CN106815509B - Multimedia file protection method and device and electronic equipment - Google Patents
Multimedia file protection method and device and electronic equipment Download PDFInfo
- Publication number
- CN106815509B CN106815509B CN201611184250.0A CN201611184250A CN106815509B CN 106815509 B CN106815509 B CN 106815509B CN 201611184250 A CN201611184250 A CN 201611184250A CN 106815509 B CN106815509 B CN 106815509B
- Authority
- CN
- China
- Prior art keywords
- multimedia file
- electronic equipment
- locking
- preset
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to the field of electronic devices, and in particular, to a method and an apparatus for protecting a multimedia file, and an electronic device. The method is applied to the electronic equipment and comprises the following steps: when the multimedia file is in a browsing state, receiving a multimedia file protection instruction; acquiring user identity information according to the multimedia file protection instruction; and if the user identity information is not matched with the pre-stored identity characteristic information, locking the currently browsed multimedia file. Therefore, in the sharing process, when the user of the electronic equipment transfers the electronic equipment to other users, the electronic equipment locks the currently browsed multimedia file, so that other multimedia files can be automatically protected from disclosure.
Description
Technical Field
The present invention relates to the field of electronic devices, and in particular, to a method and an apparatus for protecting a multimedia file, and an electronic device.
Background
With the popularization of electronic equipment, various users can share some living things through the electronic equipment, and therefore the lives of the users are greatly enriched. However, in the process of sharing files related to various private contents of the user, the user may worry that other users may not allow browsing the files of other private contents in the process of sharing a specific file.
The prior related art prevents other users from browsing important files by presetting passwords for the important files.
However, in the process of implementing the present invention, the inventors found that the following problems exist in the related art: in the prior art, the password can only be preset on the important file by manual setting, the sharing action often happens accidentally, and the user of the electronic equipment does not preset the password on the important file in time or forgets, so that the leakage of the important file is caused.
Disclosure of Invention
An object of the embodiments of the present invention is to provide a method, an apparatus, and an electronic device for protecting a multimedia file, which solve the technical problem that the prior art fails to automatically protect the multimedia file from disclosure.
In order to solve the above technical problems, embodiments of the present invention provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides a multimedia file protection method, which is applied to an electronic device, and the method includes: when the multimedia file is in a browsing state, receiving a multimedia file protection instruction; acquiring user identity information according to the multimedia file protection instruction; and if the user identity information does not match the pre-stored identity characteristic information, locking the currently browsed multimedia file.
Optionally, the electronic device comprises a key and/or a touch screen; the multimedia file protection instruction is triggered in response to the key operation; alternatively, the multimedia file protection instruction is triggered in response to operating the touch screen.
Optionally, the electronic device further comprises a camera; the acquiring of the user identity information includes: starting the camera to shoot a face image; or, a fingerprint of a touch operation performed on the touch screen is collected.
Optionally, the user identity information includes the face image or the fingerprint, and the identity feature information includes a face feature or a fingerprint feature; if the user identity information does not match with the pre-stored identity characteristic information, locking the currently browsed multimedia file, including: if the face image shot by the camera does not match the prestored face characteristics, locking the currently browsed multimedia file; if the face image shot by the camera matches the pre-stored face characteristics, the currently browsed multimedia file is not locked; or if the fingerprint does not match the preset fingerprint characteristics, locking the currently browsed multimedia file; and if the fingerprint is matched with the preset fingerprint characteristic, not locking the currently browsed multimedia file.
Optionally, after the locking the currently browsed multimedia file, the method further comprises: and hiding the multimedia file with the security protection.
Optionally, the hiding the multimedia file with security level protection includes: acquiring a key field for describing the security level of the multimedia file; if the acquired key field is matched with a preset contrast field, hiding the multimedia file corresponding to the key field; and if the acquired key field is not matched with the preset comparison field, presenting the multimedia file corresponding to the key field.
In a second aspect, an embodiment of the present invention provides a multimedia file protection apparatus, applied to an electronic device, where the apparatus includes: the receiving module is used for receiving a multimedia file protection instruction when the multimedia file is in a browsing state; the acquisition module is used for acquiring user identity information according to the multimedia file protection instruction; and the locking module is used for locking the currently browsed multimedia file if the user identity information is not matched with the pre-stored identity characteristic information.
Optionally, the electronic device comprises a key and/or a touch screen; the multimedia file protection instruction is triggered in response to the key operation; alternatively, the multimedia file protection instruction is triggered in response to operating the touch screen.
Optionally, the electronic device further comprises a camera; the acquisition module includes: the starting unit is used for starting the camera to shoot the face image; or the acquisition unit is used for acquiring the fingerprint of the touch operation performed on the touch screen.
Optionally, the user identity information includes the face image or the fingerprint, and the identity feature information includes a face feature or a fingerprint feature; the locking module includes: the first locking unit is used for locking a currently browsed multimedia file if the face image shot by the camera does not match the prestored face characteristics; the second locking unit is used for not locking the currently browsed multimedia file if the face image shot by the camera matches the prestored face characteristics; or, the third locking unit is used for locking the currently browsed multimedia file if the fingerprint does not match the preset fingerprint characteristics; and the fourth locking unit is used for not locking the currently browsed multimedia file if the fingerprint is matched with the preset fingerprint characteristics.
