicator light, and can select to turn off the mobile phone screen. For example, when the user is in a crowded car, personal information in the screen of the mobile phone is completely exposed to the sight of strangers. Under the unavoidable condition, the user can also play a role in privacy protection by selecting to suspend the mobile phone to work. Similarly, the user can select to turn off the mobile phone protection mode without turning off the indicator lamp. For example, the user plays a mobile phone with family at home, watches the same mobile phone program, and at this time, the protection mode can be closed, so that face detection identification and a mobile phone flickering indicator lamp can not occur, and the power consumption of the mobile phone can be reduced.
Therefore, the embodiment prompts the user to carry out privacy protection operation through the flashing of the indicating lamp, so that the safety of information of the user when the user uses the mobile phone can be protected, the prompting effect on privacy protection in the prior art can be improved, the operation is more humanized, public places are more convenient, and the use experience of the user is greatly improved.
In the specific embodiment, a privacy protection method and apparatus are also provided, which are applied to a mobile terminal.
Please refer to fig. 5, which is a schematic diagram of a privacy protecting apparatus according to an embodiment of the present application. The method comprises the following specific steps:
Specifically, the obtaining unit 501 at least includes a built-in image obtaining unit, and the image obtaining unit is configured to obtain face image information uploaded by a camera in real time.
It is noted that, in order to better implement the method of the present application, the obtaining unit 501 further includes an image storage unit. The image acquisition unit sends the face image information uploaded in real time to the image storage unit, and the image storage unit stores the image information respectively. The storage unit is used for storing the face image of the user as a first preset face image. The storage unit is further used for storing the face image of the second user as a second preset face image.
Specifically, in the first judging unit, the number of face images in the current scene is identified through the physical device in the mobile phone and the face detecting function of the camera. And sequentially defining the first face image, the second face image, the third face image, the fourth face image and the Nth face image according to the distance between the face and the mobile phone screen when the user operates the mobile phone. Therefore, the first face image is the closest to the mobile phone screen by default, and so on.
Specifically, in the second determination unit, it is determined whether the first face image is the user himself or herself, based on a first preset face image, which is a face image entered in advance into the user. And if the first face image is the closest to the mobile phone screen, directly judging whether the second face image and the face image possibly appearing later meet the preset conditions. The method for judging whether the preset conditions are met is to calculate and compare the similarity of the face images. Positioning, correcting and face segmenting the acquired face image by a face detection technology, namely standardized feature extraction; the nose, eyes and mouth of the human face are regarded as characteristic points, and the positions of the characteristic points are marked to calculate the similarity. And measuring the distance and the angle of the acquired face image and the preset face image and each characteristic point of the two face images, calculating to obtain the similarity of the two faces, and finally informing a calculation result to a computer of the mobile terminal, wherein the calculation result is similar or dissimilar. If the first face image is judged not to be the user himself, the first face image needs to be judged whether the preset condition is met.
It should be noted that, after the acquisition unit identifies the acquired data as normal, the identification signal of the position of the human face feature point is sequentially sent to the first determination unit and the second determination unit. The first judging unit and the second judging unit respond according to different identification signals.
Specifically, in the execution unit, when the second face image is recognized not to be the user himself, namely, the sight of other people steals the mobile phone screen of the user. The mobile phone can flash the indicator light to prompt the privacy of the mobile phone of the user to be stolen and protected.
It should be noted that, in an actual application scenario, the reminder information includes at least one of the following: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound. Further, the screen display content is hidden and/or the screen display parameters are adjusted. The adjusting screen display parameters comprises at least one of: a dark screen color, a screen off, or a screen displaying a particular picture.
It is noted that, in an actual application scenario, for a subsequent more humanized operation, the user experience is improved. In the execution unit, the user can be made to perform a selection operation to turn off the indicator lamp. For example, when the user encounters an emergency situation that people are crowded, the mobile phone needs to be turned on to make a call, the indicating lamp flickers to remind the vision of strangers around, and the user selects to turn off the indicating lamp so as to continue to operate the original interface of the mobile phone and avoid delaying the emergency situation due to special situations.
