CN104573440A - Data viewing method and device - Google Patents

Data viewing method and device Download PDF

Info

Publication number
CN104573440A
CN104573440A CN201410797763.3A CN201410797763A CN104573440A CN 104573440 A CN104573440 A CN 104573440A CN 201410797763 A CN201410797763 A CN 201410797763A CN 104573440 A CN104573440 A CN 104573440A
Authority
CN
China
Prior art keywords
instruction
face
display
particular data
hide
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410797763.3A
Other languages
Chinese (zh)
Inventor
吕文玉
李军
王道龙
刘孟
易敏文
李华明
靳茵茵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201410797763.3A priority Critical patent/CN104573440A/en
Publication of CN104573440A publication Critical patent/CN104573440A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a data viewing method and device. The method comprises the following steps: after a specific command is received, performing face detection through a face identification technology; if the matching degree between a face and a preset face reaches a threshold value according to the detection, executing the specific command to display specific data, otherwise executing a hiding command or a shielding command or displaying a key interface. By adopting the method, the security of specific data is ensured through face detection; meanwhile, security protection is performed at any time during viewing of the specific data, and the security of the specific data in case of various sudden accidents when a user views the specific data is ensured, so that the use security of the user is effectively ensured.

Description

A kind of data inspection method and device
Technical field
The present invention relates to computer realm, particularly relate to a kind of data inspection method and device.
Background technology
Along with popularizing of mobile terminal, people use the frequency of mobile terminal more and more higher, but the thing followed is the safety problem of the information stored in mobile terminal.At present; mobile terminal only protects the unlatching safety of terminal by screen locking password; it can not be protected further to the particular data (as privacy information) in mobile terminal; and after if screen locking password seen by other people; other people check after also unlocking mobile terminal, therefore security is not high.
Summary of the invention
One of technical matters that the present invention solves carries out further safeguard protection to the particular data in mobile terminal.
An embodiment according to an aspect of the present invention, provides a kind of data inspection method, wherein, comprising:
After receiving specific instruction, carry out Face datection by face recognition technology;
If the face detected and predetermined face matching degree reach threshold value, then perform described specific instruction to carry out the display of particular data, otherwise, perform and hide instruction, covering instruction or display key interface.
An embodiment according to a further aspect of the invention, provides a kind of data and checks device, comprising:
Receiving element, for receiving specific instruction;
Face identification unit, after receiving described specific instruction at receiving element, carries out Face datection by face recognition technology; If the face detected and predetermined face matching degree reach threshold value, then perform the first command unit, otherwise, perform the second command unit;
First command unit, for performing described specific instruction to carry out the display of particular data;
Second command unit, for performing hiding instruction, hiding instruction or display key interface.
Because the present embodiment can carry out safeguard protection by face recognition technology to particular data (as privacy information); the general warranty security of particular data; carry out safeguard protection at any time when checking particular data simultaneously; ensure that the security of user's particular data when checking that various accident occurs particular data, thus effectively ensure that the use safety of user.
Those of ordinary skill in the art will understand, although detailed description is below carried out with reference to illustrated embodiment, accompanying drawing, the present invention is not limited in these embodiments.But scope of the present invention is widely, and be intended to limit scope of the present invention by means of only accompanying claim.
Accompanying drawing explanation
By reading the detailed description done non-limiting example done with reference to the following drawings, other features, objects and advantages of the present invention will become more obvious:
Fig. 1 illustrates the process flow diagram of data inspection method according to an embodiment of the invention.
Fig. 2 illustrates the process flow diagram of data inspection method in accordance with another embodiment of the present invention.
Fig. 3 illustrates the process flow diagram of data inspection method in accordance with another embodiment of the present invention.
Fig. 4 illustrates the process flow diagram of data inspection method in accordance with another embodiment of the present invention.
Fig. 5 illustrates the process flow diagram of data inspection method in accordance with another embodiment of the present invention.
Fig. 6 illustrates that data check the block diagram of device according to an embodiment of the invention.
Fig. 7 illustrates that data check the block diagram of device in accordance with another embodiment of the present invention.
In accompanying drawing, same or analogous Reference numeral represents same or analogous parts.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail.
Fig. 1 is the process flow diagram of data inspection method according to an embodiment of the invention.
As shown in fig. 1, described in the present embodiment, data inspection method comprises the steps:
S100, after receiving specific instruction, carry out Face datection by face recognition technology;
Whether the face that S110, judgement detect and predetermined face matching degree reach threshold value, if so, then perform S120; If not, then S130 is performed;
S120, perform described specific instruction to carry out the display of particular data.
S130, execution are hidden instruction, are hidden instruction or display key interface.