Optionally, the apparatus further comprises: and the hiding module is used for hiding the multimedia file with the security protection.
Optionally, the hiding module comprises: the acquisition unit is used for acquiring a key field for describing the security level of the multimedia file; the hiding unit is used for hiding the multimedia file corresponding to the key field if the acquired key field is matched with a preset contrast field; and the presentation unit is used for presenting the multimedia file corresponding to the key field if the acquired key field is not matched with the preset comparison field.
In a third aspect, the present invention provides a non-volatile computer-readable storage medium storing electronic device-executable instructions for causing an electronic device to execute the above-mentioned multimedia file protection method.
In a fourth aspect, an embodiment of the present invention provides an electronic device, including:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of multimedia file protection described above.
In each embodiment of the invention, when the multimedia file is in a browsing state, a multimedia file protection instruction is received, user identity information is obtained according to the multimedia file protection instruction, and if the user identity information is not matched with prestored identity characteristic information, the currently browsed multimedia file is locked. Therefore, in the sharing process, when the user of the electronic equipment transfers the electronic equipment to other users, the electronic equipment locks the currently browsed multimedia file, so that other multimedia files can be automatically protected from disclosure.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a schematic structural diagram of a smart phone according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for protecting a multimedia file according to an embodiment of the present invention;
FIG. 3 is a schematic flow chart of step 024 in FIG. 2;
FIG. 4 is another schematic flow chart of step 024 in FIG. 2;
FIG. 5 is a flowchart illustrating a method for protecting a multimedia file according to another embodiment of the present invention;
FIG. 6 is a schematic flow chart of step 026 in FIG. 5;
FIG. 7 is a schematic structural diagram of a multimedia file protection apparatus according to an embodiment of the present invention;
FIG. 8 is a schematic structural diagram of a multimedia file protection apparatus according to another embodiment of the present invention;
FIG. 8a is a schematic diagram of the structure of the acquisition module in FIG. 8;
FIG. 8b is a schematic structural view of the locking module of FIG. 8;
FIG. 8c is a schematic diagram of the hidden module of FIG. 8;
fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The method for protecting the multimedia file can be executed in any suitable type of user terminal with a user interaction device and a processor with computing capacity, such as a desktop computer, a smart phone, a tablet computer and other user terminals.
The multimedia file protection device of the embodiment of the invention can be used as one of software or hardware functional units and independently arranged in the user terminal, and also can be used as one of functional modules integrated in a processor to execute the multimedia file protection method of the embodiment of the invention.
The electronic device may be a smart phone, a computer, a Personal Digital Assistant (PDA), a tablet computer, a smart watch, an electronic book, or the like. As shown in fig. 1, when the electronic device is a smartphone 10, a screen 101 of the smartphone 10 is in a photo browsing state and presents a first photo 101a, and when a user a shares the first photo 101a, the first photo 101a may be locked first and then the smartphone 10 is handed over to the user b. Where user B can only view the first photograph 101 a.
The smartphone 10 includes a touch screen as an input interface for user operations, which may detect a user operation on the touch-sensitive surface, such as single-click, double-click, sliding, long-press, dragging, and so on. Each operation by the user generates a certain pressure intensity on the touch-sensitive surface, which can be detected using various methods and various sensors or combinations of various sensors. For example, by detecting the magnitude of the change in capacitance of the touch-sensitive surface at the touch-sensitive surface, or by detecting the magnitude of the change in resistance of the touch-sensitive surface, or by detecting the magnitude of the change in capacitance and the magnitude of the change in resistance of the touch-sensitive surface, and so on. In the above process, the intensity of the pressure generated by the touch-sensitive surface is converted into an electrical signal by the sensor. The camera can collect the face image of the user. While the first photo 101a is locked by the user a, an operation may be performed on the touch surface, and the smartphone 10 distributes the operation to a photo protection instruction. After the user A hands over the smart phone 10 to the user B, the smart phone 10 starts a camera according to the photo protection instruction to acquire a face image of the user B. Further, when the smart phone 10 determines that the face image of the user b does not match the face image of the user a, the first photo 101a is automatically locked, so that other unauthorized photos can be automatically protected from being leaked.
The electronic device supports installation of various desktop applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, a training support application, a photo application, a digital camera application, a digital video recorder application, a web browsing application, a digital music player application, a digital video player application, and the like.
Specifically, fig. 2 is a flowchart illustrating a method for protecting a multimedia file according to an embodiment of the present invention. As shown in fig. 2, the multimedia file protection method is applied to an electronic device, wherein the multimedia file protection method includes:
step 020, receiving a multimedia file protection instruction when the multimedia file is in a browsing state;
the multimedia file comprises audio, video, photos, notebooks, notes, short messages and the like, and the electronic equipment can present the multimedia file on a screen, so that the multimedia function corresponding to the multimedia file is realized. For example, the electronic device presents a specific photo on the screen according to the selection of the user on the specific photo in the photo application program, and the electronic device presents a specific short message on the screen according to the selection of the user on the specific short message in the short message application program.
