CN109063505A - A kind of method for secret protection, terminal and computer readable storage medium - Google Patents

A kind of method for secret protection, terminal and computer readable storage medium Download PDF

Info

Publication number
CN109063505A
CN109063505A CN201810713373.1A CN201810713373A CN109063505A CN 109063505 A CN109063505 A CN 109063505A CN 201810713373 A CN201810713373 A CN 201810713373A CN 109063505 A CN109063505 A CN 109063505A
Authority
CN
China
Prior art keywords
region
image
privacy
image data
common
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810713373.1A
Other languages
Chinese (zh)
Inventor
李�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201810713373.1A priority Critical patent/CN109063505A/en
Publication of CN109063505A publication Critical patent/CN109063505A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method for secret protection, terminal and computer readable storage mediums; the method for secret protection is by judging whether to receive the outgoing instructions for destination image data; when receiving the outgoing instructions of destination image data; according to preset rules by the corresponding region division of the destination image data be common image region and privacy image-region; and then the corresponding common image data in common image region are obtained, common image data are subjected to outgoing.It solves and is not intended to leakage user privacy information in outgoing image in the prior art, cause the problem that user experience is low.The invention also discloses a kind of terminal and computer readable storage mediums; by implementing above scheme; in target image outgoing; outgoing is carried out only for the common image data of the target image; that is privacy image data is without outgoing; the privacy of user is protected, it is more humanized, substantially increase the experience satisfaction of user.

Description

A kind of method for secret protection, terminal and computer readable storage medium
Technical field
The present invention relates to secret protection technical fields, more specifically to a kind of method for secret protection, terminal and calculating Machine readable storage medium storing program for executing.
Background technique
With the development of terminal technology and Internet technology, terminal has become indispensable in people's life one Point, user installs various third-party applications and service software at the terminal to meet daily life demand.It retouches for convenience It states, above-mentioned terminal takes the mobile phone as an example, currently, camera is liked that user is in work as a critical function of mobile phone by user deeply It is higher and higher using the frequency of camera to make the various scenes of life, such as Video chat, by the photo upload of shooting into circle of friends Etc., however, the probability for revealing privacy-sensitive information unintentionally by image is got over during Video chat or upload pictures Come it is bigger, such as: enterprise and external collaborator carry out surprisingly disclosing the privacy write on background blank when Video chat Receipt photo on sensitive information and small to one desk can also capture neighbouring job documentation information, or from The image that user uploads to circle of friends can also capture privacy information therein.It can be seen that in the prior art in outgoing The case where leakage user privacy information is not intended to when image is generally existing, greatly reduces the experience satisfaction of user.
Summary of the invention
The technical problem to be solved in the present invention is that solving in the prior art, in outgoing image, leakage user is hidden unintentionally Personal letter breath, causes the problem that user experience is low.For the technical problem, a kind of method for secret protection, terminal and calculating are provided Machine readable storage medium storing program for executing.
In order to solve the above technical problems, the present invention provides a kind of method for secret protection, the method for secret protection includes:
Judge whether to receive the outgoing instructions for destination image data;
If so, according to preset rules by the corresponding region division of the destination image data be common image region and privacy Image-region;
The corresponding common image data in the common image region are obtained, the common image data are subjected to outgoing.
Optionally, before the progress outgoing by the common image data, further includes:
Obtain the common image region and the privacy image-region;
The common image region and the privacy image-region are shown with different display modes, to distinguish State common image region and the privacy image-region.
Optionally, described to show in the common image region and the privacy image-region with different display modes Show, comprising:
The common image region is directly carried out to show and show after handling the privacy image-region;
Or,
The privacy image-region is directly carried out to show and show after handling the common image region;
Or,
It is shown after carrying out different processing respectively to the common image region and the privacy image-region.
Optionally, before the progress outgoing by the common image data, further includes:
The corresponding privacy image data of the privacy image-region is obtained, is deposited after being encrypted to the privacy image data Storage.
Optionally, the destination image data includes at least one of dynamic image data, static image data.
Optionally, when the target image includes dynamic image data, the dynamic image data includes:
The image data got in real time during video;
Or,
Stored video image data in terminal.
Optionally, it is described according to preset rules by the corresponding region division of the destination image data be common image region With privacy image-region, comprising:
Judge in the destination image data with image recognition technology with the presence or absence of the image in default common image table;
If so, the region where the image identified is determined as common image region, the common image area will be removed Other regions except domain are as privacy image-region;
Or,
Judge in the destination image data with image recognition technology with the presence or absence of the image in default privacy image table;
If so, the region where the image identified is determined as privacy image-region, the privacy image district will be removed Other regions except domain are as common image region.
Optionally, it is described according to preset rules by the corresponding region division of the destination image data be common image region With privacy image-region, comprising:
The privacy image-region setting operation that user issues is received, it is hidden that operation determination is arranged according to the privacy image-region Private image-region, using other regions in addition to the privacy image-region as common image region;
Or,
The common image region setting operation that user issues is received, is determined according to common image region setting operation public Image-region altogether, using other regions in addition to the common image region as privacy image-region.