Below each step is described in further detail.
In step S100, the specific instruction of reception can be: check particular data, amendment particular data, editor's particular data or delete particular data etc., this particular data can relate to the information of privacy, as individual ID, personal identification number, bank account etc.
Wherein, carry out Face datection by face recognition technology and following at least arbitrary characteristic quantity can be adopted to detect: the image surface file 1, being captured people by video camera etc., extract the face line in image surface file; 2, to be appeared by the structure distribution feature calculation of the face such as eye, nose, mouth in the face that captures the geometrical characteristic of picture, and form the proper vector describing image surface according to this geometrical characteristic; 3, according to looks colour of skin regularity of distribution in color space; Difference vector between 4 and the template of at least one standard faces.Property for example and not limitation is only with upper type; the present invention is not limited to the detection of above-mentioned characteristic quantity; those skilled in the art will be understood that other face detection modes are also applicable to the present invention; and the protection domain of the application should be fallen into; not for simplicity; only be contained in this with way of reference, and do not repeat.
Wherein, step S110, after receiving element receives described specific instruction, carries out Face datection by face recognition technology; If the face detected and predetermined face matching degree reach threshold value, then perform step S120, otherwise this data inspection method can terminate this operation, alternatively, also can perform step S130.
Alternatively, predetermined face is that user presets, and when user presets, is gathered the face of user by video camera etc., and adopts at least one characteristic quantity detected during Face datection in step S100 to store to the face gathered.Therefore judging whether the face detected reaches threshold value with predetermined face matching degree and can comprise: at least one characteristic quantity of the face detected and at least one characteristic quantity corresponding prestored are contrasted, if characteristic quantity is identical, or the difference degree of characteristic quantity is in threshold value, such as line similarity in face is more than 80%, then judge that the face that detects and predetermined face matching degree reach threshold value, corresponding execution step S120, otherwise this data inspection method can terminate this operation or perform step S130.
Wherein, in step S120, perform described specific instruction to carry out the display of particular data.
Alternatively, when step S120 carries out the operation of the display of particular data, perform concurrently in step S110, if at least two faces detected, then terminate this operation, or perform step S130.Alternatively, if a face detected in step s 110, then judge that the matching degree of face and the predetermined face detected does not reach threshold value, if so, then proceed the display of particular data, if not, then terminate this operation or perform step S130.
Alternatively, when described first command unit 620 carries out the display of particular data, perform described face identification unit 610 concurrently, described face identification unit 610 is also for detecting by face recognition technology every the schedule time, the face that judgement detects and predetermined face matching degree do not reach threshold value, if so, then proceed the display of particular data, if not, then terminate this operation or perform the second command unit 630.
Wherein, the second command unit 630, for performing hiding instruction, hiding the operation such as instruction or display key interface.
In step S130, particular data can be carried out frosted glass mode and hide, do not show or hide display by hiding instruction or covering instruction, to reach the object of protection particular data.Display key interface is that user can carry out checking of particular data by the key preset, ensure that the normal use of user in order to make mobile terminal when human face detection tech goes wrong or picture pick-up device etc. goes wrong.
Be further used as optional, the key of user's input is received after display key interface, if the first key that the key received and user pre-set is identical, then perform described specific instruction to carry out checking of particular data, otherwise, perform and hide instruction or hide instruction, described key interface is the Key Tpe that user pre-sets.Such as user pre-sets cryptogram decoding, the password pre-set is 1234, after display interface for password input, if user inputs 1234, then perform described specific instruction to carry out checking of specific data, the Key Tpe pre-set also can be pattern or other types.
The data inspection method of the present embodiment; by face recognition technology, safeguard protection is carried out to particular data (as privacy information); the general warranty security of particular data; avoid because of after other people see the password that user inputs; can check the particular data of this user; and cause the leakage of particular data, even if mobile terminal loss simultaneously also can ensure that particular data is not leaked, thus effectively ensure that the use safety of user.
Fig. 2 illustrates method according to another embodiment of the present invention, and the method is when carrying out the display of particular data, comprises the steps:
S200, the mark of user operation to be identified;
S210, judge that whether the mark of described user operation is identical with the first operation mark prestored, if identical, then performs S220, otherwise, perform S230; Or, if exceed the schedule time user operation do not detected, then perform S230;
S220, proceed the display of particular data;
S230, execution are hidden instruction, are hidden instruction or display key interface.
Below each step is described in further detail.
In step S200, the mark of user operation can be: the pressure signal etc. of fingerprint mark or user's uniqueness, described pressure signal is generally obtained by pressure transducer.