When the electronic equipment presents the multimedia file on the screen, the multimedia file is in a browsing state, and a user can browse a plurality of multimedia files based on the fact that the multimedia file is in the browsing state. In some states of freely browsing the multimedia file, when sharing the multimedia file, other users can freely select the multimedia file of the electronic device for viewing.
And when the electronic equipment detects that the multimedia application program corresponding to the multimedia file is in foreground operation, determining that the multimedia file is in a browsing state. For example, when the electronic device detects that the multimedia application running in the foreground is a photo application, the electronic device determines that the photo application is in a browsing state, and the user can browse photos in the photo application.
The multimedia file protection instruction comprises an instruction which is distributed by the electronic equipment according to related operations and used for executing the step of acquiring user identity information, and the electronic equipment executes corresponding events according to the multimedia file protection instruction. The related operation may be a soft operation or a hard operation, and the soft operation may be that the electronic device outputs a trigger signal according to a pre-logic to enable the electronic device to further distribute the multimedia file protection instruction. The hard operation may be an external operation on related hardware of the electronic device to cause the electronic device to issue a multimedia file protection instruction, for example, a touch operation performed by a user on a touch screen of the electronic device, an operation performed on a key of the electronic device, and the like.
And when the electronic equipment receives the multimedia file protection instruction, the execution of the next step is completed according to the preset logic.
022, obtaining user identity information according to the multimedia file protection instruction;
the user identity information is used for identifying the identity of the user, and may be a face image of the user, a fingerprint of the user, an iris of the user, a voice of the user, and the like.
The multimedia file protection instruction triggers the electronic equipment to enable the electronic equipment to acquire the user identity information. In the obtaining process, the electronic device can adopt a corresponding method according to the type of the user identity information to obtain the user identity information, wherein a designer can configure corresponding components and methods for the electronic device according to business requirements to obtain the user identity information.
And 024, if the user identity information does not match the pre-stored identity characteristic information, locking the currently browsed multimedia file.
The currently browsed multimedia file is a multimedia file of a multimedia application program running in the foreground of the electronic device, wherein "current" here is the current time point of the multimedia file being presented on the screen of the electronic device.
Wherein the identity information is used to evaluate whether a user currently using the electronic device is a desired user (the owner of the electronic device or a user trusted by the owner or a user specified by the owner).
The electronic equipment prestores identity characteristic information, when judging whether a user using the electronic equipment currently is an expected user, the electronic equipment calls the identity characteristic information, judges whether the identity information of the user using the electronic equipment currently is matched with the identity characteristic information, and does not lock a currently browsed multimedia file if the identity information of the user using the electronic equipment currently is matched with the identity characteristic information; and if not, locking the currently browsed multimedia file. When the multimedia file is in a locked state, other users cannot perform other operations on the multimedia file which do not conform to the preset logic. For example, when the currently browsed multimedia file is a photo, the operation is a switching operation for switching the current photo to the next photo, referring to fig. 1, when the user a hands the smartphone 10 to the user b, the smartphone 10 sets the current photo in a locked state, so that the smartphone 10 does not respond to the switching operation, that is, maintains the state of the current photo unchanged.
In this embodiment, when the user of the electronic device hands over the electronic device to another user, the electronic device locks the currently browsed multimedia file to prevent the other user from viewing the other multimedia file, so that the other multimedia file can be automatically protected from disclosure.
In some embodiments, the electronic device includes keys and/or a touch screen. The multimedia file protection instruction is triggered in response to the operation key. The key may be a volume down key or a volume up key or a power key. When the electronic equipment detects that the multimedia file is in a browsing state, a user operates the key, the key sends out a multimedia file protection instruction, and the electronic equipment receives the multimedia file protection instruction. In some embodiments, in order to distinguish that the key is in the normal functional state from the multimedia file is in the browsing state to distribute the multimedia file protection instruction, the electronic device counts the number of times of operation of the key within a preset time period, and when the electronic device detects that the number of times of operation of the key is greater than a preset threshold, the electronic device takes a trigger signal distributed from the key as the multimedia file protection instruction. And when the operation times are less than a preset threshold value, the electronic equipment takes the trigger signal sent from the key as a normal functional signal. For example, the user operates the volume-down key three times continuously, and the preset threshold is 2 times, and the electronic device uses the trigger signal sent from the key as a multimedia file protection instruction. When the user continuously operates the volume-down key 1 time, the electronic device uses the trigger signal emitted from the key as a signal for lowering the volume.