Further, the present invention also provides a kind of terminal, the terminal includes processor, memory and communication bus;
The communication bus is for realizing the connection communication between processor and memory;
The processor is for executing one or more program stored in memory, to realize described in any of the above-described Method for secret protection the step of.
Further, the present invention also provides a kind of computer readable storage medium, the computer readable storage mediums It is stored with one or more program, one or more of programs can be executed by one or more processor, to realize The step of method for secret protection as described in any one of the above embodiments.
Beneficial effect
The present invention provides a kind of method for secret protection, terminal and computer readable storage medium, and the method for secret protection is logical The outgoing instructions for judging whether to receive for destination image data are crossed, when receiving the outgoing instructions of destination image data, By the corresponding region division of the destination image data it is common image region and privacy image-region according to preset rules, and then obtains The corresponding common image data in common image region are taken, common image data are subjected to outgoing.It solves in the prior art outside It is not intended to leakage user privacy information when sending out image, causes the problem that user experience is low.Namely in the present invention, in target image When outgoing, outgoing is carried out only for the common image data of the target image, i.e. privacy image data is protected without outgoing The privacy of user, it is more humanized, substantially increase the experience satisfaction of user.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware structural diagram of Fig. 1 each embodiment one optional terminal to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the basic procedure schematic diagram for the method for secret protection that first embodiment of the invention provides;
Fig. 4 is that one kind that first embodiment of the invention provides feasible determines common image region with image recognition technology With the basic procedure schematic diagram of privacy image-region;
Fig. 5 is that the another kind that first embodiment of the invention provides feasible determines common image area with image recognition technology The basic procedure schematic diagram in domain and privacy image-region;
Fig. 6 is that feasible be arranged according to privacy image-region of one kind that first embodiment of the invention provides operates determining privacy The interface schematic diagram of image-region and common image region;
Fig. 7 is that the another kind that first embodiment of the invention provides is feasible hidden according to the setting operation determination of privacy image-region The interface schematic diagram of private image-region and common image region;
Fig. 8 be first embodiment of the invention provide by common image data carry out outgoing before, to common image region The basic procedure schematic diagram shown with privacy image-region;
Fig. 9 is the interface schematic diagram for the user setting privacy image data password that first embodiment of the invention provides;
Figure 10 is a kind of basic procedure schematic diagram for specific method for secret protection that second embodiment of the invention provides;
Figure 11 is the terminal structure schematic diagram that third embodiment of the invention provides;
Figure 12 is a kind of basic procedure schematic diagram for specific method for secret protection that third embodiment of the invention provides.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal is described in the present invention to be implemented in a variety of manners.For example, terminal may include smartwatch, intelligent hand Ring, pedometer etc..
It will be illustrated by taking terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to being used in particular for Except the element of mobile purpose, the construction of embodiment according to the present invention can also apply to various types of terminals.
Referring to Fig. 1, a kind of hardware structural diagram of its terminal of each embodiment to realize the present invention, the terminal 100 may include: RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, storage The components such as device 109, processor 110 and power supply 111.It will be understood by those skilled in the art that terminal structure shown in Fig. 1 The not restriction of structure paired terminal, terminal may include than illustrating more or fewer components, perhaps combine certain components or Different component layouts.
It is specifically introduced below with reference to all parts of the Fig. 1 to terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, radio frequency list Uplink information can be sent to base station by member 101, after the downlink information that in addition can also be sent base station receives, be sent to terminal Processor 110 handle, base station to the downlink information that radio frequency unit 101 is sent can be according to radio frequency unit 101 transmission it is upper What row information generated, it is also possible to after the information update for detecting terminal actively to the push of radio frequency unit 101, for example, After detecting that geographical location locating for terminal changes, base station can send geographical location to the radio frequency unit 101 of terminal and become The message informing can be sent to the processing of terminal after receiving the message informing by the message informing of change, radio frequency unit 101 The processing of device 110, the processor 110 of terminal can control the message informing and be shown on the display panel 1061 of terminal;In general, penetrating Frequency unit 101 includes but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer Deng.In addition, radio frequency unit 101 can also be communicated with network and other equipment by wireless communication, it specifically may include: to pass through Wireless communication and the server communication in network system, for example, terminal can download file from server by wireless communication Resource, for example application program can be downloaded from server, after terminal completes the downloading of a certain application program, if server In the corresponding file resource of the application program update, then the server can be by wireless communication to terminal push resource updates Message informing, to remind user to be updated the application program.Any communication standard or association can be used in above-mentioned wireless communication View, including but not limited to GSM (Global System of Mobile communication, global system for mobile communications), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronics postal by WiFi module 102 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 is shown WiFi module 102, but it is understood that, and it is not belonging to must be configured into for terminal, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Audio output unit 103 can be in call signal reception pattern, call mode, logging mode, language in terminal 100 It is radio frequency unit 101 or WiFi module 102 is received or depositing when under the isotypes such as sound recognition mode, broadcast reception mode The audio data stored in reservoir 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 may be used also To provide audio output relevant to the specific function that terminal 100 executes (for example, call signal receives sound, message sink sound Sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model. Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjusts the brightness of display panel 1061, and proximity sensor can close display panel when terminal 100 is moved in one's ear 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Also as mobile phone Configurable fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, temperature The other sensors such as meter, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, specifically, active matrix organic light-emitting diode (ActiveMatrix/Organic can be used Light-Emitting Diode, AMOLED), the shapes such as passive organic electric exciting light-emitting diode (Passive matrix OLED) Formula configures display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 107 may include touch panel 1071 and its His input equipment 1072.Touch panel 1071, also referred to as touch screen collect the touch operation (ratio of user on it or nearby Such as user is using finger, stylus any suitable object or attachment on touch panel 1071 or near touch panel 1071 Operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detecting apparatus With two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation bring Signal transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and it is converted At contact coordinate, then processor 110 is given, and order that processor 110 is sent can be received and executed.Furthermore, it is possible to adopt Touch panel 1071 is realized with multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be the function that outputs and inputs of realizing terminal as two independent components, but in some embodiments it is possible to will Touch panel 1071 and display panel 1061 integrate and realize the function that outputs and inputs of terminal, specifically herein without limitation.Than Such as, when receiving the message informing of a certain application program by radio frequency unit 101, processor 110 be can control the message Notice is shown in a certain predeterminable area of display panel 1061, a certain region pair of the predeterminable area and touch panel 1071 It answers, it, can be to being shown in corresponding region on display panel 1061 by carrying out touch control operation to a certain region of touch panel 1071 Message informing controlled.
Interface unit 108 be used as at least one external device (ED) connect with terminal 100 can by interface.For example, external Device may include wired or wireless wear-type terminal prot, external power supply (or battery charger) port, wired or wireless number According to port, memory card port, port, the port audio input/output (I/O), view for connecting the device with identification module The port frequency I/O, terminal prot etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, data are believed Breath, electric power etc.) and by one or more elements that the input received is transferred in terminal 100 or can be used at end Data are transmitted between end 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal, utilizes each portion of various interfaces and the entire mobile terminal of connection Point, by running or execute the software program and/or module that are stored in memory 109, and calls and be stored in memory 109 Interior data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 110 may include One or more processing units;Preferably, processor 110 can integrate application processor and modem processor, wherein application The main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.It can With understanding, above-mentioned modem processor can not also be integrated into processor 110.
Terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 can be with It is logically contiguous by power-supply management system and processor 110, thus by power-supply management system realize management charging, electric discharge, with And the functions such as power managed.
Although Fig. 1 is not shown, terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, the communications network system being based below to terminal of the invention are retouched It states.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, after UE201 is connect with eNodeB2021, can receive To the PUSH message notice sent by eNodeB2021, eNodeB2021 may be coupled to EPC203, and eNodeB2021 can be mentioned For the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the present invention is proposed.
First embodiment
Leakage user privacy information is not intended in outgoing image in the prior art in order to solve, causes user experience low The problem of.A kind of method for secret protection is present embodiments provided, this method passes through by judging whether to receive for target figure As the outgoing instructions of data, when receiving the outgoing instructions of destination image data, according to preset rules by the target image number It is common image region and privacy image-region according to corresponding region division, and then obtains the corresponding public figure in common image region As data, common image data are subjected to outgoing.It specifically may refer to shown in Fig. 3, Fig. 3 is secret protection provided in this embodiment Method basic flow chart, the method for secret protection include:
S301: judge whether to receive the outgoing instructions for destination image data;
If so, S302 is executed, if it is not, continuing to execute S301.
Firstly, it is necessary to explanation, in the present embodiment, target image includes but is not limited to two dimensional image, three-dimensional figure Picture, it is to be understood that two dimensional image includes texture and luminance information, and 3-D image includes texture, luminance information and depth Information.It will be clear that target image includes at least one of two dimensional image, 3-D image or combining form, for example, mesh Logo image includes two dimensional image or target image includes 3-D image or target image includes two dimensional image, 3-D image.Value It is noted that be only illustrated so that target image includes two dimensional image, 3-D image both common images as an example here, In practical applications, adaptation adjustment need to be done as the case may be.
Secondly, it should be noted that in the present embodiment, destination image data includes but is not limited to dynamic image number According to, static image data, it is to be understood that video by continuous image form namely video in contain multiple image, What dynamic image data generally referred to as a result, is multiple image datas, and in some embodiments, dynamic image data can be The image data got in real time during video, certainly, in some other embodiment, dynamic image data is also possible to end The video image data for having shot and having stored on end.It is understood that static image data generally referred to is individual figure As data, i.e. static image data is the image data for having shot and having stored in terminal.It will be clear that target image number According to including at least one of dynamic image data, static image data or combining form.It is worth noting that, here only with mesh Logo image data include being illustrated for dynamic image data, static image data both common images, are actually being answered In, adaptation adjustment need to be done as the case may be.
It in order to better understand the present invention, with destination image data include still here dynamic image data, still image number It is illustrated for, in some embodiments, what outgoing referred to is that will be sent to other terminals outside dynamic image, for example, wechat Video chat, QQ Video chat, TV news etc., what certain outgoing was also refer to is that will be sent in network outside dynamic image, example Such as, video is sent in circle of friends, video is sent in QQ space etc.;In some other embodiment, outgoing is referred to Be by still image to other terminals, for example, photo is sent to friend in wechat chat, what certain outgoing was also refer to be will It is sent in network outside still image, for example, photo is sent in circle of friends;In further embodiments, it can also be user A Photo, video etc. are mutually passed by bluetooth with user B.It is worth noting that, above-mentioned cited only some common scenes, this Invention is not limited to above-mentioned cited scene, in practical applications, adaptation adjustment need to be done according to concrete scene.