In step S210, judge that whether the mark of described user operation is identical with the first operation mark prestored.Such as carry out gathering as the first operation mark prestored to the pressure signal of user by pressure transducer, when the user operation mark identified in step S200 is identical with the first operation mark prestored, then be expressed as same user operation, then carry out the continuation display of particular data, otherwise, represent different user operations, then perform and hide instruction, covering instruction or display key interface.
Be further used as optional, it can be identified when user operation having been detected that step S200 carries out identification to the mark of user operation; Or the mark every the schedule time to user operation identifies, if exceed the described schedule time user operation do not detected, then perform and hide instruction, covering instruction or display key interface.Such as, every 30s or 50s, the mark of user operation is identified, or, such as exceed 50s and user operation do not detected, then perform and hide instruction, covering instruction or display key interface, to avoid user when checking particular data, the leakage causing particular data of accident.
The data inspection method of the present embodiment; due to safeguard protection can be carried out by face recognition technology to particular data (as privacy information); simultaneously when checking particular data by identifying user operation to obtain user identity in real time; thus actual time safety protection is carried out to particular data; ensure that the security of user's particular data when checking that various accident occurs particular data, thus effectively ensure that the use safety of user.
Fig. 3 illustrates the method according to another embodiment of the application, and the method is when carrying out the display of particular data, comprises the steps:
S300, to be detected by face recognition technology, if at least two faces detected, then perform step 310, if a face detected, then perform step S320; Or, detected by face recognition technology every the schedule time, perform step S320;
S310, execution are hidden instruction, are hidden instruction or display key interface;
Whether the face that S320, judgement detect and predetermined face matching degree reach threshold value, if so, then perform S330; If not, then S310 is performed;
S330, proceed the display of particular data.
Because the present embodiment can carry out safeguard protection by face recognition technology to particular data (as privacy information) described in the present embodiment; continue when checking particular data to identify face simultaneously; make when being peeped by others or have suddenly friend to come to check mobile terminal; timely particular data is hidden; thus actual time safety protection is carried out to particular data; ensure that the security of user's particular data when checking that various accident occurs particular data, thus effectively ensure that the use safety of user.
Being method according to another embodiment of the present invention as shown in Figure 4, take particular data as privacy information is example, when the method is arranged, comprises the steps:
S400, the switch of privacy information security function is set in the privacy information security setting page of mobile terminal;
S410, when this function is opened, face information collection is carried out to user, and by the collection of pressure transducer to the basic operation identifying information (operation such as gesture operation, screen touch-control) on mobile terminal screen, with the first operation mark determining predetermined face He prestore;
The list of current setting private attribute is shown in S420, privacy information security setting, the application in the application and application that private attribute is set with the information of private attribute is comprised in list, as optionally, which can identify by icon and be applied as privacy application, which is applied as the application containing part privacy information attribute, and this list can carry out interpolation and the deletion of privacy information in privacy application and application; Such as, Alipay application can be applied as privacy, also can divide into groups to mobile phone contact person in address list, and private attribute is set to a certain grouping, like this in privacy information list, then show Alipay App, cell phone address book, now be shown as privacy application identities in Alipay App data entries, and in cell phone address book entry, show that private information identifies, click cell phone address book entry, the group names that private attribute is set can be checked, after this title, show secret information mark;
S430, the predetermined face determined according to S410 and the first operation mark prestored draw key, be encrypted, ensure the security of the privacy information that bottom is preserved to the information of private attribute in the application of private attribute and application.
Be the method according to another embodiment of the application as shown in Figure 5, take particular data as privacy information be example, when user uses mobile terminal, first Face datection is carried out by face recognition technology, if the face detected and predetermined face matching degree reach threshold value, then show privacy application entrance in the terminal, and the information of private attribute is set in display application; Otherwise, perform and hide instruction or hide instruction.When the method is checked privacy information, can comprise the steps:
S500, the mark of user operation to be identified;
S510, judge that whether the mark of described user operation is identical with the first operation mark prestored, if identical, then performs S520, otherwise, perform S530; Or, if exceed the schedule time user operation do not detected, then perform S530;
S520, proceed the display of particular data;
S530, to be detected by face recognition technology, judge face number, if at least two faces, then perform step 540, if a face, then perform step S550; Or, detected by face recognition technology every the schedule time, perform step S550;