The difference from the above embodiment is that the multimedia file protection instruction is triggered in response to operating the touch screen. When the electronic equipment detects that the multimedia file is in a browsing state, a user operates the touch screen, and when the electronic equipment detects that the operation matches with a preset operation, the electronic equipment takes a trigger signal sent by the touch screen as a multimedia file protection instruction. When the electronic equipment detects that the operation does not match the preset operation, the electronic equipment takes the trigger signal sent from the touch screen as a normal touch signal. For example, the operation is a circle track, the preset operation is a "V" track, and the electronic device takes a trigger signal emitted from the touch screen as a normal touch signal. When the preset operation is a circle track, the electronic equipment takes the trigger signal sent from the touch screen as a multimedia file protection instruction.
In some embodiments, the electronic device further comprises a camera. The difference from the above embodiments is that step 022 comprises: and starting the camera to shoot the face image. When the electronic equipment detects a multimedia file protection instruction, a camera is started to shoot a face image of a user in front of the electronic equipment according to the multimedia file protection instruction. Therefore, the electronic equipment avoids high power consumption of the electronic equipment caused by frequent starting of the camera.
In some embodiments, the difference between the above embodiments is that step 022 comprises: a fingerprint of a touch operation performed on the touch screen is collected. In addition to the manner of acquiring the face image of the user by using the camera, please refer to fig. 1 again, when the user a hands the smartphone to the user b, the user b performs a touch operation on the touch screen where the currently browsed multimedia file is located, and the electronic device acquires the fingerprint of the user b of the touch operation performed on the touch screen. In some user use habits, the user b may want to view another multimedia file more, and then perform a touch switching operation on the touch screen, and in order to better solve the problem, the electronic device further locks the currently browsed multimedia file by collecting a fingerprint of the touch operation performed on the touch screen.
In some embodiments, the user identity information comprises a facial image and the identity feature information comprises facial features. As shown in fig. 3, the difference from the above embodiments is that step 024 includes:
0242, judging whether the face image shot by the camera matches the pre-stored face characteristics;
and 0244, if the face image shot by the camera does not match the prestored face characteristics, locking the currently browsed multimedia file.
And 0246, if the face image shot by the camera matches the pre-stored face characteristics, not locking the currently browsed multimedia file.
The electronic equipment can prestore one kind of face characteristics, and can prestore a plurality of kinds of face characteristics. For example, the electronic device may pre-store the face features of the owner of the electronic device, or pre-store the face features of the user specified by the owner of the electronic device in addition to the face features of the owner of the electronic device. The facial features are extracted from a plurality of facial images by a designer by collecting the facial images of a user according to an image processing algorithm, and the final facial features are formed.
In the process of judging whether the face image shot by the camera is matched with the prestored face features or not, the electronic equipment extracts face feature values from the face image shot by the camera by adopting an image processing algorithm, and locks the currently browsed multimedia file if the face feature values are not matched with the prestored face features. And if the face characteristic value is matched with the pre-stored face characteristic, the currently browsed multimedia file is not locked.
In some embodiments, the user identity information comprises a fingerprint and the identity information comprises fingerprint characteristics. As shown in fig. 4, the difference from the above embodiments is that step 024 includes:
0241, judging whether the collected fingerprint matches the pre-stored fingerprint characteristics;
0243, if the fingerprint does not match the preset fingerprint characteristics, locking the currently browsed multimedia file;
and 0245, if the fingerprint matches the preset fingerprint characteristics, not locking the currently browsed multimedia file.
The electronic equipment can prestore one kind of fingerprint characteristic, can prestore multiple fingerprint characteristic. For example, the electronic device may pre-store the fingerprint characteristics of the owner of the electronic device, and may also pre-store the fingerprint characteristics of the user specified by the owner of the electronic device in addition to the fingerprint characteristics of the owner of the electronic device. The fingerprint features are extracted from each finger according to a fingerprint identification algorithm by a designer by collecting the fingerprint features of each finger of the user, and the final fingerprint features are formed.
The electronic equipment judges whether the acquired fingerprint is matched with the pre-stored face characteristics or not, and locks the currently browsed multimedia file if the fingerprint is not matched with the preset fingerprint characteristics; and if the fingerprint matches the preset fingerprint characteristics, the currently browsed multimedia file is not locked.
In some embodiments, the electronic device may also hide multimedia files with a high level of security. As shown in fig. 5, the difference from the above embodiments is that after step 024, the multimedia file protection method further includes:
and 026, hiding the multimedia file with security protection.
The multimedia file with the security level protection is a multimedia file with a high security level. When the electronic equipment locks the currently browsed multimedia file, the multimedia file with security level protection can be hidden, so that the related important multimedia file of the owner of the electronic equipment or the multimedia file for recording the private content can be further hidden to maintain information security.
In some embodiments, as shown in fig. 6, the difference from the above embodiments is that step 026 includes:
0261, obtaining key field for describing multimedia file security level;
0263, if the acquired key field matches the preset contrast field, hiding the multimedia file corresponding to the key field;
0265, if the acquired key field does not match the preset contrast field, the multimedia file corresponding to the key field is presented.
The key field is used to describe the multimedia file security level, for example, the key field may be "security level 1" or "security level 2" or "highest security level" or "lowest security level" and so on.