It will be clear that in the present embodiment, it is necessary first to judge whether to receive for the outer of destination image data Send instructions, it, need to be corresponding by destination image data according to preset rules when receiving the outgoing instructions for destination image data Region division be common image region and privacy image-region, for example, when receive open video instruction, that is, represent this When to carry out video with other side, namely at this time before it will issue other side outside video, will first be got in real time according to preset rules Region division where destination image data is common image region and privacy image-region.
S302: according to preset rules by the corresponding region division of destination image data be common image region and privacy image Region.
In the present embodiment, according to preset rules by the corresponding region division of destination image data be common image region and Privacy image-region includes at least following two situation.
The corresponding region division of destination image data is common image region and hidden with image recognition technology by situation one Private image-region includes at least following two mode.
Mode one, referring specifically to Fig. 4:
S401: judge in destination image data with image recognition technology with the presence or absence of the figure in default common image table Picture;
If so, S402 is executed, if it is not, continuing to execute S401.
It is understood that can store in advance default common image table in terminal, the default common image table is by user Flexible setting is carried out according to demand, for example, user A is when with user's B Video chat, the default common image table of user A setting In image be user A namely user A during with user's B Video chat, it is desirable to user B is seen during Video chat The only user A arrived;Or user C uploads a photo into circle of friends, in the default common image table of user setting Image be only personage that any personage namely user C wish that other people see in this photo uploaded.
S402: being determined as common image region for the region where the image identified, will except common image region it Other outer regions are as privacy image-region.
It will be clear that being judged in destination image data by image recognition technology with the presence or absence of default common image table In image will be where the image that identified if there is the image in default common image table in destination image data Region is determined as common image region, using other regions in addition to common image region as privacy image-region.For example, holding Above-mentioned example is connect, if identifying user A by image recognition technology, the region where user A is determined as common image at this time Region, using other regions in addition to common image region as privacy image-region, that user B can see at this time is only user The region A, other regions are invisible;Or it sets and identifies that there are personage C, personage D, people in photo by image recognition technology Region where personage C, personage D, personage E is determined as common image region at this time by object E, will be in addition to common image region Other regions as privacy image-region, at this time other people can see being personage C from photo, personage D, the location personage E Domain, other regions are invisible.
It is worth noting that, image recognition technology can use existing arbitrary image recognition technology, such as recognition of face Technology etc., it is to be understood that the emphasis of image recognition technology and non-present invention, herein without elaborating.
Mode two, referring specifically to Fig. 5:
S501: judge in destination image data with image recognition technology with the presence or absence of the figure in default privacy image table Picture;
If so, S502 is executed, if it is not, continuing to execute S501.
It is understood that can store in advance default privacy image table in terminal, the default privacy image table is by user Flexible setting is carried out according to demand, for example, user A is when with user's B Video chat, the default privacy image table of user A setting In image be background image namely user A during with user's B Video chat, it is desirable to user B is during Video chat The only user A seen, it is invisible for background image;Or user C uploads a photo into circle of friends, Yong Hushe The image in default privacy image table set is that personage D namely user C wishes that personage D is invisible in this photo uploaded.
S502: being determined as privacy image-region for the region where the image identified, will except privacy image-region it Other outer regions are as common image region.
It will be clear that being judged in destination image data by image recognition technology with the presence or absence of default privacy image table In image will be where the image that identified if there is the image in default privacy image table in destination image data Region is determined as privacy image-region, using other regions in addition to privacy image-region as privacy image-region.For example, holding Above-mentioned example is connect, if identifying background image by image recognition technology, is at this time determined as the region where background image hidden Private image-region, using other regions in addition to background image region as common image region, user B can see at this time Be only the region user A, background image region is invisible;Or it sets and identifies in photo exist by image recognition technology Region where personage D is determined as privacy image-region at this time by personage D, by other regions in addition to the region personage D As common image region, other people can see being other regions in addition to personage D from photo at this time.
Situation two, the privacy issued according to user/common image region setting are operated the corresponding area of destination image data Domain is divided into common image region and privacy image-region, includes at least following two mode.
Mode one: receiving the privacy image-region setting operation that user issues, true according to the setting operation of privacy image-region Privacy image-region is determined, using other regions in addition to privacy image-region as common image region.
It is understood that the privacy image-region setting operation reference that user issues is that user draws a circle to approve out privacy image Region that is to say the privacy image-region that user draws a circle to approve out, other people are invisible, other regions in addition to privacy image-region are made For common image region, other people are visible.For example, with reference to shown in Fig. 6, rectangular area 601 is the privacy image district that user draws a circle to approve out Domain, the region is invisible, and other regions 602 in addition to region 601 are common image region, and the region is visible.It should be bright True, the figure drawn a circle to approve out can be regular figure, for example, rectangle, square, ellipse, or the figure drawn a circle to approve out can also For irregular image, delineation figure is not defined herein, in practical applications, the specific privacy figure that need to be issued according to user Subject to the setting operation of region.