S540, execution are hidden instruction, are hidden instruction or display key interface;
Whether the face that S550, judgement detect and predetermined face matching degree reach threshold value, if so, then perform S520; If not, then S540 is performed.
Fig. 6 illustrates that the data of inventing an embodiment according to this case check device.As shown in Figure 6, these data check that device comprises:
For receiving the device (hereinafter referred to as " receiving element ") 600 of specific instruction;
After receiving described specific instruction at receiving element, carried out the device (hereinafter referred to as " face identification unit ") 610 of Face datection by face recognition technology;
If reach threshold value for the face that detects and predetermined face matching degree, perform described specific instruction to carry out the device (hereinafter referred to as " the first command unit ") 620 of the display of particular data.
Alternatively, these data check that device also comprises:
If do not reach threshold value for the face that detects and predetermined face matching degree, perform the device (hereinafter referred to as " the second command unit ") 630 hidden instruction, hide instruction or display key interface.
Particularly, as shown in Figure 6, receiving element 600, for receiving specific instruction.
Alternatively, the specific instruction of reception can be: check particular data, amendment particular data, editor's particular data or delete particular data etc., this particular data can relate to the information of privacy, as individual ID, personal identification number, bank account etc.
Wherein, carry out Face datection by face recognition technology and following at least arbitrary characteristic quantity can be adopted to detect: the image surface file 1, being captured people by video camera etc., extract the face line in image surface file; 2, to be appeared by the structure distribution feature calculation of the face such as eye, nose, mouth in the face that captures the geometrical characteristic of picture, and form the proper vector describing image surface according to this geometrical characteristic; 3, according to looks colour of skin regularity of distribution in color space; Difference vector between 4 and the template of at least one standard faces.Property for example and not limitation is only with upper type; the present invention is not limited to the detection of above-mentioned characteristic quantity; those skilled in the art will be understood that other face detection modes are also applicable to the present invention; and the protection domain of the application should be fallen into; not for simplicity; only be contained in this with way of reference, and do not repeat.
Wherein, face identification unit 610, after receiving element receives described specific instruction, carries out Face datection by face recognition technology; If the face detected and predetermined face matching degree reach threshold value, then perform the first command unit 620, otherwise these data check that device can terminate this operation, alternatively, also can perform the second command unit 630;
Alternatively, predetermined face is that user presets, and when user presets, is gathered the face of user by video camera etc., and adopts at least one characteristic quantity detected during Face datection in step S100 to store to the face gathered.Therefore judging whether the face detected reaches threshold value with predetermined face matching degree and can comprise: at least one characteristic quantity of the face detected and at least one characteristic quantity corresponding prestored are contrasted, if characteristic quantity is identical, or the difference degree of characteristic quantity is in threshold value, such as line similarity in face is more than 80%, then judge that the face that detects and predetermined face matching degree reach threshold value, corresponding execution the first command unit 620, otherwise these data check that device can terminate this operation or perform the second command unit 630.
Wherein, the first command unit 620, for performing described specific instruction to carry out the display of particular data.
Alternatively, when described first command unit 620 carries out the display of particular data, perform described face identification unit 610 concurrently, if described face identification unit 610 detects at least two faces, then perform the second command unit 630.Alternatively, if described face identification unit 610 detects a face, then judge whether the matching degree of face and the predetermined face detected reaches threshold value, if, then proceed the display of particular data, if not, then terminate this operation or perform the second command unit 630.
Alternatively, when described first command unit 620 carries out the display of particular data, perform described face identification unit 610 concurrently, described face identification unit 610 is also for detecting by face recognition technology every the schedule time, whether the face that judgement detects and predetermined face matching degree reach threshold value, if so, then proceed the display of particular data, if not, then the second command unit 630 is performed.
Wherein, the second command unit 630, for performing hiding instruction, hiding the operation such as instruction or display key interface.
Alternatively, particular data can be carried out frosted glass mode and hide, do not show or hide display by hiding instruction or covering instruction, to reach the object of protection particular data.Display key interface is that user can carry out checking of particular data by the key preset, ensure that the normal use of user in order to make mobile terminal when human face detection tech goes wrong or picture pick-up device etc. goes wrong.
Alternatively, as shown in Figure 7, second command unit 630 comprises key subelement 6301, described key subelement 6301 for showing key interface, also for display key interface after receive user input key, if the first key that the key received and user pre-set is identical, then perform described specific instruction to carry out checking of particular data, otherwise perform and hide instruction or hide instruction, described key interface is the Key Tpe that user pre-sets.Such as user pre-sets cryptogram decoding, the password pre-set is 1234, after display interface for password input, if user inputs 1234, then perform described specific instruction to carry out checking of specific data, the Key Tpe pre-set also can be pattern or other types.