The contrast field describes the security level of the multimedia file, which may be the highest security level or a range of security levels (security level 1 to security level 3). When the key field of the multimedia file is "security level 2", the multimedia file is hidden because the key field of the multimedia file matches a preset contrast field. When the key field of the multimedia file is "security level 5", the multimedia file is presented because the key field of the multimedia file does not match the preset contrast field.
In some embodiments, after step 024, the multimedia protection method further comprises:
the electronic equipment responds to the operation input by the user on the touch screen where the currently browsed multimedia file is located, and does not respond to the switching operation if the operation is the switching operation for indicating the switching of the multimedia file. Or the electronic equipment responds to the operation input by the user on the touch screen where the currently browsed multimedia file is located, and does not respond to the editing operation if the operation is the editing operation for indicating to edit the multimedia file. Or the electronic equipment responds to the operation input by the user on the touch screen where the currently browsed multimedia file is located, and does not respond to the deletion operation if the operation is the deletion operation for indicating the deletion of the multimedia file. Or the electronic equipment responds to the operation input by the user on the touch screen where the currently browsed multimedia file is located, and responds to the playing operation if the operation is the playing operation for indicating the playing of the multimedia file. Or, the electronic equipment responds to the operation input by the user on the touch screen where the currently browsed multimedia file is located, and responds to the operation of enlarging or reducing if the operation is the playing operation for indicating the enlargement or reduction of the multimedia file.
In some embodiments, the multimedia file protection instructions may further include instructions for indicating a direction or number of multimedia file views. Optionally, the electronic device responds to an operation input by a user on a touch screen where a currently browsed multimedia file is located, and the multimedia file protection instruction is an instruction for instructing the user to switch another multimedia file, and judges whether the operation matches a preset switching operation; and if the operation is matched with the preset switching operation, allowing the user to switch another multimedia file with a preset number under the locked currently browsed multimedia file. And if the operation does not match the preset switching operation, the user is not allowed to switch another multimedia file of a preset number under the locked currently browsed multimedia file. Optionally, the electronic device responds to an operation input by a user on a touch screen where a currently browsed multimedia file is located, and the multimedia file protection instruction is an instruction for indicating the user to switch another multimedia file, and judges whether the operation is matched with a preset switching operation; if the operation matches the preset switching operation, allowing the user to switch another multimedia file of a preset number under the locked currently browsed multimedia file; and if the operation does not match the preset switching operation, the user is not allowed to switch another multimedia file of a preset number under the locked currently browsed multimedia file.
Fig. 7 is a schematic structural diagram of a multimedia file protection apparatus according to an embodiment of the present invention. As shown in fig. 7, the multimedia file protection apparatus 70 is applied to an electronic device, wherein the multimedia file protection apparatus 70 includes a receiving module 701, an obtaining module 702, and a locking module 703. The receiving module 701 is configured to receive a multimedia file protection instruction when a multimedia file is in a browsing state. The obtaining module 702 is configured to obtain user identity information according to the multimedia file protection instruction. The locking module 703 is configured to lock the currently browsed multimedia file if the user identity information does not match the pre-stored identity feature information.
Since the apparatus embodiment and the method embodiment are based on the same concept, the contents of the apparatus embodiment may refer to the method embodiment on the premise that the contents do not conflict with each other, and are not described herein again.
In this embodiment, when the user of the electronic device hands over the electronic device to another user, the electronic device locks the currently browsed multimedia file to prevent the other user from viewing the other multimedia file, so that the other multimedia file can be automatically protected from disclosure.
Fig. 8 is a schematic structural diagram of a multimedia file protection apparatus according to another embodiment of the present invention. As shown in fig. 8, the multimedia file protection apparatus 80 is applied to an electronic device, wherein the multimedia file protection apparatus 80 includes a receiving module 801, an obtaining module 802 and a locking module 803. The receiving module 801 is configured to receive a multimedia file protection instruction when a multimedia file is in a browsing state. The obtaining module 802 is configured to obtain user identity information according to the multimedia file protection instruction. The locking module 803 is configured to lock the currently browsed multimedia file if the user identity information does not match the pre-stored identity feature information.
Optionally, the electronic device comprises a key and/or a touch screen; the multimedia file protection instruction is triggered in response to the operation key; alternatively, the multimedia file protection instruction is triggered in response to operating the touch screen.
Optionally, the electronic device further comprises a camera; as shown in fig. 8a, the obtaining module 802 includes a starting unit 8021 and an acquiring unit 8022. The starting unit 8021 is used for starting the camera to shoot the face image; alternatively, the collecting unit 8022 is used to collect fingerprints of touch operations performed on the touch screen.
Optionally, the user identity information includes a face image or a fingerprint, and the identity feature information includes a face feature or a fingerprint feature. As shown in fig. 8b, the locking module 803 includes a first locking unit 8031, a second locking unit 8032, a third locking unit 8033, and a fourth locking unit 8034. The first locking unit 8031 is used for locking a currently browsed multimedia file if a face image shot by the camera does not match a prestored face feature; the second locking unit 8032 is configured to not lock the currently browsed multimedia file if the face image captured by the camera matches a pre-stored face feature; or, the third locking unit 8033 is configured to lock the currently browsed multimedia file if the fingerprint information does not match the preset fingerprint feature; the fourth locking unit 8034 is configured to unlock the currently browsed multimedia file if the fingerprint information matches a preset fingerprint feature.