Mode two: receiving the common image region setting operation that user issues, true according to the setting operation of common image region Common image region is determined, using other regions in addition to common image region as privacy image-region.It is understood that with What the common image region setting operation that family issues referred to is that user draws a circle to approve out common image region, that is to say what user drew a circle to approve out Common image region, as it can be seen that other regions in addition to common image region are as privacy image-region, other people can not for other people See.For example, with reference to shown in Fig. 7, elliptical region 701 is the common image region that user draws a circle to approve out, and the region is as it can be seen that and remove area Other regions 702 except domain 701 are privacy image-region, and the region is invisible.
It is only two kinds of common privacy image-regions and common image region it is worth noting that, recited herein, In practical application, adaptation adjustment need to be done as the case may be.Simultaneously, it should be noted that above-mentioned introduction is some common Be by the corresponding region division of destination image data common image region and privacy image-region mode, the present invention not office It is limited to these cited modes, as long as in fact, belonging to can be common image area by the corresponding region division of logo image data The mode of domain and privacy image-region is within the scope of the invention.
S303: obtaining the corresponding common image data in common image region, and common image data are carried out outgoing.
In the present embodiment, at least further comprising the steps of before common image data being carried out outgoing, referring specifically to figure Shown in 8.
S801: common image region and privacy image-region are obtained.
It is understood that before common image data are carried out outgoing, it can also be to common image region and privacy Image-region is shown, to facilitate user to check, preferably knows common image region and the privacy in target image Image-region then needs to obtain common image region and privacy image-region at this time.
S802: common image region and privacy image-region are shown with different display modes, public to distinguish Image-region and privacy image-region.
It is understood that in the present embodiment, by common image region and privacy image-region with different display sides Formula is shown, specifically, common image region can directly be carried out showing and handle to privacy image-region laggard Row display, or privacy image-region can directly be carried out showing and be shown after handling common image region, Or shown after different processing can also being carried out respectively to common image region and privacy image-region, it is public to distinguish Image-region and privacy image-region.
It will be clear that display mode includes but is not limited to transparency setting, mosaic, color change, specifically, When common image region is directly shown, shown after to privacy image-region, transparency 50% is set, or will be public Image-region show after mosaic blocks to privacy image-region when directly being shown altogether, or by common image area When domain is directly shown, display etc. after the color of privacy image-region is configured, when privacy image-region is direct It carries out showing and carry out after handling common image region display and to common image region and privacy image-region point Do not carry out being shown after different processing can no longer be repeated one by one here using above-mentioned display mode.It is worth noting , it is only the explanation carried out by taking some common display modes as an example here, the invention is not limited to these cited Display mode, as long as in fact, the scope for belonging to display mode is within the scope of the invention.
It in the present embodiment, further include that acquisition privacy image-region institute is right before common image data are carried out outgoing The privacy image data answered stores after encrypting to the privacy image data, this mode further improves privacy guarantor The safety of shield is directly viewable the privacy image after preventing other people from getting terminal.It is understood that Encryption Algorithm can be selected The existing any particular algorithms for improving privacy image data carry out flexible setting by developer, certainly may be used in practical applications To carry out flexible setting by user, for example, with reference to shown in Fig. 9, the interface of password setting is carried out to privacy image data for user. It is understood that the case where user's customized setting password is directed to the photo or video that need to be stored at the terminal, work as input When proper password, privacy image-region can be seen, namely can see complete target image, when input error password, Just it can not see privacy image-region, namely can only see the common image region in target image.
Finally, it should be noted that when detecting a labeled region, no matter the labeled region is open Image-region or privacy image-region can highlight in advance the region and track to it when occurring next time, namely The knowledge can be skipped in the image data for needing to identify it, but occurring later in the image data that its first time occurs Other process judges that it belongs to privacy image-region or public image area according to the memory function identified and stored for the first time Resource needed for terminal recognition is saved with this in domain.
A kind of method for secret protection is present embodiments provided, the method for secret protection is by judging whether to receive for mesh The outgoing instructions of logo image data, when receiving the outgoing instructions of destination image data, according to preset rules by the target figure The corresponding region division of picture data is common image region and privacy image-region, and then obtains the corresponding public affairs in common image region Common image data are carried out outgoing by image data altogether.Solve in the prior art in outgoing image be not intended to leakage user it is hidden Personal letter breath, causes the problem that user experience is low.Namely in the present embodiment, in target image outgoing, only for the target The common image data of image carry out outgoing, i.e. privacy image data protects the privacy of user, more human nature without outgoing Change, substantially increases the experience satisfaction of user.
It meanwhile in the present embodiment, will also be public before the common image data in destination image data are carried out outgoing Image-region and privacy image-region are shown altogether with different display modes, in order to which user preferably distinguishes common image Region and privacy image-region, and stored after also being encrypted to the privacy image data in destination image data, it mentions significantly The high safety of privacy image data, further improves the experience satisfaction of user.
Second embodiment
The present embodiment is made by taking a kind of specific method for secret protection as an example to the present invention on the basis of first embodiment It further illustrates, referring specifically to shown in Figure 10.
S1001: judge whether to receive the outgoing instructions for destination image data;
If so, S1002 is executed, if it is not, continuing to execute S1001.
If user A and user B open Video chat, i.e., user B will receive the target image of user's A this side at this time Data, namely the outgoing instructions for destination image data are had received at this time, execute S1002.
S1002: judge in destination image data with identification image technique with the presence or absence of the figure in default common image table Picture;
If so, S1003 is executed, if it is not, continuing to execute S1002.
Example in undertaking, further, if the image in the common image table of user A setting is user A image, at this time Determine then to execute S1003 there are user A in destination image data with identification image technique.
S1003: being determined as common image region for the region where the image identified, will except common image region it Other outer regions are as privacy image-region.
Region where user A is further determined as common image region by example in undertaking, by the region user A Except other regions as privacy image-region.
S1004: common image region and privacy image-region are obtained.
Example in undertaking further obtains above-mentioned ready-portioned common image region and privacy image-region.
S1005: common image region and privacy image-region are shown with different display modes.
Example in undertaking further directly shows in common image region (region where A), to privacy image It is shown after region setting transparency 40%, is common image region and privacy image-region in order to which what user A distinguishes.
S1006: obtaining the corresponding common image data in common image region, and common image data are carried out outgoing.
Example in undertaking further obtains common image region (region where A) corresponding common image data, will It is sent to user B outside the corresponding common image data in region where user A, user B sees during Video chat at this time Region only where user A, other regions are invisible.
Method for secret protection provided in this embodiment, which, which passes through to work as, receives the outer of destination image data When sending instructions, according to preset rules by the corresponding region division of the destination image data be common image region and privacy image district Domain, and then the corresponding common image data in common image region are obtained, common image data are subjected to outgoing.Solves existing skill Leakage user privacy information is not intended in art in outgoing image, causes the problem that user experience is low.Namely in the present embodiment, In target image outgoing, only for the target image common image data carry out outgoing, i.e., privacy image data without Outgoing protects the privacy of user, more humanized, substantially increases the experience satisfaction of user.
3rd embodiment
The present embodiment provides a kind of terminals, and referring specifically to shown in Figure 11, terminal provided in this embodiment includes processor 1101, memory 1102 and communication bus 1103.
Wherein, the communication bus 1103 in the present embodiment is for realizing the connection between processor 1101 and memory 1102 Communication, processor 1101 is then for executing one or more program stored in memory 1102, to perform the steps of
Judge whether to receive the outgoing instructions for destination image data;
If so, according to preset rules by the corresponding region division of destination image data be common image region and privacy image Region;
The corresponding common image data in common image region are obtained, common image data are subjected to outgoing.
It should be noted that the above-mentioned steps that processor 1101 is realized can be independent application program namely itself and Camera and the application for calling camera are separated, the not influences of the application of camera subject and calling camera, for example, when applying When wechat calls camera to open video, the application program launching at this time, namely received at this time for the outer of destination image data Send instructions, is then common image region and privacy image district by the corresponding region division of destination image data according to preset rules Domain, and then the corresponding common image data in common image region are obtained, common image data are subjected to outgoing.It is understood that It is, when it is independent application program, to easily facilitate developer and develop, provide convenience for developer, saves Development cost.
It is worth noting that, not fully expounding the institute in embodiment one, two in the present embodiment in order not to burden explanation There is example, it is understood that, all examples in embodiment one, two are suitable for the present embodiment.
The present embodiment also provides a kind of computer readable storage medium, computer-readable recording medium storage have one or Multiple programs, one or more program can be executed by one or more processor, to realize such as above-mentioned method for secret protection The step of.
Terminal provided in this embodiment and computer readable storage medium can also realize a kind of specific display control mistake Journey, for details, reference can be made to shown in Figure 12.
S1201: judge whether to receive the outgoing instructions for destination image data;
If so, S1202 is executed, if it is not, continuing to execute S1201.
If user C is in advance by store in terminal photo a by being sent to user D using QQ, i.e., user D is at this time The destination image data " photo a " of user's C this side will be received, namely has received the outgoing for destination image data at this time Instruction executes S1202.
S1202: judge whether to receive the privacy image-region setting operation that user issues;
If so, S1203 is executed, if it is not, continuing to execute S1202.
Example in undertaking, further, if user C divides the animal kitten region in photo a, i.e., at this time The privacy image-region setting operation that user issues is received, then executes S1203.
S1203: being arranged according to privacy image-region and operate determining privacy image-region, will be in addition to privacy image-region Other regions are as common image region.
Animal kitten region is further determined as privacy image-region by example in undertaking, will be where animal kitten Other regions except region are as common image region.
S1204: common image region and privacy image-region are obtained.
Example in undertaking further obtains above-mentioned ready-portioned privacy image-region and common image region.
S1205: common image region and privacy image-region are shown with different display modes.
It is laggard further to carry out mosaic processing to privacy image-region (animal kitten region) for example in undertaking Row display, directly shows common image region, is privacy image-region and common image area in order to which what user C distinguishes Domain.
S1206: the corresponding privacy image data of privacy image-region is obtained, is deposited after being encrypted to the privacy image data Storage.
Example in undertaking further obtains privacy image-region (animal kitten region) corresponding privacy picture number According to being stored in the terminal of user C after being encrypted to the privacy image data got, as user's C outgoing next time photo a When, it no longer needs to reset privacy image-region.
S1207: obtaining the corresponding common image data in common image region, and common image data are carried out outgoing.
Example in undertaking further obtains the corresponding common image data in common image region, by common image region pair It is sent to user D outside the common image data answered, it can not to the region where animal kitten in the photo a that user D is received at this time See, it is visible to other regions in addition to the region where animal kitten.
Terminal provided in this embodiment and computer readable storage medium, by when the outgoing for receiving destination image data When instruction, according to preset rules by the corresponding region division of the destination image data be common image region and privacy image district Domain, and then the corresponding common image data in common image region are obtained, common image data are subjected to outgoing, protect user's Privacy, it is more humanized, thus compared to the prior art, terminal provided in this embodiment and computer readable storage medium, greatly The experience satisfaction of user is improved greatly.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of method for secret protection, which is characterized in that the method for secret protection includes:
Judge whether to receive the outgoing instructions for destination image data;
If so, according to preset rules by the corresponding region division of the destination image data be common image region and privacy image Region;
The corresponding common image data in the common image region are obtained, the common image data are subjected to outgoing.
2. method for secret protection as described in claim 1, which is characterized in that described that the common image data are carried out outgoing Before, further includes:
Obtain the common image region and the privacy image-region;
The common image region and the privacy image-region are shown with different display modes, to distinguish the public affairs Image-region and the privacy image-region altogether.
3. method for secret protection as claimed in claim 2, which is characterized in that described by the common image region and described hidden Private image-region is shown with different display modes, comprising:
The common image region is directly carried out to show and show after handling the privacy image-region;
Or,
The privacy image-region is directly carried out to show and show after handling the common image region;
Or,
It is shown after carrying out different processing respectively to the common image region and the privacy image-region.
4. method for secret protection as described in claim 1, which is characterized in that described that the common image data are carried out outgoing Before, further includes:
The corresponding privacy image data of the privacy image-region is obtained, is stored after being encrypted to the privacy image data.
5. method for secret protection according to any one of claims 1-4, which is characterized in that the destination image data includes dynamic At least one of state image data, static image data.
6. method for secret protection as claimed in claim 5, which is characterized in that the target image includes dynamic image data When, the dynamic image data includes:
The image data got in real time during video;
Or,
Stored video image data in terminal.
7. method for secret protection as claimed in claim 5, which is characterized in that it is described according to preset rules by the target image The corresponding region division of data is common image region and privacy image-region, comprising:
Judge in the destination image data with image recognition technology with the presence or absence of the image in default common image table;
If so, the region where the image identified is determined as common image region, will except the common image region it Other outer regions are as privacy image-region;
Or,
Judge in the destination image data with image recognition technology with the presence or absence of the image in default privacy image table;
If so, the region where the image identified is determined as privacy image-region, will except the privacy image-region it Other outer regions are as common image region.
8. method for secret protection as claimed in claim 5, which is characterized in that it is described according to preset rules by the target image The corresponding region division of data is common image region and privacy image-region, comprising:
The privacy image-region setting operation that user issues is received, operation is arranged according to the privacy image-region and determines privacy figure As region, using other regions in addition to the privacy image-region as common image region;
Or,
The common image region setting operation that user issues is received, operation is arranged according to the common image region and determines public figure As region, using other regions in addition to the common image region as privacy image-region.
9. a kind of terminal, which is characterized in that the terminal includes processor, memory and communication bus;
The communication bus is for realizing the connection communication between the processor and the memory;
The processor is for executing one or more program stored in the memory, to realize such as claim 1-8 The step of described in any item method for secret protection.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be executed by one or more processor, to realize that claim 1-8 such as appoints The step of method for secret protection described in one.
CN201810713373.1A 2018-06-29 2018-06-29 A kind of method for secret protection, terminal and computer readable storage medium Pending CN109063505A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810713373.1A CN109063505A (en) 2018-06-29 2018-06-29 A kind of method for secret protection, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810713373.1A CN109063505A (en) 2018-06-29 2018-06-29 A kind of method for secret protection, terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109063505A true CN109063505A (en) 2018-12-21

Family

ID=64818841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810713373.1A Pending CN109063505A (en) 2018-06-29 2018-06-29 A kind of method for secret protection, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109063505A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918944A (en) * 2019-03-01 2019-06-21 维沃移动通信有限公司 A kind of information protecting method, device, mobile terminal and storage medium
CN110362979A (en) * 2019-06-05 2019-10-22 努比亚技术有限公司 A kind of method for secret protection, terminal and computer readable storage medium
CN111400745A (en) * 2019-11-20 2020-07-10 杭州海康威视***技术有限公司 Picture management method and device and electronic equipment
CN111506921A (en) * 2020-04-17 2020-08-07 浙江同花顺智能科技有限公司 Data processing method, system, device, terminal and storage medium
CN111586361A (en) * 2020-05-19 2020-08-25 浙江大华技术股份有限公司 Image processing method and related device
CN111901567A (en) * 2020-07-31 2020-11-06 平安信托有限责任公司 Privacy protection method, device, equipment and computer readable storage medium
CN112040145A (en) * 2020-08-28 2020-12-04 维沃移动通信有限公司 Image processing method and device and electronic equipment
CN112347512A (en) * 2020-11-13 2021-02-09 支付宝(杭州)信息技术有限公司 Image processing method, device, equipment and storage medium
CN113438365A (en) * 2021-06-22 2021-09-24 读书郎教育科技有限公司 Camera privacy protection method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102473283A (en) * 2010-07-06 2012-05-23 松下电器产业株式会社 Image delivery device
CN105046133A (en) * 2015-07-21 2015-11-11 深圳市元征科技股份有限公司 Image display method and vehicle-mounted terminal
CN107317990A (en) * 2017-06-27 2017-11-03 宇龙计算机通信科技(深圳)有限公司 Video call method, device, user terminal and computer-readable recording medium
CN108206930A (en) * 2016-12-16 2018-06-26 杭州海康威视数字技术股份有限公司 The method and device for showing image is covered based on privacy

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102473283A (en) * 2010-07-06 2012-05-23 松下电器产业株式会社 Image delivery device
CN105046133A (en) * 2015-07-21 2015-11-11 深圳市元征科技股份有限公司 Image display method and vehicle-mounted terminal
CN108206930A (en) * 2016-12-16 2018-06-26 杭州海康威视数字技术股份有限公司 The method and device for showing image is covered based on privacy
CN107317990A (en) * 2017-06-27 2017-11-03 宇龙计算机通信科技(深圳)有限公司 Video call method, device, user terminal and computer-readable recording medium

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918944A (en) * 2019-03-01 2019-06-21 维沃移动通信有限公司 A kind of information protecting method, device, mobile terminal and storage medium
CN110362979A (en) * 2019-06-05 2019-10-22 努比亚技术有限公司 A kind of method for secret protection, terminal and computer readable storage medium
CN111400745A (en) * 2019-11-20 2020-07-10 杭州海康威视***技术有限公司 Picture management method and device and electronic equipment
CN111506921A (en) * 2020-04-17 2020-08-07 浙江同花顺智能科技有限公司 Data processing method, system, device, terminal and storage medium
CN111586361A (en) * 2020-05-19 2020-08-25 浙江大华技术股份有限公司 Image processing method and related device
CN111586361B (en) * 2020-05-19 2021-10-15 浙江大华技术股份有限公司 Image processing method and related device
CN111901567A (en) * 2020-07-31 2020-11-06 平安信托有限责任公司 Privacy protection method, device, equipment and computer readable storage medium
CN112040145A (en) * 2020-08-28 2020-12-04 维沃移动通信有限公司 Image processing method and device and electronic equipment
CN112040145B (en) * 2020-08-28 2023-04-07 维沃移动通信有限公司 Image processing method and device and electronic equipment
CN112347512A (en) * 2020-11-13 2021-02-09 支付宝(杭州)信息技术有限公司 Image processing method, device, equipment and storage medium
CN113438365A (en) * 2021-06-22 2021-09-24 读书郎教育科技有限公司 Camera privacy protection method and device

Similar Documents

Publication Publication Date Title
CN109063505A (en) A kind of method for secret protection, terminal and computer readable storage medium
CN109701266B (en) Game vibration method, device, mobile terminal and computer readable storage medium
CN108733811A (en) A kind of file access method, terminal and computer readable storage medium
CN109663353A (en) Game operation method, mobile terminal and computer readable storage medium
CN108900778A (en) A kind of image pickup method, mobile terminal and computer readable storage medium
CN109151169A (en) Camera right management method, mobile terminal and computer readable storage medium
CN110187943A (en) A kind of record screen method, terminal and computer readable storage medium
CN109819163A (en) A kind of image processing control, terminal and computer readable storage medium
CN110069229A (en) Screen sharing method, mobile terminal and computer readable storage medium
CN108965710A (en) Method, photo taking, device and computer readable storage medium
CN108833690A (en) authority control method, terminal and computer readable storage medium
CN109672822A (en) A kind of method for processing video frequency of mobile terminal, mobile terminal and storage medium
CN109062465A (en) A kind of application program launching method, mobile terminal and storage medium
CN110347306A (en) A kind of multi-screen display method, terminal and computer readable storage medium
CN109218531A (en) screen content display effect control method, terminal and computer readable storage medium
CN108600545A (en) Method for controlling mobile terminal, mobile terminal and computer readable storage medium
CN112188058A (en) Video shooting method, mobile terminal and computer storage medium
CN108900779A (en) Initial automatic exposure convergence method, mobile terminal and computer readable storage medium
CN108920917A (en) Log in end switching method, mobile terminal and computer readable storage medium
CN107241504A (en) A kind of image processing method, mobile terminal and computer-readable recording medium
CN108282608B (en) Multi-region focusing method, mobile terminal and computer readable storage medium
CN110020551A (en) One kind preventing the method for divulging a secret, terminal and computer readable storage medium
CN108900503A (en) Data communications method, communication processing equipment, terminal and readable storage medium storing program for executing
CN108111758A (en) A kind of shooting preview method, equipment and computer readable storage medium
CN108040330B (en) WiFi directional transmission method, mobile terminal and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181221