Alternatively, as shown in Figure 7, the data of the present embodiment check that device also can comprise:
User operation recognition unit 640, for when carrying out the display of particular data, the mark of user operation is identified, judge that whether the mark of described user operation is identical with the first operation mark prestored, if the mark of described user operation is not identical with the first operation mark prestored, then perform the second command unit 630.Alternatively, if the mark of described user operation is identical with the first operation mark prestored, then the display of particular data is proceeded.
Further alternatively, the mark of the user operation in user operation recognition unit 640 can be: the pressure signal etc. of fingerprint mark or user's uniqueness, described pressure signal is generally obtained by pressure transducer.
Alternatively, judge in user operation recognition unit 640 that whether the mark of described user operation is identical with the first operation mark prestored.Such as carry out gathering as the first operation mark prestored to the pressure signal of user by pressure transducer, when the user operation mark identified in user operation recognition unit 640 is identical with the first operation mark prestored, then be expressed as same user operation, then carry out the continuation display of particular data, otherwise, represent different user operations, then perform and hide instruction, covering instruction or display key interface
Further alternatively, user operation recognition unit 640, for identifying when user operation having been detected; Or user operation recognition unit 640, identifies for the mark every the schedule time to user operation, if exceed the described schedule time user operation do not detected, then perform the second command unit 630.Such as, every 30s or 50s, the mark of user operation is identified, or, such as exceed 50s and user operation do not detected, then perform and hide instruction, covering instruction or display key interface, to avoid user when checking particular data, the leakage causing particular data of accident.
Data described in the present embodiment check that device can carry out safeguard protection by face recognition technology to particular data (as privacy information); the general warranty security of particular data; carry out safeguard protection at any time when checking particular data simultaneously; ensure that the security of user's particular data when checking that various accident occurs particular data, thus effectively ensure that the use safety of user.
The computer program instructions that described in the present embodiment, data inspection method is corresponding can carry out safeguard protection by face recognition technology to particular data (as privacy information); the general warranty security of particular data; carry out safeguard protection at any time when checking particular data simultaneously; ensure that the security of user's particular data when checking that various accident occurs particular data, thus effectively ensure that the use safety of user.
It should be noted that the present invention can be implemented in the assembly of software and/or software restraint, such as, special IC (ASIC), general object computing machine or any other similar hardware device can be adopted to realize.In one embodiment, software program of the present invention can perform to realize step mentioned above or function by processor.Similarly, software program of the present invention (comprising relevant data structure) can be stored in computer readable recording medium storing program for performing, such as, and RAM storer, magnetic or CD-ROM driver or flexible plastic disc and similar devices.In addition, steps more of the present invention or function can adopt hardware to realize, such as, as coordinating with processor thus performing the circuit of each step or function.
In addition, a part of the present invention can be applied to computer program, such as computer program instructions, when it is performed by computing machine, by the operation of this computing machine, can call or provide according to method of the present invention and/or technical scheme.And call the programmed instruction of method of the present invention, may be stored in fixing or moveable recording medium, and/or be transmitted by the data stream in broadcast or other signal bearing medias, and/or be stored in the working storage of the computer equipment run according to described programmed instruction.At this, comprise a device according to one embodiment of present invention, this device comprises the storer for storing computer program instructions and the processor for execution of program instructions, wherein, when this computer program instructions is performed by this processor, trigger this plant running based on the aforementioned method according to multiple embodiment of the present invention and/or technical scheme.
To those skilled in the art, obviously the invention is not restricted to the details of above-mentioned one exemplary embodiment, and when not deviating from spirit of the present invention or essential characteristic, the present invention can be realized in other specific forms.Therefore, no matter from which point, all should embodiment be regarded as exemplary, and be nonrestrictive, scope of the present invention is limited by claims instead of above-mentioned explanation, and all changes be therefore intended in the implication of the equivalency by dropping on claim and scope are included in the present invention.Any Reference numeral in claim should be considered as the claim involved by limiting.In addition, obviously " comprising " one word do not get rid of other unit or step, odd number does not get rid of plural number.Multiple unit of stating in system claims or device also can be realized by software or hardware by a unit or device.First, second word such as grade is used for representing title, and does not represent any specific order.

Claims (12)

1. a data inspection method, wherein, comprising:
After receiving specific instruction, carry out Face datection by face recognition technology;
If the face detected and predetermined face matching degree reach threshold value, then perform described specific instruction to carry out the display of particular data.
If the face detected and predetermined face matching degree do not reach threshold value, then perform and hide instruction, covering instruction or display key interface.
2. method according to claim 1, wherein, also comprises:
If the key of the user's input received is identical with the first key that user pre-sets, then perform described specific instruction to carry out checking of particular data.
3. method according to claim 1 and 2, wherein, also comprises:
When carrying out the display of particular data, the mark of user operation is identified;
If the mark of described user operation is not identical with the first operation mark prestored, then performs and hide instruction, covering instruction or display key interface.
4. method according to claim 3, the described mark to user operation is carried out identification and is comprised:
When carrying out the display of particular data, carry out when user operation being detected identifying or mark every the schedule time to user operation identifies,
Wherein, described execution hide instruction, hide instruction or display key interface step comprise:
If exceed the described schedule time user operation not detected, then perform and hide instruction, covering instruction or display key interface.
5. method according to claim 1 and 2, wherein, also comprises:
When carrying out the display of particular data, carry out Face datection by face recognition technology;
Wherein, described execution hide instruction, hide instruction or display key interface device also for:
If at least two faces detected, then perform and hide instruction, covering instruction or display key interface.
6. method according to claim 1 and 2, wherein, described step of carrying out Face datection by face recognition technology also comprises:
When carrying out the display of particular data, detected by face recognition technology every the schedule time,
Wherein, described execution hide instruction, hide the step of instruction or operation such as display key interface etc. also for:
If a face detected and do not reach threshold value with predetermined face matching degree, then perform and hide instruction or hide instruction or display key interface.
7. data check a device, wherein, comprising:
For receiving the device of specific instruction;
After receiving described specific instruction at receiving element, carried out the device of Face datection by face recognition technology;
If reach threshold value for the face that detects and predetermined face matching degree, perform described specific instruction to carry out the device of the display of particular data;
If do not reach threshold value for the face that detects and predetermined face matching degree, perform the device hidden instruction, hide instruction or display key interface.
8. device according to claim 7, wherein, the described specific instruction of described execution with the device carrying out the display of particular data also for:
If the key of the user's input received is identical with the first key that user pre-sets, then perform described specific instruction to carry out checking of particular data.
9. the device according to claim 7 or 8, wherein, described device also comprises:
For when carrying out the display of particular data, to the device that the mark of user operation identifies;
Wherein, for hiding instruction, hide instruction or display key interface device also for:
If the mark of described user operation is not identical with the first operation mark prestored, then perform the device hidden instruction, hide instruction or display key interface.
10. device according to claim 9, wherein, described for when carrying out the display of particular data, the device that the mark of user operation is identified for:
-when carrying out the display of particular data, when detecting that user operation or the mark every the schedule time to user operation identify;
Wherein, described execution hide instruction, hide instruction or display key interface device also for:
If exceed the described schedule time user operation not detected, then perform and hide instruction, covering instruction or display key interface.
11. devices according to claim 7 or 8, wherein, the described device carrying out Face datection by face recognition technology also for:
When carrying out the display of particular data, carry out Face datection by face recognition technology;
Wherein, described execution hide instruction, hide instruction or display key interface device also for:
If at least two faces detected, then perform and hide instruction, covering instruction or display key interface.
12. devices according to claim 7 or 8, wherein, the described device carrying out Face datection by face recognition technology also for:
When carrying out the display of particular data, detected by face recognition technology every the schedule time;
Wherein, described execution hide instruction, hide the device of instruction or operation such as display key interface etc. also for:
If the face detected and predetermined face matching degree do not reach threshold value or exceed the schedule time user operation do not detected, then perform and hide instruction, hide the operation such as instruction or display key interface.
CN201410797763.3A 2014-12-18 2014-12-18 Data viewing method and device Pending CN104573440A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410797763.3A CN104573440A (en) 2014-12-18 2014-12-18 Data viewing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410797763.3A CN104573440A (en) 2014-12-18 2014-12-18 Data viewing method and device

Publications (1)

Publication Number Publication Date
CN104573440A true CN104573440A (en) 2015-04-29

Family

ID=53089482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410797763.3A Pending CN104573440A (en) 2014-12-18 2014-12-18 Data viewing method and device

Country Status (1)

Country Link
CN (1) CN104573440A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117628A (en) * 2015-07-30 2015-12-02 广东欧珀移动通信有限公司 File display control method, apparatus and corresponding mobile device in terminal
WO2016192165A1 (en) * 2015-05-29 2016-12-08 宇龙计算机通信科技(深圳)有限公司 Data encryption method and apparatus
CN106409209A (en) * 2016-11-24 2017-02-15 北京小米移动软件有限公司 Display method, display device and display equipment
CN106778381A (en) * 2016-11-30 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of important information processing method and terminal
CN107798230A (en) * 2017-10-24 2018-03-13 广东欧珀移动通信有限公司 Terminal control method, device, terminal and computer-readable recording medium
CN107862189A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Unlocking method and related product
CN108038363A (en) * 2017-12-05 2018-05-15 吕庆祥 Improve the method and device of Terminal security
CN108804903A (en) * 2018-06-12 2018-11-13 平安科技(深圳)有限公司 Fileview method and apparatus and computer readable storage medium
CN110324482A (en) * 2018-03-31 2019-10-11 神盾网络安全信息化中心股份有限公司 A kind of information management-control method of the mobile phone based on face recognition
CN110321684A (en) * 2018-03-31 2019-10-11 汇银宝网络技术股份有限公司 A kind of information management-control method of the electronic equipment based on face recognition
CN110619072A (en) * 2019-08-29 2019-12-27 凡普数字技术有限公司 Bank account information acquisition method and device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7212674B1 (en) * 1999-11-15 2007-05-01 Fujifilm Corporation Method, apparatus and recording medium for face extraction
CN102880560A (en) * 2011-07-11 2013-01-16 三星电子(中国)研发中心 User privacy data protection method and mobile terminal using user privacy data protection method
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
CN103177206A (en) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 Information privacy method and electronic terminal
CN103440446A (en) * 2013-08-23 2013-12-11 广东欧珀移动通信有限公司 Protective unlocking operating method and device of private content of intelligent terminal
CN103678979A (en) * 2013-12-06 2014-03-26 三星电子(中国)研发中心 Method and device for intelligently hiding privacy data
CN104112091A (en) * 2014-06-26 2014-10-22 小米科技有限责任公司 File locking method and device
CN104182671A (en) * 2013-05-23 2014-12-03 腾讯科技(深圳)有限公司 Method and device for protecting privacy information of browser

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7212674B1 (en) * 1999-11-15 2007-05-01 Fujifilm Corporation Method, apparatus and recording medium for face extraction
CN102880560A (en) * 2011-07-11 2013-01-16 三星电子(中国)研发中心 User privacy data protection method and mobile terminal using user privacy data protection method
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
CN103177206A (en) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 Information privacy method and electronic terminal
CN104182671A (en) * 2013-05-23 2014-12-03 腾讯科技(深圳)有限公司 Method and device for protecting privacy information of browser
CN103440446A (en) * 2013-08-23 2013-12-11 广东欧珀移动通信有限公司 Protective unlocking operating method and device of private content of intelligent terminal
CN103678979A (en) * 2013-12-06 2014-03-26 三星电子(中国)研发中心 Method and device for intelligently hiding privacy data
CN104112091A (en) * 2014-06-26 2014-10-22 小米科技有限责任公司 File locking method and device

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016192165A1 (en) * 2015-05-29 2016-12-08 宇龙计算机通信科技(深圳)有限公司 Data encryption method and apparatus
CN105117628B (en) * 2015-07-30 2018-02-02 广东欧珀移动通信有限公司 Control method, device and the corresponding mobile device that file is shown in a kind of terminal
CN105117628A (en) * 2015-07-30 2015-12-02 广东欧珀移动通信有限公司 File display control method, apparatus and corresponding mobile device in terminal
CN106409209A (en) * 2016-11-24 2017-02-15 北京小米移动软件有限公司 Display method, display device and display equipment
CN106778381A (en) * 2016-11-30 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of important information processing method and terminal
CN106778381B (en) * 2016-11-30 2020-06-05 宇龙计算机通信科技(深圳)有限公司 Important information processing method and terminal
CN107798230B (en) * 2017-10-24 2020-04-17 Oppo广东移动通信有限公司 Terminal control method, device, terminal and computer readable storage medium
CN107798230A (en) * 2017-10-24 2018-03-13 广东欧珀移动通信有限公司 Terminal control method, device, terminal and computer-readable recording medium
CN107862189A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Unlocking method and related product
CN108038363A (en) * 2017-12-05 2018-05-15 吕庆祥 Improve the method and device of Terminal security
CN110324482A (en) * 2018-03-31 2019-10-11 神盾网络安全信息化中心股份有限公司 A kind of information management-control method of the mobile phone based on face recognition
CN110321684A (en) * 2018-03-31 2019-10-11 汇银宝网络技术股份有限公司 A kind of information management-control method of the electronic equipment based on face recognition
CN108804903A (en) * 2018-06-12 2018-11-13 平安科技(深圳)有限公司 Fileview method and apparatus and computer readable storage medium
CN110619072A (en) * 2019-08-29 2019-12-27 凡普数字技术有限公司 Bank account information acquisition method and device and storage medium

Similar Documents

Publication Publication Date Title
CN104573440A (en) Data viewing method and device
EP3547604B1 (en) Method and apparatus for security question generation and identity verification
CN110659512B (en) Picture management method, device, terminal and storage medium
CN112804445B (en) Display method and device and electronic equipment
CN109543390B (en) Information security management method and system
CN105447357A (en) Application processing method and terminal
CN103714280A (en) Permission control method and electronic equipment
CN110619239A (en) Application interface processing method and device, storage medium and terminal
CN108037830B (en) Method for realizing augmented reality
CN112533072A (en) Image sending method and device and electronic equipment
CN107451501B (en) Method and device for realizing dynamic graphic coding
CN104486372A (en) Contact displaying method, device and terminal
CN107085694B (en) Information display processing method and device
CN109828715B (en) Screen recording method and device
US20200026866A1 (en) Method and device for covering private data
CN106940764A (en) A kind of user authentication method and terminal device
CN106651751B (en) Image processing method and terminal
CN111832458A (en) Anti-theft method and system
CN107358117B (en) Switching method, electronic equipment and computer storage medium
WO2023024473A1 (en) Living body detection method and apparatus, and electronic device, computer-readable storage medium and computer program product
CN113222809B (en) Picture processing method and device for realizing privacy protection
CN111177770A (en) Protection method of sensitive information, mobile equipment and storage device
CN106168967B (en) Webpage information collection method, webpage information protection device and mobile terminal
CN107633174B (en) User input management method and device and terminal
CN105138894B (en) A kind of identifying code safety defense method, system and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150429

RJ01 Rejection of invention patent application after publication