Optionally, as shown in fig. 8, the apparatus 80 further comprises a hiding module 804. The hiding module 804 is configured to hide the multimedia file with security level protection.
Optionally, as shown in fig. 8c, the hiding module 804 includes an obtaining unit 8041, a hiding unit 8042 and a presenting unit 8043. The obtaining unit 8041 is used for obtaining key fields for describing the security level of the multimedia file. The hiding unit 8042 is configured to hide the multimedia file corresponding to the key field if the obtained key field matches a preset comparison field; the presentation unit 8043 is configured to present the multimedia file corresponding to the key field if the acquired key field does not match the preset comparison field.
Since the apparatus embodiment and the method embodiment are based on the same concept, the contents of the apparatus embodiment may refer to the method embodiment on the premise that the contents do not conflict with each other, and are not described herein again.
In this embodiment, when the user of the electronic device hands over the electronic device to another user, the electronic device locks the currently browsed multimedia file to prevent the other user from viewing the other multimedia file, so that the other multimedia file can be automatically protected from disclosure.
As another aspect of the embodiments of the present invention, a nonvolatile computer-readable storage medium is also provided in the embodiments of the present invention. The non-volatile computer-readable storage medium stores electronic device-executable instructions for causing an electronic device to perform the multimedia file protection method of the above embodiment to achieve: when the user of the electronic equipment hands over the electronic equipment to other users, the electronic equipment locks the currently browsed multimedia files to prevent other users from viewing other multimedia files, so that other multimedia files can be automatically protected from disclosure.
Fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. As shown in fig. 9, the electronic device 90 includes one or more processors 901 and memory 902. Fig. 9 illustrates an example of one processor 901.
The processor 901 and the memory 902 may be connected by a bus or other means, and fig. 9 illustrates the connection by a bus as an example.
The memory 902, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the multimedia file protection method in the embodiment of the present invention (for example, the respective modules or units shown in fig. 7, fig. 8, and fig. 8a to fig. 8 c). The processor 901 executes various functional applications and data processing of the multimedia file protection apparatus by running nonvolatile software programs, instructions and modules stored in the memory 902, that is, functions of the various modules and units of the above method embodiment multimedia file protection method and the above apparatus embodiment are implemented.
The memory 902 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 902 may optionally include memory located remotely from the processor 901, which may be connected to the processor 901 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The program instructions/modules stored in the memory 902, when executed by the one or more processors 901, perform the multimedia file protection method in any of the method embodiments described above, e.g., perform the steps illustrated in fig. 2-6 described above; the functions of the respective modules or units described in fig. 7, 8a to 8c may also be implemented.
The electronic device 80 of the embodiment of the present invention exists in various forms in performing the above-described steps of performing the above-described steps shown in fig. 2 to 6; when the functions of the modules or units illustrated in fig. 7, fig. 8, and fig. 8a to fig. 8c can also be implemented, the electronic device 90 includes, but is not limited to:
(1) a mobile communication device: such devices are characterized by mobile communications capabilities and are primarily targeted at providing voice, data communications. Such electronic devices include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such electronic devices include: PDA, MID, and UMPC devices, etc., such as ipads.
(3) A portable entertainment device: such devices can display and play video content, and generally also have mobile internet access features. This type of device comprises: video players, handheld game consoles, and intelligent toys and portable car navigation devices.
(4) And other electronic equipment with a video playing function and an internet surfing function.
Embodiments of the present invention further provide a non-volatile computer storage medium, where the computer storage medium stores computer-executable instructions, which are executed by one or more processors, such as one processor 901 in fig. 9, and enable the one or more processors to perform the multimedia file protection method in any of the method embodiments, for example, perform the steps shown in fig. 2 to fig. 6 described above; the functions of the respective modules or units described in fig. 7, 8a to 8c may also be implemented.
The above-described embodiments of the apparatus or device are merely illustrative, wherein the unit modules described as separate parts may or may not be physically separate, and the parts displayed as module units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network module units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the technical solutions mentioned above may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute the method according to each embodiment or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; within the idea of the invention, also technical features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.
Claims (12)
1. A multimedia file protection method is applied to electronic equipment, and is characterized by comprising the following steps:
when the multimedia file is in a browsing state, receiving a multimedia file protection instruction;
acquiring user identity information according to the multimedia file protection instruction;
if the user identity information does not match the pre-stored identity characteristic information, locking the currently browsed multimedia file;
the electronic equipment comprises a key and/or a touch screen;
the multimedia file protection instruction is triggered in response to the key operation and comprises the following steps: the electronic equipment counts the operation times of the key in a preset time period, and when the electronic equipment detects that the operation times of the key is greater than a preset threshold value, the electronic equipment takes a trigger signal sent from the key as a multimedia file protection instruction;
or,
the multimedia file protection instruction is triggered in response to operating the touch screen, and comprises: the method comprises the steps that a user carries out touch operation on a touch screen, and when the electronic equipment detects that the touch operation is matched with preset operation, the electronic equipment takes a trigger signal sent out from the touch screen as a multimedia file protection instruction; when the electronic equipment detects that the touch operation is not matched with the preset operation, the electronic equipment takes a trigger signal sent from the touch screen as a normal touch signal;
the multimedia file protection instruction also comprises an instruction used for indicating the browsing direction or the number of the multimedia files; the multimedia file protection instructions further include instructions for indicating a preset number of multimedia files are allowed to be browsed.
2. The method of claim 1, wherein the electronic device further comprises a camera;
the acquiring of the user identity information includes:
starting the camera to shoot a face image; or,
and collecting fingerprints of touch operation performed on the touch screen.
3. The method according to claim 2, wherein the user identity information comprises the face image or the fingerprint, and the identity feature information comprises face features or fingerprint features;
if the user identity information does not match with the pre-stored identity characteristic information, locking the currently browsed multimedia file, including:
if the face image shot by the camera does not match the prestored face characteristics, locking the currently browsed multimedia file;
if the face image shot by the camera matches the pre-stored face characteristics, the currently browsed multimedia file is not locked;
or,
if the fingerprint does not match the preset fingerprint characteristics, locking the currently browsed multimedia file;
and if the fingerprint is matched with the preset fingerprint characteristic, not locking the currently browsed multimedia file.
4. A method according to any of claims 1 to 3, wherein after said locking of the currently browsed multimedia file, the method further comprises:
and hiding the multimedia file with the security protection.
5. The method of claim 4, wherein hiding the multimedia file with security level protection comprises:
acquiring a key field for describing the security level of the multimedia file;
if the acquired key field is matched with a preset contrast field, hiding the multimedia file corresponding to the key field;
and if the acquired key field is not matched with the preset comparison field, presenting the multimedia file corresponding to the key field.
6. A multimedia file protection device applied to electronic equipment is characterized by comprising:
the receiving module is used for receiving a multimedia file protection instruction when the multimedia file is in a browsing state;
the acquisition module is used for acquiring user identity information according to the multimedia file protection instruction;
the locking module is used for locking the currently browsed multimedia file if the user identity information is not matched with the prestored identity characteristic information;
the electronic equipment comprises a key and/or a touch screen;
the multimedia file protection instruction is triggered in response to the key operation; or,
the multimedia file protection instruction is triggered in response to operating the touch screen;
the multimedia file protection instruction is triggered in response to the key operation and comprises the following steps: the electronic equipment counts the operation times of the key in a preset time period, and when the electronic equipment detects that the operation times of the key is greater than a preset threshold value, the electronic equipment takes a trigger signal sent from the key as a multimedia file protection instruction;
the multimedia file protection instruction is triggered in response to operating the touch screen, and comprises: the method comprises the steps that a user carries out touch operation on a touch screen, and when the electronic equipment detects that the touch operation is matched with preset operation, the electronic equipment takes a trigger signal sent out from the touch screen as a multimedia file protection instruction; when the electronic equipment detects that the touch operation is not matched with the preset operation, the electronic equipment takes a trigger signal sent from the touch screen as a normal touch signal;
the multimedia file protection instruction further comprises an instruction for indicating the browsing direction or the number of the multimedia files, and the multimedia file protection instruction further comprises an instruction for indicating that the preset number of multimedia files are allowed to be browsed.
7. The apparatus of claim 6, wherein the electronic device further comprises a camera;
the acquisition module includes:
the starting unit is used for starting the camera to shoot the face image; or,
and the acquisition unit is used for acquiring the fingerprint of the touch operation performed on the touch screen.
8. The apparatus of claim 7, wherein the user identity information comprises the face image or the fingerprint, and the identity information comprises face features or fingerprint features;
the locking module includes:
the first locking unit is used for locking a currently browsed multimedia file if the face image shot by the camera does not match the prestored face characteristics;
the second locking unit is used for not locking the currently browsed multimedia file if the face image shot by the camera matches the prestored face characteristics;
or,
the third locking unit is used for locking the currently browsed multimedia file if the fingerprint does not match the preset fingerprint characteristics;
and the fourth locking unit is used for not locking the currently browsed multimedia file if the fingerprint is matched with the preset fingerprint characteristics.
9. The apparatus of any one of claims 6 to 8, further comprising:
and the hiding module is used for hiding the multimedia file with the security protection.
10. The apparatus of claim 9, wherein the concealment module comprises:
the acquisition unit is used for acquiring a key field for describing the security level of the multimedia file;
the hiding unit is used for hiding the multimedia file corresponding to the key field if the acquired key field is matched with a preset contrast field;
and the presentation unit is used for presenting the multimedia file corresponding to the key field if the acquired key field is not matched with the preset comparison field.
11. A non-transitory computer-readable storage medium storing electronic device-executable instructions for causing an electronic device to perform the multimedia file protection method according to any one of claims 1 to 5.
12. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of multimedia file protection as claimed in any one of claims 1 to 5.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201611184250.0A CN106815509B (en) | 2016-12-20 | 2016-12-20 | Multimedia file protection method and device and electronic equipment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201611184250.0A CN106815509B (en) | 2016-12-20 | 2016-12-20 | Multimedia file protection method and device and electronic equipment |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106815509A CN106815509A (en) | 2017-06-09 |
| CN106815509B true CN106815509B (en) | 2019-05-17 |
Family
ID=59108960
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201611184250.0A Active CN106815509B (en) | 2016-12-20 | 2016-12-20 | Multimedia file protection method and device and electronic equipment |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106815509B (en) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107465810B (en) * | 2017-07-11 | 2020-07-21 | Oppo广东移动通信有限公司 | Data control method and related product |
| CN108021825A (en) * | 2017-12-28 | 2018-05-11 | 维沃移动通信有限公司 | A privacy information protection method, mobile terminal |
| CN108804903A (en) * | 2018-06-12 | 2018-11-13 | 平安科技(深圳)有限公司 | File viewing method and device and computer readable storage medium |
| CN109446843A (en) * | 2018-11-02 | 2019-03-08 | 上海京颐奂享物联网有限公司 | Information display method and device |
| CN109635542B (en) * | 2018-11-30 | 2023-02-03 | 华为技术有限公司 | A biometric identification interaction method, graphic interaction interface and related device |
| CN112487449B (en) * | 2020-11-30 | 2025-04-25 | 珠海格力电器股份有限公司 | Drawing display method and device, storage medium, and electronic device |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104899501A (en) * | 2015-06-24 | 2015-09-09 | 小米科技有限责任公司 | Dialog list display method and device and terminal |
| CN104992094A (en) * | 2015-06-25 | 2015-10-21 | 广东欧珀移动通信有限公司 | Terminal operation method and terminal |
| CN105404808A (en) * | 2015-12-18 | 2016-03-16 | 惠州Tcl移动通信有限公司 | Mobile terminal and multimedia file playing method thereof |
| CN106203153A (en) * | 2016-06-23 | 2016-12-07 | 珠海市魅族科技有限公司 | A kind of information access control method and device |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150245199A1 (en) * | 2014-02-26 | 2015-08-27 | Jared Blitzstein | Privacy restricted photo gallery navigation for mobile devices |
-
2016
- 2016-12-20 CN CN201611184250.0A patent/CN106815509B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104899501A (en) * | 2015-06-24 | 2015-09-09 | 小米科技有限责任公司 | Dialog list display method and device and terminal |
| CN104992094A (en) * | 2015-06-25 | 2015-10-21 | 广东欧珀移动通信有限公司 | Terminal operation method and terminal |
| CN105404808A (en) * | 2015-12-18 | 2016-03-16 | 惠州Tcl移动通信有限公司 | Mobile terminal and multimedia file playing method thereof |
| CN106203153A (en) * | 2016-06-23 | 2016-12-07 | 珠海市魅族科技有限公司 | A kind of information access control method and device |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106815509A (en) | 2017-06-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106815509B (en) | Multimedia file protection method and device and electronic equipment | |
| US11882221B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
| CN111767554B (en) | Screen sharing method and device, storage medium and electronic equipment | |
| CN105117122B (en) | A kind of terminal screenshotss method and terminal | |
| US20190121537A1 (en) | Information displaying method and device, and electronic device | |
| CN107436784B (en) | Floating window display method and device | |
| CN105574388B (en) | A kind of unlocking method based on touch screen terminal, device and touch screen terminal | |
| CN106681717B (en) | Terminal application program management method and device and electronic equipment | |
| US10635456B2 (en) | Method for entering operating system desktop and mobile intelligent terminal | |
| CN105045488B (en) | The starting control method and mobile terminal of application program | |
| CN110515533B (en) | Electronic equipment shortcut operation method and device, electronic equipment and storage medium | |
| US20170192646A1 (en) | Method and electronic device for hiding application icons and mobile phone | |
| CN103745147A (en) | System mode starting method and application program starting method and device | |
| CN104008348A (en) | Application program control method, application program control device and terminal | |
| CN106716436A (en) | Information display method and system | |
| CN107643871A (en) | Screen display control method and device, storage medium and mobile terminal | |
| EP2927833A1 (en) | Methods and devices for granting access to and enabling passcode protection for a file | |
| CN106228054A (en) | Auth method and device | |
| CN105701420B (en) | A kind of management method and terminal of user data | |
| CN107766712A (en) | Message prompt method, terminal and computer-readable medium | |
| US20170277395A1 (en) | Control method for terminal and terminal | |
| CN112533072A (en) | Image sending method and device and electronic equipment | |
| CN106156646B (en) | Information calling method and electronic equipment | |
| US10902101B2 (en) | Techniques for displaying secure content for an application through user interface context file switching | |
| CN108536512B (en) | Interface switching method, device and terminal device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |