CN107395865A - Pushed information processing method and electronic installation - Google Patents
Pushed information processing method and electronic installation Download PDFInfo
- Publication number
- CN107395865A CN107395865A CN201710508415.3A CN201710508415A CN107395865A CN 107395865 A CN107395865 A CN 107395865A CN 201710508415 A CN201710508415 A CN 201710508415A CN 107395865 A CN107395865 A CN 107395865A
- Authority
- CN
- China
- Prior art keywords
- pushed information
- user
- electronic installation
- active user
- iris
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Environmental & Geological Engineering (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of pushed information processing method and electronic installation.Pushed information processing method includes step:When detecting pushed information, whether identification active user is authorized user;The content of the pushed information is shown when active user is authorized user;With when active user is unauthorized user, the content of pushed information and hiding pushed information is prompted with predetermined manner.The pushed information processing method and electronic installation of embodiment of the present invention; it is fashionable when there is pushed information to enter; whether the user for identifying current operation electronic installation is authorized user; and targetedly make different disposal; effectively protect the privacy of authorized user; the security of user profile is improved, Consumer's Experience is preferable.
Description
Technical field
The present invention relates to field of electronic devices, more particularly to a kind of pushed information processing method and electronic installation.
Background technology
In the current information age, user increasingly focuses on individual privacy, includes the communication object and Content of communciation of user.
However, in some cases, in fact it could happen that when information alert information even information borrows at other people in itself or uses mobile phone certainly
Move out, individual privacy may be caused to leak, poor user experience.
The content of the invention
Embodiments of the present invention provide a kind of pushed information processing method and electronic installation.
The pushed information processing method of embodiment of the present invention, for electronic installation, comprises the following steps:
When detecting pushed information, whether identification active user is authorized user;
The content of the pushed information is shown when the active user is the authorized user;With
When the active user is unauthorized user, prompts the pushed information with predetermined manner and hide the push
The content of information.
The electronic installation of embodiment of the present invention, the electronic installation include display, identity recognition device and processor;
The identity recognition device is used to identify whether active user is authorized user when detecting pushed information;
The display is used for the content that the pushed information is shown when the active user is the authorized user;With
The processor is used for when the active user is unauthorized user, and the pushed information is prompted with predetermined manner
And hide the content of the pushed information.
The electronic installation of embodiment of the present invention, including housing, processor, memory, circuit board, power circuit, display
Device and identity recognition device, the identity recognition device include iris recognition module, and the circuit board is placed in the housing and enclosed
Into interior volume, the processor and the memory are arranged on the circuit board;The power circuit, for be described
Each circuit or the device power supply of electronic installation;The memory is used to store executable program code;The processor passes through
The executable program code that is stored in the memory is read to run program corresponding with the executable program code, with
In the above-mentioned pushed information processing method of execution.
The computer-readable recording medium of embodiment of the present invention, have and be stored in instruction therein, when electronic installation
When being instructed described in computing device, the electronic installation performs above-mentioned pushed information processing method.
The pushed information processing method and electronic installation of embodiment of the present invention, fashionable when there is pushed information to enter, identification is worked as
Whether the user of preceding operation electronic installation is authorized user, and targetedly makes different disposal, effectively protects authorized user
Privacy, improve the security of user profile, Consumer's Experience is preferable.
The additional aspect and advantage of the present invention will be set forth in part in the description, and will partly become from the following description
Obtain substantially, or recognized by the practice of the present invention.
Brief description of the drawings
The above-mentioned and/or additional aspect and advantage of the present invention is from combining in description of the accompanying drawings below to embodiment by change
Obtain substantially and be readily appreciated that, wherein:
Fig. 1 is the schematic flow sheet of the pushed information processing method of embodiment of the present invention.
Fig. 2 is the structural representation of the electronic installation of embodiment of the present invention.
Fig. 3 is the schematic diagram of a scenario of the pushed information processing method of some embodiments of the present invention.
Fig. 4 is the schematic flow sheet of the pushed information processing method of some embodiments of the present invention.
Fig. 5 is the schematic flow sheet of the pushed information processing method of some embodiments of the present invention.
Fig. 6 is the schematic flow sheet of the pushed information processing method of some embodiments of the present invention.
Embodiment
Embodiments of the present invention are described below in detail, the example of the embodiment is shown in the drawings, wherein identical
Or similar label represents same or similar element or the element with same or like function from beginning to end.Below by ginseng
The embodiment for examining accompanying drawing description is exemplary, is only used for explaining embodiments of the present invention, and it is not intended that to this hair
The limitation of bright embodiment.
Fig. 1 and Fig. 2 are referred to, the pushed information processing method of embodiment of the present invention, is comprised the following steps:
S10:When monitoring pushed information, whether identification active user is authorized user;With
S20:Pushed information content is shown when active user is authorized user;With
S30:When active user is unauthorized user, prompts pushed information with predetermined manner and hide in pushed information
Hold.
The electronic installation 1000 of embodiment of the present invention, electronic installation 1000 include identity recognition device, display 200
With processor 300.In some instances, identity recognition device can be iris recognition module 100, and iris recognition module 100 wraps
Include infrared camera 110 and infrared light supply 120.Infrared camera 110 is used to receive to be sent out as the infrared light supply 120 of efficient light sources
The infrared light penetrated is in the reflection light of iris to form iris image.As an example, at the pushed information of embodiment of the present invention
It reason method, can be realized by the electronic installation 1000 of embodiment of the present invention, and be applied to electronic installation 1000.
Wherein step S10 can be realized by identity recognition device, and step S20 and step S30 can be real by processor 300
It is existing.In other words, identity recognition device is used to identify whether active user is authorized user when detecting pushed information, processing
Device 300 is used for the content for controlling display 200 to show pushed information when active user is authorized user, is non-in active user
During authorized user, prompt pushed information with predetermined manner and hide the content of pushed information.
Processor 300 can be CPU, GPU of electronic installation and any combination of independent image processor.
The existing electronic installation 1000 with communication function, such as mobile phone, would generally show when receiving pushed information
Show the prompt message of information entrance or directly display the detailed content of pushed information.Pushed information includes short message and led in time
Interrogate text, voice, picture and video information of software etc..Title, the phone of transmission information user is generally included in pushed information
The information such as number, image (individual human head picture of Tathagata credit household etc.), read, the detailed content of pushed information is often for the convenience of the user
Also directly shown, these information belong to cellie and carry out the privacy information of credit household, it is necessary to maintain secrecy to prevent other people
Steal.But in some cases, such as owner's mobile phone is used by others, in the case that and for example owner's mobile phone is lost, mobile phone has
Pushed information enter it is fashionable if may cause the information leakage of user if still showing the detailed content of above-mentioned pushed information the problem of,
And if even if the detailed of pushed information can be also immediately seen in being in the lock state there is provided mobile phone after display information details
Content, it might even be possible to carry out prompt operation, such as reply, delete operation.
Referring to Fig. 3, the control method of embodiment of the present invention is monitored in electronic installation 1000, processor 300 on backstage
The entrance state of pushed information, fashionable when there is pushed information to enter, control identity recognition device is opened, and usually, user receives
The information content can be checked after the prompt message that pushed information enters, carries out subsequent operation.In some scenes, electronic installation 1000
In holding state, when pushed information is entered fashionable, display 200 lights display reminding information or other non-privacy promptings, such as
The modes such as breath light, prompt tone or vibration prompt user to have pushed information entrance, by verifying such as iris, fingerprint, face body
Whether part information identification active user is authorized user, is proved to be successful and then determines that active user is authorized user, such as owner's sheet
People.Identity information authentication failed then determines that active user is unauthorized user.When being defined as authorized user, pushed information is shown
Detailed content, and when being defined as unauthorized user, then the detailed content of pushed information is hidden to prevent from being misread by other people
Or maloperation, and such as breath light, prompt tone or vibration mode are prompted in a predefined manner.
In summary, the pushed information processing method and electronic installation 1000 of embodiment of the present invention, when there is pushed information
Enter fashionable, whether the user of identification current operation electronic installation is authorized user, and targetedly makes different disposal, is effectively protected
The privacy of authorized user has been protected, has improved the security of user profile, Consumer's Experience is preferable.
In some embodiments, electronic installation 1000 includes mobile phone, tablet personal computer, notebook computer, intelligent watch, intelligence
Energy bracelet, intelligent helmet, intelligent glasses etc..
Referring to Fig. 4, in some embodiments, step S20 includes step:
S22:Display is controlled to show pop-up window when active user is authorized user;With
S24:Control display shows pushed information in pop-up window.
In some embodiments, step S22 and step S24 can be realized by processor 300.In other words, processor 300
For controlling display 200 to show pop-up window when active user is authorized user and controlling display 200 in pop-up window
Interior display pushed information.
Specifically, after the prompting that pushed information enters is received, user is by authentication and is defined as authorized user, pushes away
The detailed content of breath of delivering letters is shown to facilitate user to consult in predetermined pop-up window.
Referring to Fig. 5, in some embodiments, step S10 comprises the following steps:
S12:Start iris recognition module when detecting pushed information;With
S14:Identify whether active user is authorized user by iris recognition module.
In some embodiments, identity recognition device includes iris identification device 100.Step S12 and step S14 can be with
Realized by processor 300.In other words, processor 300, which is used to work as, has pushed information to enter fashionable startup iris recognition module 100 and controls
Iris recognition module 100 processed identifies whether active user is authorized user.
Specifically, after the prompting of pushed information entrance is received, user lifts electronic installation 1000 close to eyes, checks
Pushed information, electronic installation 1000 enter in the range of the coverage of iris recognition, are used by iris recognition module 100 current
Family identifies.
Iris recognition module 100 is arranged on the preceding surface of electronic installation 1000, such as is arranged at preceding surface top.Iris is known
Other module 100 is arranged in the housing of electronic installation 1000 and exposed from preceding surface.Preceding surface that is to say that electronic installation 1000 is used
In a side surface of display, in other words, in use towards the side surface of user.
During iris recognition, Iris Location is carried out first, can be realized by the inner boundary and external boundary for extracting iris
Positioning to iris.Wherein, the extraction of inner boundary is the grey level histogram by calculating view picture iris image, because gray scale is straight
Square figure has two major peaks, is the scope that pupil region gray scale is concentrated corresponding to first peak value, corresponding to second peak value
It is the scope that iris region gray scale is concentrated, therefore, a binary-state threshold is chosen on the right side of first peak value and to iris figure
As may separate out pupil to extract inner circle border after carrying out binary conversion treatment.The extraction on cylindrical border can use Hough
The method of conversion.Edge extracting is carried out to iris image first by Canny operators, then use can detect to have and wait to shape
The Hough transform of shape object determines the fringing coefficient of iris to extract cylindrical border.Ring is can determine that after determining inside and outside circle border
Shape iris position.Then, the iris after positioning is normalized and image enhancement processing.Wherein, normalized is
Various sizes of iris texture is changed into the region of fixed size by certain mapping (such as polarization coordinate), it is flat so as to eliminate
Move, the influence of rotation, scaling to iris recognition.Image enhancement processing is by partial histogram equalization, that is, passes through point processing
Make the annular iris image after positioning be converted to have in each gray level same pixel point export image, so as to improve by
In caused by uneven illumination is even normalization after picture contrast it is low the problem of.Then, after to normalization and image enhancement processing
Iris image carry out feature extraction and coding.Specifically, wavelet transformation can be used to carry out feature extraction to iris image.2D
Gabor functions can form the small echo of one group of self similarity by scaling, rotation and translation.By 2D Gabor functions and iris image
Pixel be multiplied and integration can produce a series of wavelet coefficients, so as to extract image texture i.e. iris feature information.What coding referred to
It is that Zero-code was carried out to wavelet coefficient to obtain a series of binary coding numerical value.Finally by the rainbow after feature extraction and coding
Film characteristic information is compared with the iris feature information to prestore, specifically, by the feature coding of iris image and the rainbow to prestore
The feature coding of film characteristic information matches so as to determine whether identical iris one by one.The matching of feature coding can use hamming away from
Matching algorithm:Wherein, Ai、BiThe i-th bit code of the feature coding of iris image is represented respectively and is prestored
Iris feature information feature coding i-th bit code, L is characterized the length of coding.To AiAnd BiAfter carrying out XOR processing, obtain
The HD arrived value is smaller, and the matching degree of the feature coding of iris image and the feature coding of the iris feature information to prestore is higher.
In this way, can determine whether iris feature information and that is to say between the iris feature information that prestores authorized user iris information whether
Matching, it is considered as iris recognition in matching and succeeds and determine that the personage is authorized user, and being then defined as that it fails to match is non-
Authorized user.
In some instances, enter fashionable when having listened to pushed information from the background, control iris recognition module 100 is opened, when
After meeting specific requirement such as distance and the angle requirement of iris recognition, then iris recognition is carried out to active user.
In other examples, the startup of iris recognition module 100 can also be triggered by other modes, for example, when push letter
Cease into fashionable, the display 200 of electronic installation 1000 is lit, but still is in the lock state, and user can be by sliding screen
Mode triggers the startup of iris recognition module, in this way, user can control the startup time of iris recognition module 100, that is to say
Human eye starts to reduce the power consumption of iris recognition module 100 after being aligned with iris recognition module 100.
In some embodiments, when electronic installation 1000 is in the state used, display 200 is in and lights shape
State, if now there is pushed information entrance, if directly displaying pushed information, if electronic installation 1000 is used by others, one
Incoming information will be revealed, and two may also be by active user's maloperation, such as replys or delete.
In this scene, when pushed information is entered fashionable, display 200 is first shut off.Iris recognition module 100 is opened,
The identity of active user is identified, if user is authorized user, opening display 200 shows the details of pushed information,
Display 200 is then kept to close if unauthorized user, until iris recognition success or the by other means success of checking identity.
Certainly it also can control pushed information to be hidden in a manner of symbol etc., can completely show and push away after by authentication
Deliver letters the detailed content of breath.
Referring to Fig. 6, in such embodiment, step S20 also includes step:
S26:It is determined that active user be authorized user after, judge whether the iris information of active user disappears;With
S28:Electronic installation is controlled to hide pushed information in iris information message.
In some embodiments, step S26 and step S28 can be realized by processor 300.In other words, processor 300
For it is determined that active user is to judge whether the iris information of active user disappears after authorized user, and in iris information message
When control electronic installation 1000 hide pushed information.
Specifically, after it is determined that active user is authorized user, illustrate before the eyes and electronic installation 1000 of user
Plate distance is within a predetermined range, it is believed that and user had now checked letter prompting, and iris information disappears thereafter,
It is believed that user currently can not in time check or can not handle pushed information, now electronic installation 1000 can control not show push
The detailed content of information, avoid prompt message continuously display and information is read by people, facility is provided for some social scenes.
In some embodiments, user can not make when checking the prompt message of pushed information due to gripping gesture etc.
Effective checking of user identity is carried out with iris recognition module 100, now, the front camera of electronic installation 1000 can be used to adopt
Collecting facial image and carry out recognition of face, it will be understood that the field range of front camera is more than the field range of infrared camera,
The farther facial image in the range of greater angle can be obtained.
Specifically, when carrying out recognition of face, Face datection, pretreatment and feature information extraction need to be carried out to image.Wherein,
Face datection is to detect face part in the position of image, the face classification device trained can be used to be detected.People
Face image pretreatment refers to carrying out light compensation, greyscale transformation, histogram equalization, normalization, geometry school to facial image
Just, the processing such as filtering and sharpening, so as to eliminate the influence of illumination, noise etc..What feature information extraction referred to carries out special to face
Levy the process of modeling.The feature information extraction of face generally includes Knowledge based engineering characterizing method and based on algebraic characteristic or statistics
Two kinds of extracting methods of characterizing method of study.In some instances, Knowledge based engineering characterizing method can be used to carry out face characteristic
Information extraction.Knowledge based engineering characteristic present method mainly according between the shape description of human face and each organ away from
Contribute to the characteristic of face classification from characteristic to obtain, its characteristic component generally includes Euclidean distance between characteristic point, song
Rate and angle etc..By to the structure in face between the local feature of the organ such as eyes, nose, face, chin and each organ
The geometric description of relation, you can extract face characteristic information.After face characteristic information is extracted, by the face characteristic of extraction
Information is compared with the face characteristic information of the authorized user to prestore, thinks to work as when both similarities exceed preset value
Preceding user is authorized user, and similarity is then unauthorized user less than preset value.
In such embodiment, the processing mode of display 200 and pushed information can be found in above-mentioned embodiment
Illustrate, will not be repeated here.
The electronic installation of embodiment of the present invention includes housing, processor, memory, circuit board, power circuit, display
And identity recognition device.Identity recognition device includes iris recognition module.Circuit board is placed in the interior volume that housing surrounds, place
Manage device and memory is set on circuit boards.Power circuit is used to power for each circuit or device of electronic installation.Memory
For storing executable program code.The executable program code that processor is stored by reading in memory is run with that can hold
Program corresponding to line program code is to realize the pushed information processing method of above-mentioned any embodiment of the present invention.In this process
In, processor is used to perform following steps:
Display is controlled to show the content of pushed information when active user is authorized user;With
Pushed information is prompted with predetermined manner and hide the content of pushed information when active user is unauthorized user.
In some embodiments, processor is used to perform following steps:
Display is controlled to show pop-up window when active user is authorized user.
In some embodiments, processor is used to perform following steps:
Display is controlled to show pop-up window when active user is authorized user;With
Control display shows pushed information in pop-up window.
In some embodiments, processor is used to perform following steps:
Start iris recognition module when detecting pushed information.
In some embodiments, processor is used to perform following steps:
It is determined that active user be authorized user after judge whether the iris information of active user disappears;With
Electronic installation is controlled to hide pushed information in iris information message.
It should be noted that the foregoing explanation to pushed information processing method and electronic installation 1000 is also applied for this
The electronic installation of invention embodiment, here is omitted.
The computer-readable recording medium of embodiment of the present invention, have and be stored in instruction therein, when electronic installation
When computing device instructs, electronic installation performs the call processing method of embodiment of the present invention, foregoing to pushed information processing
The explanation of method and electronic installation 1000 is also applied for the computer-readable recording medium of embodiment of the present invention, herein not
Repeat again.
In summary, the electronic installation and computer-readable recording medium of embodiment of the present invention, enter when there is pushed information
Fashionable, whether the user of identification current operation electronic installation is authorized user, and targetedly makes different disposal, effectively protection
The privacy of authorized user, improves the security of user profile, and Consumer's Experience is preferable.
In the description of embodiments of the present invention, it is to be understood that term " center ", " longitudinal direction ", " transverse direction ", " length
Degree ", " width ", " thickness ", " go up ", " under ", " preceding ", " afterwards ", " left side ", " right side ", " vertically ", " level ", " top ", " bottom ", "
Interior ", " outside ", ", the orientation of the instruction such as ", " counterclockwise " or position relationship were to be closed based on orientation shown in the drawings or position clockwise
System, it is for only for ease of description embodiments of the present invention and simplifies description, rather than instruction or the device or member that imply meaning
Part must have specific orientation, with specific azimuth configuration and operation, therefore it is not intended that to embodiments of the present invention
Limitation.
In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance
Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can be expressed or
Implicitly include one or more feature.In the description of embodiments of the present invention, " multiple " are meant that two
Individual or two or more, unless otherwise specifically defined.
, it is necessary to illustrate in the description of embodiments of the present invention, unless otherwise clearly defined and limited, art
Language " installation ", " connected ", " connection " should be interpreted broadly, for example, it may be fixedly connected or be detachably connected, or
It is integrally connected;It can be mechanical connection or electrical connection or can mutually communicate;Can be joined directly together, can also
It is indirectly connected by intermediary, can is connection or the interaction relationship of two elements of two element internals.For this
For the those of ordinary skill in field, above-mentioned term in embodiments of the present invention specific can be understood as the case may be
Implication.
In embodiments of the present invention, unless otherwise clearly defined and limited, fisrt feature second feature it "
" it can directly be contacted including the first and second features under upper " or it ", can also not be directly to connect including the first and second features
Touch but pass through the other characterisation contact between them.Moreover, fisrt feature is in second feature " on ", " top " and "
Face " includes fisrt feature directly over second feature and oblique upper, or to be merely representative of fisrt feature level height special higher than second
Sign.Fisrt feature second feature " under ", " lower section " and " below " include fisrt feature immediately below second feature and it is oblique under
Side, or be merely representative of fisrt feature level height and be less than second feature.
Above disclosure provides many different embodiments or example is used for realizing embodiments of the present invention not
Same structure.In order to simplify the disclosure of embodiments of the present invention, above the part and setting of specific examples are described.When
So, they are only example, and purpose does not lie in the limitation present invention.In addition, embodiments of the present invention can be in different examples
Repeat reference numerals and/or reference letter in son, this repetition are for purposes of simplicity and clarity, itself not indicate to be begged for
By the relation between various embodiments and/or setting.In addition, the various specific techniques that embodiments of the present invention provide
With the example of material, but those of ordinary skill in the art can be appreciated that the application of other techniques and/or making for other materials
With.
In the description of this specification, reference term " embodiment ", " some embodiments ", " schematically implementation
The description of mode ", " example ", " specific example " or " some examples " etc. means the tool with reference to the embodiment or example description
Body characteristicses, structure, material or feature are contained at least one embodiment or example of the present invention.In this manual,
Identical embodiment or example are not necessarily referring to the schematic representation of above-mentioned term.Moreover, the specific features of description, knot
Structure, material or feature can combine in an appropriate manner in any one or more embodiments or example.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include
Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize specific logical function or process
Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system including the system of processing module or other can be from instruction
The system of execution system, device or equipment instruction fetch and execute instruction) use, or combine these instruction execution systems, device or
Equipment and use.For the purpose of this specification, " computer-readable medium " can be it is any can include, store, communicating, propagating or
Transmission program uses for instruction execution system, device or equipment or with reference to these instruction execution systems, device or equipment
Device.The more specifically example (non-exhaustive list) of computer-readable medium includes following:With one or more wiring
Electrical connection section (electronic installation), portable computer diskette box (magnetic device), random access memory (RAM), read-only storage
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device, and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium, which can even is that, to print the paper of described program thereon or other are suitable
Medium, because can then enter edlin, interpretation or if necessary with it for example by carrying out optical scanner to paper or other media
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of embodiments of the present invention can be with hardware, software, firmware or combinations thereof come real
It is existing.In the above-described embodiment, multiple steps or method can use storage in memory and by suitable instruction execution system
The software or firmware of execution is realized.If for example, being realized with hardware, with another embodiment, ability can be used
Any one of following technology known to domain or their combination are realized:With for realizing logic function to data-signal
The discrete logic of logic gates, there is the application specific integrated circuit of suitable combinational logic gate circuit, programmable gate array
(PGA), field programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries
Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium
In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in various embodiments of the present invention can be integrated in a processing module, also may be used
To be that unit is individually physically present, can also two or more units be integrated in a module.It is above-mentioned integrated
Module can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module
If realized in the form of software function module and as independent production marketing or in use, a calculating can also be stored in
In machine read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..
Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, changed, replacing and modification.
Claims (11)
- A kind of 1. pushed information processing method, for electronic installation, it is characterised in that comprise the following steps:When detecting pushed information, whether identification active user is authorized user;The content of the pushed information is shown when the active user is the authorized user;WithWhen the active user is unauthorized user, prompts the pushed information with predetermined manner and hide the pushed information Content.
- 2. pushed information processing method as claimed in claim 1, it is characterised in that described information includes short message and/or is When bitcom text, voice and/or video information.
- 3. pushed information processing method as claimed in claim 1, it is characterised in that described when the active user awards to be described Show that the content step of the pushed information comprises the following steps when weighing user:The display of the electronic installation is controlled to show pop-up window when the active user is the authorized user;WithThe pushed information is shown in the pop-up window by the display.
- 4. pushed information processing method as claimed in claim 1, it is characterised in that the electronic installation includes iris recognition mould Group, it is described to identify that the step of whether active user is authorized user comprises the following steps when detecting pushed information:Start the iris recognition module when detecting pushed information;WithIdentify whether the active user is the authorized user by the iris recognition module.
- 5. pushed information processing method as claimed in claim 4, it is characterised in that described when the active user awards to be described The step of showing the content of the pushed information when weighing user comprises the following steps:It is determined that the active user be the authorized user after, judge whether the iris information of the active user disappears;WithThe electronic installation is controlled to hide the pushed information in the iris information message.
- 6. a kind of electronic installation, it is characterised in that the electronic installation includes display, identity recognition device and processor;The identity recognition device is used to identify whether active user is authorized user when detecting pushed information;The processor is used to control the display to show the push letter when the active user is the authorized user The content of breath;WithThe processor is additionally operable to when the active user is unauthorized user, with predetermined manner prompt the pushed information and Hide the content of the pushed information.
- 7. electronic installation as claimed in claim 6, it is characterised in that the processor is used for when the active user is described The display is controlled to show pop-up window during authorized user;The display is used to show the pushed information in the pop-up window.
- 8. electronic installation as claimed in claim 6, it is characterised in that the identity recognition device includes iris recognition module, The processor is used for:Start the iris recognition module when detecting pushed information;The iris recognition module is used to identify whether the active user is the authorized user.
- 9. electronic installation as claimed in claim 8, it is characterised in that the processor is additionally operable to:It is determined that the active user be the authorized user after, judge whether the iris information of the active user disappears;WithThe electronic installation is controlled to hide the pushed information in the iris information message.
- 10. a kind of electronic installation, it is characterised in that including housing, processor, memory, circuit board, power circuit, display And identity recognition device, it is characterised in that the identity recognition device includes iris recognition module, and the circuit board is placed in institute The interior volume that housing surrounds is stated, the processor and the memory are arranged on the circuit board;The power circuit, use In each circuit or the device power supply for the electronic installation;The memory is used to store executable program code;The place Reason device is run corresponding with the executable program code by reading the executable program code stored in the memory Program, for performing the pushed information processing method as any one of claim 1 to 5.
- 11. a kind of computer-readable recording medium, have and be stored in instruction therein, when described in the computing device of electronic installation During instruction, the pushed information processing method in the electronic installation perform claim requirement 1 to 5 described in any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710508415.3A CN107395865A (en) | 2017-06-28 | 2017-06-28 | Pushed information processing method and electronic installation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710508415.3A CN107395865A (en) | 2017-06-28 | 2017-06-28 | Pushed information processing method and electronic installation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107395865A true CN107395865A (en) | 2017-11-24 |
Family
ID=60333897
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710508415.3A Pending CN107395865A (en) | 2017-06-28 | 2017-06-28 | Pushed information processing method and electronic installation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107395865A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109005102A (en) * | 2018-06-21 | 2018-12-14 | Oppo(重庆)智能科技有限公司 | Information processing method, device and electronic device |
CN110209950A (en) * | 2019-06-11 | 2019-09-06 | 北京金山安全软件有限公司 | Display method and device of push information, electronic equipment and storage medium |
CN111666014A (en) * | 2020-07-06 | 2020-09-15 | 腾讯科技(深圳)有限公司 | Message pushing method, device, equipment and computer readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016188154A1 (en) * | 2015-05-26 | 2016-12-01 | 中兴通讯股份有限公司 | Method and device for image processing |
CN106210293A (en) * | 2016-06-30 | 2016-12-07 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
CN106231115A (en) * | 2016-08-29 | 2016-12-14 | 深圳市金立通信设备有限公司 | A kind of information protecting method and terminal |
CN106407771A (en) * | 2016-08-24 | 2017-02-15 | 广东欧珀移动通信有限公司 | Message management method and device |
-
2017
- 2017-06-28 CN CN201710508415.3A patent/CN107395865A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016188154A1 (en) * | 2015-05-26 | 2016-12-01 | 中兴通讯股份有限公司 | Method and device for image processing |
CN106210293A (en) * | 2016-06-30 | 2016-12-07 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
CN106407771A (en) * | 2016-08-24 | 2017-02-15 | 广东欧珀移动通信有限公司 | Message management method and device |
CN106231115A (en) * | 2016-08-29 | 2016-12-14 | 深圳市金立通信设备有限公司 | A kind of information protecting method and terminal |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109005102A (en) * | 2018-06-21 | 2018-12-14 | Oppo(重庆)智能科技有限公司 | Information processing method, device and electronic device |
CN110209950A (en) * | 2019-06-11 | 2019-09-06 | 北京金山安全软件有限公司 | Display method and device of push information, electronic equipment and storage medium |
CN111666014A (en) * | 2020-07-06 | 2020-09-15 | 腾讯科技(深圳)有限公司 | Message pushing method, device, equipment and computer readable storage medium |
CN111666014B (en) * | 2020-07-06 | 2024-02-02 | 腾讯科技(深圳)有限公司 | Message pushing method, device, equipment and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200134954A1 (en) | Access control methods and apparatuses, systems, electronic devices, programs, and medium | |
CN107465809A (en) | Verification method and terminal | |
US20030120934A1 (en) | Random biometric authentication apparatus | |
CN101494690A (en) | Mobile terminal and unlocking method thereof | |
CN108171137B (en) | Face recognition method and system | |
WO2018031412A1 (en) | Parcel theft deterrence for audio/video recording and communication devices | |
SE1451336A1 (en) | Enrolling templates for biometric authentication | |
CN107395862A (en) | Call processing method, electronic installation and computer-readable recording medium | |
CN107395865A (en) | Pushed information processing method and electronic installation | |
CN111695099A (en) | Security system and corresponding access method, machine readable storage device | |
CN101051345A (en) | Non-contact type identifier for personal identity | |
Abdullah et al. | Smart card with iris recognition for high security access environment | |
CN206258874U (en) | A kind of subscriber authentication device | |
CN108647650B (en) | Human face in-vivo detection method and system based on corneal reflection and optical coding | |
CN117853103A (en) | Payment system activation method based on intelligent bracelet | |
CN203552331U (en) | Intelligent identification door control system | |
KR102197334B1 (en) | Method for verifying Identification card using neural network and server for the method | |
CN107368726A (en) | The unlocking method and terminal of terminal | |
CN107358080A (en) | The social networking application software login method and terminal of terminal | |
CN107369141A (en) | U.S. face method and electronic installation | |
CN116805436A (en) | Intelligent access control, control system and control method | |
CN111105538A (en) | Door lock control method based on face recognition and door lock | |
CN104809781A (en) | Access control system based on fingerprint recognition and face recognition | |
US10867022B2 (en) | Method and apparatus for providing authentication using voice and facial data | |
CN107391986A (en) | The unlocking method and terminal of terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: Guangdong OPPO Mobile Communications Co., Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171124 |
|
RJ01 | Rejection of invention patent application after publication |