It is noted that, in a practical application scenario, the effect of privacy protection is not affected. The user selects not to turn off the indicator light and can select to turn off the mobile phone screen. For example, when the user is in a crowded car, personal information in the screen of the mobile phone is completely exposed to the sight of strangers. Under the unavoidable condition, the user can also play a role in privacy protection by selecting to suspend the mobile phone to work.
It is worth noting that in an actual application scenario, in order to adapt to diversified application scenario requirements, the user experience is better guaranteed. And when the user selects not to turn off the indicator light, the mobile phone protection mode can be selected to be turned off. For example, the user plays a mobile phone with family at home, watches the same mobile phone program, and at this time, the protection mode can be closed, so that face detection identification and a mobile phone flickering indicator lamp can not occur, and the power consumption of the mobile phone can be reduced.
It should be understood that this embodiment is a system example corresponding to the fourth embodiment, and that this embodiment may be implemented in cooperation with the fourth embodiment. The related technical details mentioned in the fourth embodiment are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the fourth embodiment.
It should be noted that, in the present embodiment, each unit is a logical unit, and in practical applications, one logical unit may be one physical unit, may be a part of one physical unit, and may be implemented by a combination of a plurality of physical units. In addition, in order to highlight the innovative part of the present application, a unit that is not so closely related to solving the technical problem proposed by the present application is not introduced in the present embodiment, but it does not indicate that no other unit exists in the present embodiment.
Please refer to fig. 6, which is a schematic diagram of a terminal according to an embodiment of the present application.
In this embodiment, there is provided a terminal device, including:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the privacy protecting method described above.
Where the memory and processor are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting together one or more of the various circuits of the processor and the memory. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the processor. The processor is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And the memory may be used to store data used by the processor in performing operations.
A particular embodiment of the present application relates to a computer-readable storage medium having a computer program stored thereon. The computer program, when executed by a processor, implements the privacy preserving method embodiments described above.
That is, as can be understood by those skilled in the art, all or part of the steps in the method according to the above embodiments may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Embodiments of the present application also provide a computer program product, which includes computer program code, when the computer program code runs on a computer, the computer is caused to execute the method as described in the above various possible embodiments.
An embodiment of the present application further provides a chip, which includes a memory and a processor, where the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a device in which the chip is installed executes the method described in the above various possible embodiments.
The present application further provides a terminal, the terminal including: a memory, a processor and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method as described above.
The present application also provides a computer storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method as described above.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the recitation of an element by the phrase "comprising an … …" does not exclude the presence of additional like elements in the process, method, article, or apparatus that comprises the element, and further, where similarly-named elements, features, or elements in different embodiments of the disclosure may have the same meaning, or may have different meanings, that particular meaning should be determined by their interpretation in the embodiment or further by context with the embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, in different orders, and may be performed alternately or at least partially with respect to other steps or sub-steps of other steps.
The foregoing is only a preferred embodiment of the present application and it should be noted that, for a person skilled in the art, several modifications and refinements can be made without departing from the principle of the present application, and these modifications and refinements should also be regarded as the protection scope of the present application.
Claims (12)
1. A privacy preserving method, comprising:
acquiring at least one first face image and at least one second face image;
Judging as a first face image and/or a second face image according to the distance between the user and the terminal screen;
if the first face image and/or the second face image meet preset conditions, outputting reminding information and/or hiding screen display content and/or adjusting screen display parameters.
2. The privacy protection method of claim 1, further comprising: before the face image is obtained, the user starts a protection mode; the protection mode includes at least one of: a security mode or privacy mode, and/or a self-timer mode.
3. The privacy protection method according to claim 1, further comprising, before the obtaining the face image: and inputting the face image of the user, and setting the face image as a first preset face image.
4. The privacy protection method according to claim 1, wherein the preset condition is at least one of: the first face image or the second face image is not matched with the first preset face image; and/or the first face image is matched with the first preset face image, but the second face image is not matched with the first preset face image.
5. The privacy protection method of claim 2, further comprising: in the security mode or the peep-proof mode, if the first face image does not meet the preset condition, other face image information is continuously judged, and if the second face image meets the preset condition, reminding information is output and/or screen display content is hidden and/or screen display parameters are adjusted.
6. The privacy protection method of claim 2, further comprising: in the personal self-timer mode, if the first face image does not meet the preset condition, reminding information is not output; or if the first face image does not meet the preset condition, continuing to judge the information of other face images, and if the second face image meets the preset condition, outputting reminding information and/or adjusting screen display parameters.
7. The privacy protection method according to any one of claims 1 to 6, wherein the reminder information includes at least one of: indicator light/screen brightness change, indicator light/screen color change, vibration, pattern, animation, text, sound.
8. The privacy protection method according to any one of claims 1 to 6, wherein the adjusting the screen display parameters includes at least one of: a dark screen color, a screen off, or a screen displaying a particular picture.
9. The privacy protection method according to any one of claims 1 to 6, further comprising:
if the first face image and/or the second face image do not meet the preset conditions, closing reminding information, and displaying screen content and/or restoring screen display parameters.
10. The privacy protection method according to any one of claims 1 to 6, further comprising:
when the user receives the reminding information, the protection mode is not closed; and/or the user closes the protection mode or closes the reminding message, and then the protection mode is closed.
11. A terminal, comprising: at least one processor; and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the privacy protecting method of any one of claims 1-10.
12. A computer-storable medium storing a computer program, characterised in that the computer program, when executed by a processor, implements the privacy protecting method of any one of claims 1 to 10.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010536118.1A CN111866267B (en) | 2020-06-12 | 2020-06-12 | Privacy protection method, terminal and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010536118.1A CN111866267B (en) | 2020-06-12 | 2020-06-12 | Privacy protection method, terminal and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111866267A true CN111866267A (en) | 2020-10-30 |
| CN111866267B CN111866267B (en) | 2022-01-11 |
Family
ID=72987803
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010536118.1A Active CN111866267B (en) | 2020-06-12 | 2020-06-12 | Privacy protection method, terminal and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111866267B (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113780802A (en) * | 2021-09-07 | 2021-12-10 | 杭州天宽科技有限公司 | Operation and maintenance service visual management system |
| CN114640813A (en) * | 2022-03-31 | 2022-06-17 | 维沃移动通信有限公司 | Peep-proof method, device, equipment and storage medium |
| CN114743240A (en) * | 2022-03-30 | 2022-07-12 | 明阳产业技术研究院(沈阳)有限公司 | Internet of things ultra-low power application communication management method and related equipment |
| CN119600972A (en) * | 2023-09-08 | 2025-03-11 | 北京小米移动软件有限公司 | Screen brightness processing method and device, electronic device and storage medium |
Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103108085A (en) * | 2013-01-31 | 2013-05-15 | 广东欧珀移动通信有限公司 | Glance prevention method of mobile terminal |
| US20130254874A1 (en) * | 2012-03-23 | 2013-09-26 | Hon Hai Precision Industry Co., Ltd. | Method for preventing information displayed on screen from being viewed without authorization and display device having anti-viewing function |
| CN103685701A (en) * | 2012-09-17 | 2014-03-26 | 联想移动通信科技有限公司 | Peeping prevention method, device and mobile terminal |
| CN106603817A (en) * | 2016-11-14 | 2017-04-26 | 乐视控股(北京)有限公司 | Incoming call processing method and device and electronic equipment |
| CN108108604A (en) * | 2017-12-14 | 2018-06-01 | 珠海格力电器股份有限公司 | Method and device for controlling screen display |
| CN108133133A (en) * | 2018-01-26 | 2018-06-08 | 郑州云海信息技术有限公司 | A kind of mobile phone private guard method |
| CN108804956A (en) * | 2018-05-31 | 2018-11-13 | 出门问问信息科技有限公司 | Screen adjustment method and device based on secret protection |
| WO2018233340A1 (en) * | 2017-06-19 | 2018-12-27 | 京东方科技集团股份有限公司 | Wearable device, anti-spy display system and anti-spy display method |
| CN109348020A (en) * | 2018-11-30 | 2019-02-15 | 维沃移动通信(杭州)有限公司 | A kind of photographic method and mobile terminal |
| CN109446770A (en) * | 2018-10-18 | 2019-03-08 | 维沃移动通信有限公司 | A kind of method and apparatus for protecting privacy |
-
2020
- 2020-06-12 CN CN202010536118.1A patent/CN111866267B/en active Active
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130254874A1 (en) * | 2012-03-23 | 2013-09-26 | Hon Hai Precision Industry Co., Ltd. | Method for preventing information displayed on screen from being viewed without authorization and display device having anti-viewing function |
| CN103685701A (en) * | 2012-09-17 | 2014-03-26 | 联想移动通信科技有限公司 | Peeping prevention method, device and mobile terminal |
| CN103108085A (en) * | 2013-01-31 | 2013-05-15 | 广东欧珀移动通信有限公司 | Glance prevention method of mobile terminal |
| CN106603817A (en) * | 2016-11-14 | 2017-04-26 | 乐视控股(北京)有限公司 | Incoming call processing method and device and electronic equipment |
| WO2018233340A1 (en) * | 2017-06-19 | 2018-12-27 | 京东方科技集团股份有限公司 | Wearable device, anti-spy display system and anti-spy display method |
| CN108108604A (en) * | 2017-12-14 | 2018-06-01 | 珠海格力电器股份有限公司 | Method and device for controlling screen display |
| CN108133133A (en) * | 2018-01-26 | 2018-06-08 | 郑州云海信息技术有限公司 | A kind of mobile phone private guard method |
| CN108804956A (en) * | 2018-05-31 | 2018-11-13 | 出门问问信息科技有限公司 | Screen adjustment method and device based on secret protection |
| CN109446770A (en) * | 2018-10-18 | 2019-03-08 | 维沃移动通信有限公司 | A kind of method and apparatus for protecting privacy |
| CN109348020A (en) * | 2018-11-30 | 2019-02-15 | 维沃移动通信(杭州)有限公司 | A kind of photographic method and mobile terminal |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113780802A (en) * | 2021-09-07 | 2021-12-10 | 杭州天宽科技有限公司 | Operation and maintenance service visual management system |
| CN113780802B (en) * | 2021-09-07 | 2024-03-19 | 杭州天宽科技有限公司 | Visual management system for operation and maintenance service |
| CN114743240A (en) * | 2022-03-30 | 2022-07-12 | 明阳产业技术研究院(沈阳)有限公司 | Internet of things ultra-low power application communication management method and related equipment |
| CN114640813A (en) * | 2022-03-31 | 2022-06-17 | 维沃移动通信有限公司 | Peep-proof method, device, equipment and storage medium |
| CN119600972A (en) * | 2023-09-08 | 2025-03-11 | 北京小米移动软件有限公司 | Screen brightness processing method and device, electronic device and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111866267B (en) | 2022-01-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111866267B (en) | Privacy protection method, terminal and storage medium | |
| US11080434B2 (en) | Protecting content on a display device from a field-of-view of a person or device | |
| EP3163498B1 (en) | Alarming method and device | |
| US10007841B2 (en) | Human face recognition method, apparatus and terminal | |
| CN112767285A (en) | Image processing method and device, electronic equipment and storage medium | |
| US10379602B2 (en) | Method and device for switching environment picture | |
| CA3206703A1 (en) | Device and method for augmenting images of an incident scene with object description | |
| US10664711B2 (en) | Vehicle prompt apparatus and operating method thereof | |
| US20170339287A1 (en) | Image transmission method and apparatus | |
| CN114834457B (en) | Method, device, equipment and storage medium for detecting driver state | |
| CN106303961A (en) | Automatic alarm method and equipment | |
| CN112509068A (en) | Image dominant color recognition method and device, electronic equipment and storage medium | |
| US10944903B2 (en) | Method for acquiring image using different focus at different depth and electronic device using the same | |
| CN106652327A (en) | Alarming method and apparatus | |
| KR20170007120A (en) | Method and electronic device for providing information about skin type of object | |
| CN110134565A (en) | Environment light detection method and device | |
| US10438377B2 (en) | Method and device for processing a page | |
| CN107563395B (en) | Method and device for dressing management through intelligent mirror | |
| CN105635573A (en) | Pick-up head visual angle adjusting method and apparatus | |
| CN113766141B (en) | Image information processing method and device | |
| EP3273437A1 (en) | Method and device for enhancing readability of a display | |
| US20210370883A1 (en) | Entry support system, entry support method, and storage medium | |
| CN107657235A (en) | Recognition methods and device based on augmented reality | |
| CN108170269B (en) | Image zooming method and terminal | |
| CN114187874A (en) | Brightness adjusting method and device and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |