[go: up one dir, main page]

CN114036555A - Picture locking method, access management method and device - Google Patents

Picture locking method, access management method and device Download PDF

Info

Publication number
CN114036555A
CN114036555A CN202111308091.1A CN202111308091A CN114036555A CN 114036555 A CN114036555 A CN 114036555A CN 202111308091 A CN202111308091 A CN 202111308091A CN 114036555 A CN114036555 A CN 114036555A
Authority
CN
China
Prior art keywords
picture
gallery
access
party application
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111308091.1A
Other languages
Chinese (zh)
Inventor
刘志博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Tianjin Co Ltd
Original Assignee
Spreadtrum Communications Tianjin Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Tianjin Co Ltd filed Critical Spreadtrum Communications Tianjin Co Ltd
Priority to CN202111308091.1A priority Critical patent/CN114036555A/en
Publication of CN114036555A publication Critical patent/CN114036555A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/168Details of user interfaces specifically adapted to file systems, e.g. browsing and visualisation, 2d or 3d GUIs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to the technical field of image libraries, in particular to a picture locking method, an access management method and equipment. The method comprises the following steps: determining a locking instruction for a first picture of a gallery; according to the locking instruction, setting access authority of the first picture, wherein the access authority comprises: denying, allowing, or restricting access to the first picture by a third party application. The scheme of the embodiment of the invention supports the locking of part or all of the pictures in the gallery, and improves the safety of the pictures in the gallery.

Description

图片锁定方法、访问管理方法和设备Picture locking method, access management method and device

技术领域technical field

本发明涉及图库技术领域,尤其涉及一种图片锁定方法、访问管理方法和设备。The present invention relates to the technical field of gallery, in particular to a picture locking method, access management method and device.

背景技术Background technique

终端设备中,图库通常用于存储用户的各类图片。在图库的各类图片中,难以避免地会涉及到一些关于用户隐私的图片,例如,用户的身份证图片、银行卡图片等。而随着终端设备中第三方应用功能的扩展,许多第三方应用支持访问图库中的图片。例如,即时通信软件在聊天界面可以调用图库中的图片,此时则有可能造成用户隐私图片的泄露。因此,如何保护图库中图片的安全成为一个需要解决的问题。In the terminal device, the gallery is usually used to store various pictures of the user. Among the various pictures in the gallery, it is inevitable to involve some pictures about the user's privacy, for example, the picture of the user's ID card, the picture of the bank card, etc. With the expansion of third-party application functions in the terminal device, many third-party applications support accessing pictures in the gallery. For example, the instant messaging software can call the pictures in the gallery in the chat interface, which may cause the leakage of the user's private pictures. Therefore, how to protect the security of pictures in the gallery becomes a problem that needs to be solved.

发明内容SUMMARY OF THE INVENTION

有鉴于此,本发明实施例提供了一种图片锁定方法、访问管理方法和设备,该方案支持对图库中部分或者全部图片的锁定,提高图库中图片的安全性。In view of this, the embodiments of the present invention provide a picture locking method, access management method and device, the solution supports the locking of some or all pictures in the gallery, and improves the security of the pictures in the gallery.

第一方面,本发明实施例提供了一种图片锁定方法,包括:确定对图库的第一图片的锁定指令;根据所述锁定指令,设置所述第一图片的访问权限,所述访问权限包括:拒绝、允许或者限制第三方应用对所述第一图片的访问。In a first aspect, an embodiment of the present invention provides a picture locking method, including: determining a locking instruction for a first picture in a gallery; setting an access authority for the first picture according to the locking instruction, where the access authority includes : Deny, allow or restrict the access of the third-party application to the first picture.

可选的,确定对图库的第一图片的锁定指令,包括:在图库的缩略图展示界面或者图片展示界面,检测到作用于所述第一图片的锁定动作时,确定获取到对所述第一图片的锁定指令。Optionally, determining the locking instruction for the first picture of the gallery includes: on the thumbnail display interface or the picture display interface of the gallery, when a locking action acting on the first picture is detected, determining to acquire the first picture. A lock command for a picture.

可选的,所述缩略图展示界面或者所述图片展示界面通过在所述图库的操作触发;或者,Optionally, the thumbnail display interface or the picture display interface is triggered by an operation in the gallery; or,

所述缩略图展示界面或者所述图片展示界面通过第三方应用调用所述图库触发;或者,The thumbnail display interface or the picture display interface is triggered by a third-party application calling the gallery; or,

所述缩略图展示界面或者所述图片展示界面通过设置第三方应用的图库访问权限触发。The thumbnail display interface or the picture display interface is triggered by setting the gallery access permission of the third-party application.

可选的,所述缩略图展示界面或者所述图片展示界面通过设置第三方应用的图库访问权限触发,包括:Optionally, the thumbnail display interface or the picture display interface is triggered by setting a gallery access permission of a third-party application, including:

检测到设置第三方应用的图库访问权限时,显示图库访问受限选项;When it is detected to set the gallery access permission of third-party apps, the gallery access restricted option is displayed;

检测到对所述图库访问受限选项的操作时,显示所述缩略图展示界面或者所述图片展示界面。When an operation on the gallery access limited option is detected, the thumbnail display interface or the picture display interface is displayed.

可选的,确定对图库第一图片的锁定指令,包括:Optionally, determine the locking instruction for the first image in the gallery, including:

基于图片特征识别算法确定图库的第一图片包含预设隐私特征时,确定对所述第一图片的锁定指令。本发明实施例中,确定对第一图片的锁定指令,包括通过用户对第一图片的锁定动作,触发对第一图片的锁定指令。可选的,确定对第一图片的锁定指令还可以包括:通过图片特征识别算法识别第一图片包含预设隐私特征时,自动触发对第一图片的锁定指令。当然,也可以在通过图片特征识别算法识别第一图片包含预设隐私特征之后,再结合用户的锁定动作,触发对第一图片的锁定指令。When it is determined based on the image feature identification algorithm that the first image of the gallery contains a preset privacy feature, a locking instruction for the first image is determined. In this embodiment of the present invention, determining the locking instruction for the first picture includes triggering the locking instruction for the first picture through a user's locking action on the first picture. Optionally, determining the locking instruction for the first picture may further include: automatically triggering the locking instruction for the first picture when it is recognized that the first picture contains a preset privacy feature through a picture feature identification algorithm. Of course, it is also possible to trigger the locking instruction for the first picture in combination with the user's locking action after identifying that the first picture contains the preset privacy feature through the picture feature identification algorithm.

可选的,基于图片特征识别算法确定图库的第一图片包含预设隐私特征,包括以下中的一项或多项:Optionally, it is determined based on a picture feature identification algorithm that the first picture of the gallery contains preset privacy features, including one or more of the following:

检测到所述图库处于浏览状态时,通过所述图片特征识别算法确定图库包含的各图片是否包含预设隐私特征;如果所述图库中的至少一张图片包含所述预设隐私特征,则所述至少一张图片为所述第一图片,并确定所述第一图片包含所述预设隐私特征;When it is detected that the gallery is in a browsing state, determine whether each picture included in the gallery includes a preset privacy feature through the image feature identification algorithm; if at least one picture in the gallery includes the preset privacy feature, then The at least one picture is the first picture, and it is determined that the first picture includes the preset privacy feature;

检测到所述图库增加图片时,采用图片特征识别算法确定增加的图片是否包含预设隐私特征;如果图库增加的所述图片包含所述预设隐私特征,则图库增加的所述图片为所述第一图片,并确定所述第一图片包含所述预设隐私特征;When it is detected that a picture has been added to the gallery, a picture feature identification algorithm is used to determine whether the added picture contains a preset privacy feature; if the image added to the gallery contains the preset privacy feature, the image added to the gallery is the a first picture, and determining that the first picture includes the preset privacy feature;

检测到所述图库删除图片时,采用图片特征识别算法确定待删除的图片是否包含预设隐私特征;如果图库删除的所述图片包含所述预设隐私特征,则图库删除的所述图片为所述第一图片,并确定所述第一图片包含所述预设隐私特征;When it is detected that the picture is deleted from the gallery, a picture feature recognition algorithm is used to determine whether the picture to be deleted contains the preset privacy feature; if the picture deleted from the gallery contains the preset privacy feature, the picture deleted from the gallery is the first picture, and determine that the first picture includes the preset privacy feature;

所述图库中的图片被第三方应用调用时,采用图片特征识别算法确定被调用的图片是否包含预设隐私特征;如果被调用的图片包含预设隐私特征,则被调用的所述图片为所述第一图片,并确定所述第一图片包含预设隐私特征。When a picture in the gallery is called by a third-party application, a picture feature identification algorithm is used to determine whether the called picture contains a preset privacy feature; if the called picture contains a preset privacy feature, the called picture is the The first picture is determined, and it is determined that the first picture includes a preset privacy feature.

可选的,所述拒绝、允许或者限制第三方应用对所述第一图片的访问,包括:Optionally, the denying, allowing or restricting the access of the third-party application to the first picture includes:

拒绝、允许或者限制第三方应用对所述第一图片的编辑、调用、查看和分享中的一项或多项的组合。One or a combination of one or more of the editing, calling, viewing and sharing of the first picture by the third-party application is denied, allowed or restricted.

可选的,根据所述锁定指令,设置所述第一图片的访问权限,还包括:Optionally, according to the locking instruction, setting the access authority of the first picture, further comprising:

设置访问所述第一图片需提供的验证密钥,所述验证密钥包括:人脸密钥、指纹密钥、手势密钥、字符串密钥以及终端设备姿态密钥中的一项或多项的组合。Set the verification key that needs to be provided to access the first picture, the verification key includes: one or more of a face key, a fingerprint key, a gesture key, a string key, and a terminal device gesture key combination of items.

可选的,设置访问所述第一图片需提供的验证密钥,包括:Optionally, set the verification key required to access the first picture, including:

将图库所在终端设备的解锁密钥配置为所述第一图片的验证密钥;或者,Configure the unlock key of the terminal device where the gallery is located as the verification key of the first picture; or,

独立为第三方应用设置访问所述第一图片的验证密钥。A verification key for accessing the first picture is independently set for the third-party application.

可选的,设置访问所述第一图片需提供的验证密钥,包括:Optionally, set the verification key required to access the first picture, including:

对不同的第三方应用分别设置访问所述第一图片的验证密钥;和/或,Setting a verification key for accessing the first picture for different third-party applications; and/or,

同一个第三方应用对所述第一图片的不同访问操作设置相同或者不同的验证密钥。The same third-party application sets the same or different verification keys for different access operations of the first picture.

可选的,根据所述锁定指令,设置所述第一图片的访问权限之后,所述方法还包括:设置所述第一图片在图库的显示方式为以下中的一种或多种的组合:Optionally, after setting the access authority of the first picture according to the locking instruction, the method further includes: setting the display mode of the first picture in the gallery to be a combination of one or more of the following:

所述第一图片上显示锁定图标;A lock icon is displayed on the first picture;

所述第一图片的缩略图上显示锁定图标;A lock icon is displayed on the thumbnail of the first picture;

所述第一图片显示为密文;The first picture is displayed as ciphertext;

所述第一图片的缩略图显示为密文;The thumbnail of the first picture is displayed as ciphertext;

所述第一图片在图库隐藏。The first picture is hidden in the gallery.

第二方面,本发明实施例提供了一种图片访问管理方法,包括:In a second aspect, an embodiment of the present invention provides a picture access management method, including:

检测到第三方应用对图库的第一图片的访问操作时,确定所述第三方应用对所述第一图片的访问权限,所述访问权限包括:拒绝、允许或者限制第三方应用对所述第一图片的访问;When detecting the access operation of the third-party application to the first picture in the gallery, determine the access authority of the third-party application to the first picture, and the access authority includes: denying, allowing or restricting the third-party application's access to the first picture. access to a picture;

根据所述第三方应用具有的对所述第一图片的访问权限,执行所述第三方应用对所述第一图片的访问。According to the access authority to the first picture possessed by the third-party application, the access of the third-party application to the first picture is executed.

可选的,所述拒绝、允许或者限制第三方应用对所述第一图片的访问,包括:Optionally, the denying, allowing or restricting the access of the third-party application to the first picture includes:

拒绝、允许或者限制第三方应用对所述第一图片的编辑、调用、查看和分享中的一项或多项的组合。One or a combination of one or more of the editing, calling, viewing and sharing of the first picture by the third-party application is denied, allowed or restricted.

可选的,根据所述第三方应用具有的对所述第一图片的访问权限,执行所述第三方应用对所述第一图片的访问,包括:Optionally, according to the access authority to the first picture possessed by the third-party application, executing the access of the third-party application to the first picture, including:

检测到第三方应用对所述第一图片的访问操作时,提示用户输入第三方应用访问所述第一图片需要的验证密钥,所述验证密钥包括:人脸密钥、指纹密钥、手势密钥、字符串密钥以及终端设备姿态密钥中的一项或多项的组合;When detecting the access operation of the first picture by the third-party application, prompt the user to input the verification key required by the third-party application to access the first picture, the verification key includes: face key, fingerprint key, A combination of one or more of gesture keys, string keys and terminal device gesture keys;

如果用户输入的所述验证密钥验证通过,则执行所述第三方应用对所述第一图片的访问。If the verification key entered by the user passes the verification, the third-party application accesses the first picture.

可选的,根据所述第三方应用具有的对所述第一图片的访问权限,执行所述第三方应用对所述第一图片的访问,包括:Optionally, according to the access authority to the first picture possessed by the third-party application, executing the access of the third-party application to the first picture, including:

检测到第三方应用对所述第一图片的访问操作时,则触发以下一项或多项验证信息的采集,其中包括:触发摄像头拍摄当前用户的人脸图像,触发对用户指纹的采集和触发对终端设备姿态的采集;When an access operation to the first picture by a third-party application is detected, the collection of one or more of the following verification information is triggered, including: triggering the camera to capture the face image of the current user, triggering the collection and triggering of the user's fingerprint Collection of attitude of terminal equipment;

如果采集的所述验证信息验证通过,则执行所述第三方应用对所述第一图片的访问。If the collected verification information passes the verification, execute the access to the first picture by the third-party application.

可选的,所述第三方应用对所述第一图片的不同访问操作具有相同或者不同的验证密钥。Optionally, different access operations of the first picture by the third-party application have the same or different verification keys.

可选的,当第三方应用对所述第一图片的访问权限为拒绝,或者,第三方应用对所述第一图片的访问权限为限制且未开始验证或验证失败时,所述第一图片对所述第三方应用的显示方式,包括以下中的一项或多项:Optionally, when the access authority of the third-party application to the first picture is denial, or the access authority of the third-party application to the first picture is restricted and the verification is not started or the verification fails, the first picture The display mode of the third-party application, including one or more of the following:

向所述第三方应用展示的图片不包含所述第一图片;The picture displayed to the third-party application does not include the first picture;

所述第一图片显示为密文;The first picture is displayed as ciphertext;

所述第一图片的缩略图显示为密文。The thumbnail of the first picture is displayed as cipher text.

可选的,所述第一图片在所述图库的查看方式,包括以下中的一项或多项:Optionally, the viewing mode of the first picture in the gallery includes one or more of the following:

所述第一图片在所述图库允许查看;The first picture is allowed to be viewed in the gallery;

所述第一图片在所述图库拒绝查看;The first picture refuses to be viewed in the gallery;

所述第一图片在所述图库限制查看,其中,在限制查看时,如果输入查看第一图片所需的密钥,则支持在图库对所述第一图片的查看。The viewing of the first picture in the gallery is restricted, wherein, when the viewing of the first picture is restricted, if a key required for viewing the first picture is input, the viewing of the first picture in the gallery is supported.

可选的,所述方法还包括:如果基于验证密钥验证失败,则调用摄像头拍摄当前用户信息,并将拍摄当前用户信息作为访问记录存储。Optionally, the method further includes: if the verification based on the verification key fails, invoking a camera to photograph the current user information, and storing the photographed current user information as an access record.

第三方面,本发明实施例提供了一种图片锁定装置,包括:确定模块,用于确定对图库的第一图片的锁定指令;权限设置模块,用于根据所述锁定指令,设置所述第一图片的访问权限,所述访问权限包括:拒绝、允许或者限制第三方应用对所述第一图片的访问。In a third aspect, an embodiment of the present invention provides a picture locking device, including: a determining module, configured to determine a locking instruction for a first picture of a gallery; a permission setting module, configured to set the first image according to the locking instruction An access right of a picture, where the access right includes: denying, allowing or restricting the access of a third-party application to the first picture.

第四方面,本发明实施例提供了一种图片访问管理装置,包括:确定模块,用于检测到第三方应用对图库的第一图片的访问操作时,确定所述第三方应用对所述第一图片的访问权限,所述访问权限包括:拒绝、允许或者限制第三方应用对所述第一图片的访问;访问管理模块,用于根据所述第三方应用具有的对所述第一图片的访问权限,执行所述第三方应用对所述第一图片的访问。In a fourth aspect, an embodiment of the present invention provides a picture access management apparatus, including: a determination module configured to determine, when an access operation by a third-party application to a first picture of a gallery is detected, determine whether the third-party application has An access right to a picture, the access right includes: denying, allowing or restricting access to the first picture by a third-party application; an access management module, configured to The access permission is to execute the access of the third-party application to the first picture.

第五方面,本发明实施例提供了一种终端设备,包括:至少一个处理器;以及与所述处理器通信连接的至少一个存储器,其中:所述存储器存储有可被所述处理器执行的程序指令,所述处理器调用所述程序指令以执行第一方面、第二方面或者第一方面/第二方面任一可能实施例所述的方法。In a fifth aspect, an embodiment of the present invention provides a terminal device, including: at least one processor; and at least one memory communicatively connected to the processor, wherein: the memory stores a program that can be executed by the processor Program instructions to be invoked by the processor to perform the method of the first aspect, the second aspect, or any possible embodiment of the first/second aspect.

第六方面,本发明实施例提供了一种计算机可读存储介质,所述计算机可读存储介质包括存储的程序,其中,在所述程序运行时控制所述计算机可读存储介质所在设备执行第一方面、第二方面或者第一方面/第二方面任一可能实施例所述的方法。In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, where the computer-readable storage medium includes a stored program, wherein when the program is run, a device on which the computer-readable storage medium is located is controlled to execute the first step. The method described in the first aspect, the second aspect or any possible embodiment of the first aspect/second aspect.

本发明实施例中,根据锁定指令对图库中的图片(如第一图片)进行锁定,其中第一图片的权限可以为拒绝、允许或者限制第三方应用对第一图片的访问。对于没有访问权限或者访问权限受限的第三方应用,则无法访问或者需要验证后才能访问第一图片,由此可以保护图库中相关图片的访问安全。In this embodiment of the present invention, a picture in the gallery (eg, the first picture) is locked according to the locking instruction, where the authority of the first picture may be to deny, allow or restrict the access of the third-party application to the first picture. For third-party applications with no access rights or limited access rights, the first image cannot be accessed or can only be accessed after verification, so that access security of related images in the gallery can be protected.

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following briefly introduces the accompanying drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description These are some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained according to these drawings without creative efforts.

图1是本发明实施例提供的一种图片锁定方法的流程图;Fig. 1 is a flow chart of a picture locking method provided by an embodiment of the present invention;

图2是本发明实施例提供的一种图片访问管理方法的流程图;Fig. 2 is a flow chart of a picture access management method provided by an embodiment of the present invention;

图3是本发明实施例提供的一种设置第一图片访问权限的示意图;FIG. 3 is a schematic diagram of setting a first picture access authority provided by an embodiment of the present invention;

图4是本发明实施例提供的一种设置第一图片访问权限的示意图;FIG. 4 is a schematic diagram of setting a first picture access authority provided by an embodiment of the present invention;

图5是本发明实施例提供的一种设置第一图片访问权限的示意图;FIG. 5 is a schematic diagram of setting a first picture access authority provided by an embodiment of the present invention;

图6是本发明实施例提供的一种基于图库访问第一图片的示意图;6 is a schematic diagram of accessing a first picture based on a gallery provided by an embodiment of the present invention;

图7是本发明实施例提供的一种设置第一图片访问权限的示意图;FIG. 7 is a schematic diagram of setting a first picture access authority provided by an embodiment of the present invention;

图8是本发明实施例提供的一种设置第一图片访问权限的示意图;FIG. 8 is a schematic diagram of setting a first picture access authority provided by an embodiment of the present invention;

图9是本发明实施例提供的一种设置第一图片访问权限的示意图;FIG. 9 is a schematic diagram of setting a first picture access authority provided by an embodiment of the present invention;

图10是本发明实施例提供的一种设置第一图片访问权限的示意图;FIG. 10 is a schematic diagram of setting a first picture access authority provided by an embodiment of the present invention;

图11是本发明实施例提供的一种设置第一图片访问权限的示意图;FIG. 11 is a schematic diagram of setting a first picture access authority according to an embodiment of the present invention;

图12是本发明实施例提供的一种设置第一图片访问权限的示意图;FIG. 12 is a schematic diagram of setting a first picture access authority according to an embodiment of the present invention;

图13是本发明实施例提供的一种增减第一图片的示意图;13 is a schematic diagram of adding or subtracting a first picture provided by an embodiment of the present invention;

图14是本发明实施例提供的一种A应用调用第一图片的示意图;14 is a schematic diagram of an application A calling a first picture according to an embodiment of the present invention;

图15是本发明实施例提供的一种图片锁定装置的结构示意图;15 is a schematic structural diagram of a picture locking device provided by an embodiment of the present invention;

图16是本发明实施例提供的一种图片访问管理装置的结构示意图;16 is a schematic structural diagram of a picture access management apparatus provided by an embodiment of the present invention;

图17是本发明实施例提供的一种终端设备的结构示意图。FIG. 17 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.

具体实施方式Detailed ways

为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

为了保护图库中部分或者全部图片的安全,本发明实施例提供了一种图片锁定方法。该方法可以根据用户的需求,对图库中的指定图片进行锁定(称为锁定图片)。锁定图片的权限可以为拒绝、允许或者限制第三方应用对锁定图片的访问。对于没有访问权限或者访问权限受限的第三方应用,则无法访问锁定图片或者通过验证之后才可以访问锁定图片,由此可以保护图库中锁定图片的访问安全。In order to protect the security of some or all of the pictures in the gallery, an embodiment of the present invention provides a picture locking method. This method can lock the specified picture in the gallery according to the needs of the user (called lock picture). The permission to lock the picture can be denying, allowing or restricting the access of the third-party application to the locked picture. For third-party applications that do not have access rights or have limited access rights, the locked images cannot be accessed or the locked images can be accessed only after passing the authentication, which can protect the access security of the locked images in the gallery.

本发明实施例的图片锁定方法可以应用于具有图库的终端设备中。所述终端设备例如可以是:手机(Mobile Phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(Mobile Internet Device,MID)、可穿戴设备,虚拟现实(Virtual Reality,VR)设备、增强现实(Augmented Reality,AR)设备、工业控制(Industrial Control)中的无线终端、无人驾驶(Self Driving)中的无线终端、远程手术(Remote Medical Surgery)中的无线终端、智能电网(Smart Grid)中的无线终端、运输安全(Transportation Safety)中的无线终端、智慧城市(Smart City)中的无线终端、智慧家庭(Smart Home)中的无线终端等,本发明实施例对终端设备的具体实现形式不作具体限定。以下将结合具体附图,对本发明实施例的图片锁定方法进行详细说明。The picture locking method of the embodiment of the present invention can be applied to a terminal device having a gallery. The terminal device may be, for example, a mobile phone (Mobile Phone), a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (Mobile Internet Device, MID), a wearable device, a virtual reality (Virtual Reality, VR) device, augmented reality (Augmented Reality, AR) equipment, wireless terminals in Industrial Control, wireless terminals in Self Driving, wireless terminals in Remote Medical Surgery, Smart Grid wireless terminals in transportation safety (Transportation Safety), wireless terminals in smart cities (Smart City), wireless terminals in smart homes (Smart Home), etc., the embodiments of the present invention do not make any reference to the specific implementation form of the terminal equipment. Specific restrictions. The picture locking method according to the embodiment of the present invention will be described in detail below with reference to the specific drawings.

图1是本发明实施例提供的一种图片锁定方法的流程图。如图1所示,该方法的执行主体可以为上述任一支持图库的终端设备。该方法的处理步骤包括:FIG. 1 is a flowchart of a picture locking method provided by an embodiment of the present invention. As shown in FIG. 1 , the execution body of the method may be any of the above-mentioned terminal devices supporting a gallery. The processing steps of the method include:

101,确定对图库的第一图片的锁定指令。其中,所述第一图片可以是图库中的任意一张或多张图片。即可以对图库中的一张或多张图片进行锁定。101. Determine a locking instruction for the first picture of the gallery. Wherein, the first picture may be any one or more pictures in the gallery. That is, you can lock one or more pictures in the gallery.

102,根据所述锁定指令,设置第一图片的访问权限,所述访问权限包括:拒绝、允许或者限制第三方应用对所述第一图片的访问。102. Set an access right of the first picture according to the locking instruction, where the access right includes: denying, allowing or restricting access to the first picture by a third-party application.

其中,拒绝、允许或者限制第三方应用对所述第一图片的访问,可以包括:拒绝、允许或者限制第三方应用对所述第一图片的编辑、调用、查看和分享等权限中的一项或多项的组合。可选的,可以拒绝第三应用对第一图片的所有访问操作,也可以拒绝第三方应用对第一图片的部分访问操作。可选的,可以允许第三方应用对第一图片的所有访问操作,也可以允许第三方应用对第一图片的部分访问操作。可选的,可以限制第三应用对第一图片的部分访问操作,也可以限制第三方应用对第一图片的所有访问操作。在一些实施例中,限制第三方应用对第一图片的访问操作可以是:提供访问第一图片所需的验证密钥之后,支持访问第一图片。Wherein, denying, allowing or restricting the access of the third-party application to the first picture may include: denying, allowing or restricting one of the permissions of the third-party application to edit, call, view and share the first picture or a combination of several. Optionally, all access operations to the first picture by the third application may be denied, and partial access operations to the first picture by a third-party application may also be denied. Optionally, all access operations to the first picture by the third-party application may be allowed, and partial access operations to the first picture by the third-party application may also be allowed. Optionally, some access operations to the first picture by the third application may be restricted, and all access operations to the first picture by a third-party application may also be restricted. In some embodiments, the operation of restricting the access of the third-party application to the first picture may be: after providing an authentication key required for accessing the first picture, support for accessing the first picture.

在一些实施例中,确定对图库的第一图片的锁定指令可以包括:在图库的缩略图展示界面或者图片展示界面检测到作用于第一图片的锁定动作时,确定获取到对第一图片的锁定指令。In some embodiments, determining the instruction to lock the first picture of the gallery may include: when a locking action acting on the first picture is detected on the thumbnail display interface or the picture display interface of the gallery, determining to obtain the lock on the first picture. Lock command.

在一些实施例中,可以从图库进入缩略图展示界面或者图片展示界面。在其它一些实施例中,也可以从第三方应用的图库权限设置界面跳转到缩略图展示界面或者图片展示界面。在一些实施例中,所述缩略图展示界面或者所述图片展示界面也可以通过第三方应用调用所述图库触发。In some embodiments, the thumbnail display interface or the picture display interface can be entered from the gallery. In some other embodiments, it is also possible to jump from a gallery permission setting interface of a third-party application to a thumbnail display interface or a picture display interface. In some embodiments, the thumbnail display interface or the picture display interface can also be triggered by invoking the gallery by a third-party application.

在一些示例中,从第三方应用跳转到缩略图展示界面或者图片展示界面可以包括:显示第三方应用界面,第三应用界面显示调用图库的调用按钮。在第三方应用界面触发调用按钮以跳转到图库的缩略图展示界面。当然在跳转到缩略图展示界面后,点击某图片的缩略图,可以进入到相应图片的图片展示界面。In some examples, jumping from a third-party application to a thumbnail display interface or a picture display interface may include displaying a third-party application interface, and the third application interface displays a call button for calling the gallery. Trigger the call button on the third-party application interface to jump to the thumbnail display interface of the gallery. Of course, after jumping to the thumbnail display interface, click the thumbnail of a picture to enter the picture display interface of the corresponding picture.

在其它一些示例中,从与第三方应用相关的图库权限设置界面跳转到缩略图展示界面或者图片展示界面,包括:显示第三方应用的图库权限设置界面。例如下载第三方应用时会显示第三应用的图库权限设置界面。或者,从终端设备的设置应用中也可以进入到第三方应用的图库权限设置界面。通过第三应用的图库权限设置界面也可以跳转到图库的缩略图展示界面。当然在跳转到缩略图展示界面后,点击某图片的缩略图,可以进入到相应图片的图片展示界面。In some other examples, jumping from the gallery permission setting interface related to the third-party application to the thumbnail display interface or the picture display interface includes: displaying the gallery permission setting interface of the third-party application. For example, when a third-party application is downloaded, the gallery permission setting interface of the third application will be displayed. Alternatively, you can also enter the gallery permission setting interface of the third-party application from the setting application of the terminal device. You can also jump to the thumbnail display interface of the gallery through the gallery permission setting interface of the third application. Of course, after jumping to the thumbnail display interface, click the thumbnail of a picture to enter the picture display interface of the corresponding picture.

在一些实施例中,上述锁定动作包括选择操作和/或对锁定功能按钮的触发。其中,选择操作用于选定待锁定的图片。In some embodiments, the above-mentioned locking action includes a selection operation and/or triggering of a locking function button. The selection operation is used to select a picture to be locked.

在一些实施例中,图库的缩略图展示界面显示各个图片的缩略图和锁定功能按钮。检测到对至少一个图片缩略图的选择操作之后,如果检测到对锁定功能按钮的触发操作,则确定触发对所选图片的锁定指令。In some embodiments, the thumbnail display interface of the gallery displays thumbnails of each picture and a lock function button. After detecting the selection operation of the at least one picture thumbnail, if the triggering operation of the locking function button is detected, it is determined to trigger the locking instruction for the selected picture.

在一些实施例中,在图库的图片展示界面显示锁定功能按钮。在图片展示界面检测到对锁定功能按钮的触发操作之后,则确定触发对相应图片的锁定指令。In some embodiments, a lock function button is displayed on the picture display interface of the gallery. After the picture display interface detects the triggering operation on the locking function button, it is determined to trigger the locking instruction on the corresponding picture.

在一些实施例中,当通过第三方应用或者与第三方应用相关的图库权限设置界面跳转到缩略图展示界面时,当检测到对缩略图展示界面上图片缩略图的选择操作时,则确定触发对所选图片确定的锁定指令。可选的,缩略图展示界面具有展示模式和选择模式。在展示模式时,缩略图展示界面用于对各图片的缩略图进行展示,各图片缩略图不支持进行选择。当缩略图展示界面处于选择模式时,第一界面中的各图片缩略图处于可选择状态,上述步骤中在各图片缩略图处于可选择状态时,检测相应的选择操作。In some embodiments, when jumping to the thumbnail display interface through a third-party application or a gallery permission setting interface related to the third-party application, when a selection operation of a picture thumbnail on the thumbnail display interface is detected, determine Triggers the lock command determined on the selected picture. Optionally, the thumbnail display interface has a display mode and a selection mode. In the display mode, the thumbnail display interface is used to display the thumbnails of each picture, and each picture thumbnail does not support selection. When the thumbnail display interface is in the selection mode, each picture thumbnail in the first interface is in a selectable state, and in the above steps, when each picture thumbnail is in a selectable state, a corresponding selection operation is detected.

在一些实施例中,除了通过锁定动作确定对图库第一图片的锁定指令之外,还可以基于图片特征识别算法识别图库包含的特征,并根据图片是否包含预设隐私特征来确定对第一图片的锁定指令,即可以通过图片特征识别算法自动触发对图片的锁定指令。具体的,预先设置图片特征识别算法。图片特征识别算法可以对图库包含的各图片进行图片特征检测。根据检测结果,如果某图片(如第一图片)包含预设隐私特征,则可以触发对第一图片的锁定指令。可选的,所述预设隐私特征例如可以是特定证件特征和/或指定生物特征。其中,指定证件特征例如可以是身份证、护照等证件特征。指定生物特征例如可以是指定用户的面部特征、指纹特征等。In some embodiments, in addition to determining the locking instruction for the first picture in the gallery through the locking action, the features included in the gallery can also be identified based on a picture feature recognition algorithm, and the first picture can be determined according to whether the picture includes a preset privacy feature. The lock instruction, that is, the lock instruction for the picture can be automatically triggered by the image feature recognition algorithm. Specifically, a picture feature recognition algorithm is preset. The image feature recognition algorithm can perform image feature detection on each image contained in the gallery. According to the detection result, if a certain picture (such as the first picture) contains a preset privacy feature, a locking instruction for the first picture can be triggered. Optionally, the preset privacy feature may be, for example, a specific credential feature and/or a designated biometric feature. The specified certificate feature may be, for example, an ID card, a passport or other certificate features. The specified biometric feature may be, for example, the facial feature, fingerprint feature, etc. of the specified user.

在一些实施例中,通过上述图片特征识别算法确定第一图片包含预设隐私特征,可以包括以下一种或多种情况的组合:In some embodiments, determining that the first picture contains a preset privacy feature through the above-mentioned picture feature identification algorithm may include a combination of one or more of the following conditions:

检测到图库处于浏览状态时,通过所述图片特征识别算法确定图库包含的各图片是否包含预设隐私特征。如果所述图库中的至少一张图片包含所述预设隐私特征,则所述至少一张图片为所述第一图片,并确定所述第一图片包含所述预设隐私特征。可选的,在图库处于浏览状态时,如果通过图片特征识别算法识别到某一张或多张图片包含预设隐私特征,则可以自动触发对第一图片的锁定指令。可选的,当通过图片特征识别算法识别到某一张或多张图片包含预设隐私特征时,也可以弹出提示信息,提示信息中可以指出:包含预设隐私特征的图片,以及是否对相应图片进行锁定的信息。如果用户确定对包含隐私特征信息的图片进行锁定,则可以确定对第一图片的锁定指令。When it is detected that the gallery is in a browsing state, whether each image included in the gallery contains preset privacy features is determined by the image feature identification algorithm. If at least one picture in the gallery includes the preset privacy feature, the at least one picture is the first picture, and it is determined that the first picture includes the preset privacy feature. Optionally, when the gallery is in the browsing state, if one or more pictures are identified by the picture feature identification algorithm as containing the preset privacy feature, the locking instruction for the first picture can be automatically triggered. Optionally, when it is identified through the image feature recognition algorithm that one or more pictures contain preset privacy features, a prompt message may also pop up, and the prompt message may indicate: pictures containing preset privacy features, and whether the corresponding Information about the picture to be locked. If the user determines to lock the picture containing the privacy feature information, a locking instruction for the first picture may be determined.

检测到所述图库增加图片时,采用图片特征识别算法确定增加的图片是否包含预设隐私特征;如果图库增加的所述图片包含所述预设隐私特征,则图库增加的所述图片为所述第一图片,并确定所述第一图片包含所述预设隐私特征。即,当图库新增加的图片包含预设隐私特征时,可以自动触发对第一图片的锁定指令。可选的,当新增图片包含预设隐私特征时,也可以弹出提示信息,提示信息中可以指出:新增图片包含预设隐私特征,以及是否对相应图片进行锁定的信息。如果用户确定对新增图片进行锁定,则可以确定对第一图片的锁定指令。When it is detected that a picture has been added to the gallery, a picture feature identification algorithm is used to determine whether the added picture contains a preset privacy feature; if the image added to the gallery contains the preset privacy feature, the image added to the gallery is the a first picture, and it is determined that the first picture includes the preset privacy feature. That is, when the newly added picture in the gallery contains the preset privacy feature, the locking instruction for the first picture can be automatically triggered. Optionally, when the newly added picture contains a preset privacy feature, a prompt message may also pop up, and the prompt message may indicate that the newly added picture contains the preset privacy feature and information on whether to lock the corresponding picture. If the user determines to lock the newly added picture, a locking instruction for the first picture may be determined.

检测到所述图库删除图片时,采用图片特征识别算法确定待删除的图片是否包含预设隐私特征;如果图库删除的所述图片包含所述预设隐私特征,则图库删除的所述图片为所述第一图片,并确定所述第一图片包含所述预设隐私特征。即,当需要删除的图片包含预设隐私特征时,可以自动触发对第一图片的锁定指令。可选的,当需要删除的图片包含预设隐私特征时,也可以弹出提示信息,提示信息中可以指出:需要删除的图片包含预设隐私特征,以及是否对相应图片进行锁定的信息。如果用户确定对需要删除的图片进行锁定,则可以确定对第一图片的锁定指令。When it is detected that the picture is deleted from the gallery, a picture feature recognition algorithm is used to determine whether the picture to be deleted contains the preset privacy feature; if the picture deleted from the gallery contains the preset privacy feature, the picture deleted from the gallery is the first picture, and it is determined that the first picture includes the preset privacy feature. That is, when the picture to be deleted contains the preset privacy feature, the locking instruction for the first picture can be automatically triggered. Optionally, when the picture to be deleted contains preset privacy features, a prompt message may also pop up, and the prompt message may indicate that the picture to be deleted contains preset privacy features and information on whether to lock the corresponding picture. If the user determines to lock the picture to be deleted, a lock instruction for the first picture may be determined.

所述图库中的图片被第三方应用调用时,采用图片特征识别算法确定被调用的图片是否包含预设隐私特征;如果被调用的图片包含预设隐私特征,则被调用的所述图片为所述第一图片,并确定所述第一图片包含预设隐私特征。即,当检测到图库中的图片被调用时,如果通过图片特征识别算法确定被调用的图片包含预设隐私特征,则可以触发对被调用图片的锁定指令。或者,可以弹出提示信息,提示信息中可以指出:被调用的图片包含预设隐私特征,以及是否对相应图片进行锁定的信息。如果用户确定对被调用图片进行锁定,则可以确定对第一图片的锁定指令。When a picture in the gallery is called by a third-party application, a picture feature identification algorithm is used to determine whether the called picture contains a preset privacy feature; if the called picture contains a preset privacy feature, the called picture is the The first picture is determined, and it is determined that the first picture includes a preset privacy feature. That is, when it is detected that a picture in the gallery is called, if it is determined by the picture feature identification algorithm that the called picture contains the preset privacy feature, the locking instruction for the called picture can be triggered. Alternatively, a prompt message may pop up, and the prompt message may indicate that the called picture contains preset privacy features and information on whether to lock the corresponding picture. If the user determines to lock the called picture, a lock instruction for the first picture may be determined.

本发明实施例中,当对第一图片触发锁定指令之后,可以设置第一图片的访问权限为:拒绝、允许或者限制第三方应用对所述第一图片的编辑、调用、查看和分享中的一项或多项的组合。In the embodiment of the present invention, after triggering the lock instruction for the first picture, the access authority of the first picture may be set to: deny, allow or restrict the editing, calling, viewing and sharing of the first picture by third-party applications. A combination of one or more items.

在一些实施例中,根据所述锁定指令,设置所述第一图片的访问权限,还包括:设置访问所述第一图片需提供的验证密钥,所述验证密钥包括:人脸密钥、指纹密钥、手势密钥、字符串密钥以及终端设备姿态密钥中的一项或多项的组合。In some embodiments, setting the access authority of the first picture according to the locking instruction further includes: setting a verification key to be provided to access the first picture, the verification key comprising: a face key , a combination of one or more of the fingerprint key, gesture key, string key, and terminal device gesture key.

在一些实施例中,设置访问所述第一图片需提供的验证密钥,包括:将图库所在终端设备的解锁密钥配置为所述第一图片的验证密钥;或者,独立为第三方应用设置访问所述第一图片的验证密钥。其中,独立为第三应用设置验证密钥时,可以显示密钥设置界面,通过密钥设置界面设置所述验证密钥。In some embodiments, setting the verification key to be provided to access the first picture includes: configuring the unlock key of the terminal device where the gallery is located as the verification key of the first picture; or, independently being a third-party application Set a verification key for accessing the first picture. Wherein, when the verification key is independently set for the third application, a key setting interface can be displayed, and the verification key is set through the key setting interface.

在一些实施例中,设置访问所述第一图片需提供的验证密钥,包括:对不同的第三方应用分别设置访问所述第一图片的验证密钥;和/或,同一个第三方应用对所述第一图片的不同访问操作设置相同或者不同的验证密钥。In some embodiments, setting the verification key to be provided for accessing the first picture includes: setting verification keys for accessing the first picture for different third-party applications respectively; and/or, the same third-party application The same or different verification keys are set for different access operations of the first picture.

在一些实施例中,除了设置第三方应用对第一图片的访问权限之外,还可以设置图库对第一图片的访问权限。其中,图库对第一图片的访问权限可以是:允许直接查看,或者,密钥验证通过后允许访问第一图片。In some embodiments, in addition to setting the access right of the third-party application to the first picture, the access right of the gallery to the first picture may also be set. Wherein, the access authority of the gallery to the first picture may be: allow direct viewing, or allow access to the first picture after the key verification is passed.

在一些实施例中,可以通过图库同时设置图库和第三应用对第一图片的访问权限。当然,也可以在第三方应用或者与第三方应用相关的图库权限设置界面设置第三方应用对第一图片的访问权限。In some embodiments, the access rights of the gallery and the third application to the first picture can be set simultaneously through the gallery. Of course, the access permission of the third-party application to the first picture can also be set in the third-party application or the gallery permission setting interface related to the third-party application.

在一个具体示例中,设置第一图片的访问权限可以包括:显示权限设置弹窗,权限设置弹窗包括多个权限选项;根据对权限选项的选择操作,确定第一图片的访问权限。例如,在权限设置弹窗中可以设置第一图片的访问条件,其访问条件例如可以是密钥验证通过后可以访问;例如可以是在指定位置/时间可以访问等,此处不再对权限选项的可实现内容一一列举。In a specific example, setting the access permission of the first picture may include: displaying a permission setting pop-up window, where the permission setting pop-up window includes multiple permission options; and determining the access permission of the first picture according to the selection operation of the permission options. For example, the access condition of the first picture can be set in the permission setting pop-up window. The access condition can be, for example, that it can be accessed after the key verification is passed; The achievable contents are listed one by one.

在一些实施例中,在图库设置第一图片的访问权限可以为:仅允许图库访问,即拒绝除所述图库之外的所有第三方应用访问。其中,允许图库访问可以包括:在图库中可以直接查看第一图片的缩略图或者图片内容。或者,在图库中输入密钥后可以查看第一图片的缩略图或者图片内容。In some embodiments, setting the access permission of the first picture in the gallery may be: only allowing access to the gallery, that is, denying access to all third-party applications except the gallery. Wherein, allowing access to the gallery may include: directly viewing the thumbnail or image content of the first image in the gallery. Alternatively, after entering the key in the gallery, you can view the thumbnail or the content of the first picture.

在一些实施例中,确定第一图片的访问权限之后,第一图片在所述图库中的显示方式包括以下一种或多种的组合:所述第一图片上显示锁定图标;所述第一图片的缩略图上显示锁定图标;所述第一图片显示为密文;所述第一图片的缩略图显示为密文;所述第一图片在图库隐藏。In some embodiments, after the access authority of the first picture is determined, the display manner of the first picture in the gallery includes one or more of the following combinations: a lock icon is displayed on the first picture; A lock icon is displayed on the thumbnail of the picture; the first picture is displayed as cipher text; the thumbnail of the first picture is displayed as cipher text; the first picture is hidden in the gallery.

与上述图片锁定方法相对应,本发明实施例还提供了一种图片访问管理方法。如图2所示,该方法包括:Corresponding to the above picture locking method, an embodiment of the present invention further provides a picture access management method. As shown in Figure 2, the method includes:

201,检测到第三方应用对图库的第一图片的访问操作时,确定所述第三方应用对所述第一图片的访问权限,所述访问权限包括:拒绝、允许或者限制第三方应用对所述第一图片的访问。201. When detecting an access operation of a third-party application to a first picture in a gallery, determine an access authority of the third-party application to the first picture, where the access authority includes: denying, allowing, or restricting the third-party application's access to the first picture; Access to the first picture described.

202,根据所述第三方应用具有的对所述第一图片的访问权限,执行所述第三方应用对所述第一图片的访问。202. Execute the access of the third-party application to the first picture according to the access authority of the third-party application to the first picture.

在一些实施例中,所述拒绝、允许或者限制第三方应用对所述第一图片的访问,包括:拒绝、允许或者限制第三方应用对所述第一图片的编辑、调用、查看和分享中的一项或多项的组合。In some embodiments, the denying, allowing or restricting the access of the third-party application to the first picture includes: denying, allowing or restricting the editing, calling, viewing and sharing of the first picture by the third-party application a combination of one or more of .

在一些实施例中,根据所述第三方应用具有的对所述第一图片的访问权限,执行所述第三方应用对所述第一图片的访问,包括:检测到第三方应用对所述第一图片的访问操作时,提示用户输入第三方应用访问所述第一图片需要的验证密钥,所述验证密钥包括:人脸密钥、指纹密钥、手势密钥、字符串密钥以及终端设备姿态密钥中的一项或多项的组合;如果用户输入的所述验证密钥验证通过,则执行所述第三方应用对所述第一图片的访问。In some embodiments, executing the third-party application's access to the first picture according to the access authority to the first picture possessed by the third-party application includes: detecting that the third-party application has access to the first picture. When accessing a picture, the user is prompted to input a verification key required by a third-party application to access the first picture. The verification key includes: face key, fingerprint key, gesture key, string key, and A combination of one or more of the terminal device gesture keys; if the verification key input by the user passes the verification, the third-party application will access the first picture.

在一些实施例中,根据所述第三方应用具有的对所述第一图片的访问权限,执行所述第三方应用对所述第一图片的访问,包括:检测到第三方应用对所述第一图片的访问操作时,自动触发以下一项或多项验证信息的采集,其中包括:触发摄像头拍摄当前用户的人脸图像,触发对用户指纹的采集和触发对终端设备姿态的采集;如果采集的所述验证信息验证通过,则执行所述第三方应用对所述第一图片的访问。In some embodiments, executing the third-party application's access to the first picture according to the access authority to the first picture possessed by the third-party application includes: detecting that the third-party application has access to the first picture. When a picture is accessed, the collection of one or more of the following verification information is automatically triggered, including: triggering the camera to capture the face image of the current user, triggering the collection of the user's fingerprint, and triggering the collection of the terminal device posture; If the verification information passed is verified, then the third-party application accesses the first picture.

在一些实施例中,所述第三方应用对所述第一图片的不同访问操作具有相同或者不同的验证密钥。In some embodiments, different access operations of the first picture by the third-party application have the same or different verification keys.

在一些实施例中,当第三方应用对所述第一图片的访问权限为拒绝,或者,第三方应用对所述第一图片的访问权限为限制且未开始验证或验证失败时,所述第一图片对所述第三方应用的显示方式,包括以下中的一项或多项:向所述第三方应用展示的图片不包含所述第一图片;所述第一图片显示为密文;所述第一图片的缩略图显示为密文。In some embodiments, when the access authority of the third-party application to the first picture is denied, or the access authority of the third-party application to the first picture is restricted and the verification has not started or the verification has failed, the first picture The manner in which a picture is displayed to the third-party application includes one or more of the following: the picture displayed to the third-party application does not include the first picture; the first picture is displayed as ciphertext; The thumbnail of the first picture is displayed as cipher text.

在一些实施例中,所述第一图片在所述图库的查看方式,包括以下中的一项或多项:所述第一图片在所述图库允许查看;所述第一图片在所述图库拒绝查看;所述第一图片在所述图库限制查看,其中,在限制查看时,如果输入查看第一图片所需的密钥,则支持在图库对所述第一图片的查看。In some embodiments, the viewing manner of the first picture in the gallery includes one or more of the following: the first picture is allowed to be viewed in the gallery; the first picture is in the gallery Deny viewing; the first picture is restricted from viewing in the gallery, wherein, when viewing restricted, if a key required for viewing the first picture is input, viewing of the first picture in the gallery is supported.

在一些实施例中,所述方法还包括:如果基于验证密钥验证失败,则调用摄像头拍摄当前用户信息,并将拍摄当前用户信息作为访问记录存储。In some embodiments, the method further includes: if the verification based on the verification key fails, invoking a camera to capture the current user information, and storing the captured current user information as an access record.

在一些实施例中,第一图片的访问权限还可以包括:密钥验证通过后允许图库访问;所述方法还包括:在图库检测到查看所述第一图片的指令时,提示用户输入验证密钥;如果基于所述验证密钥验证成功,则在图库显示所述第一图片。如果基于验证密钥验证失败,则不对图库显示第一图片。可选的,在密钥验证失败时,除了不对图库显示第一图片之外,还可以调用摄像头拍摄当前用户信息,并将拍摄当前用户信息作为访问记录存储。In some embodiments, the access authority of the first picture may further include: allowing access to the gallery after the key verification is passed; the method further includes: when the gallery detects an instruction to view the first picture, prompting the user to input the verification password If the verification is successful based on the verification key, the first picture is displayed in the gallery. If the authentication fails based on the authentication key, the first picture is not displayed to the gallery. Optionally, when the key verification fails, in addition to not displaying the first picture in the gallery, the camera can also be called to capture the current user information, and the captured current user information is stored as an access record.

本发明实施例中,在基于第三应用设置第一图片为锁定图片之后,还可以对第三方应用增加或者减少锁定图片。具体的,显示第三方应用的锁定范围调整界面,锁定范围调整界面至少显示多张图片的信息。在锁定范围调整界面检测到增加或者减少锁定图片的调整动作时,根据调整动作增加或者减少拒绝第三应应用访问的图片。可选的,上述锁定访问调整界面可以是图库的缩略图展示界面,在缩略图展示界面可以显示图库包含的各图片的缩略图。用户在该缩略图展示界面选择需要增加的图片或者需要减少的图片,由此以实现对第三方应用锁定图片的增减。In this embodiment of the present invention, after the first picture is set as the lock picture based on the third application, the lock picture may also be added or decreased for the third-party application. Specifically, the lock range adjustment interface of the third-party application is displayed, and the lock range adjustment interface displays at least the information of multiple pictures. When the adjustment action of increasing or decreasing the locked picture is detected in the locking range adjustment interface, the picture for which the third application should be denied access is increased or decreased according to the adjustment action. Optionally, the above lock access adjustment interface may be a thumbnail display interface of the gallery, and the thumbnail display interface of each picture included in the gallery may be displayed. The user selects the picture to be added or the picture to be decreased on the thumbnail display interface, thereby realizing the increase or decrease of the third-party application locked picture.

通过上述内容可以看出,本发明实施例的图片锁定方法可以在图库中锁定图片,也可以在第三方应用的权限设置功能中锁定图片。以下将结合具体实施例对该两种图片锁定方式进行详细说明。It can be seen from the above content that the picture locking method according to the embodiment of the present invention can lock the picture in the gallery, and can also lock the picture in the permission setting function of the third-party application. The two picture locking modes will be described in detail below with reference to specific embodiments.

图3是本发明实施例提供的一种设置第一图片访问权限的示意图。如图3所示,基于图库锁定图片的流程包括:(1)终端设备进入图库的缩略图展示界面。缩略图展示界面显示图库包含的各图片的缩略图。在图3中,各图片的缩略图采用方框表示。检测到用户在缩略图展示界面触发长按动作时,缩略图展示界面进入选择模式。(2)在选择模式中,缩略图展示界面中的各缩略图处于选择状态。可选的,各缩略图上可以显示处于选择状态的图标,如缩略图方框中的小方框用于表示缩略图处于选择状态。检测到用户点击其中一个图片的缩略图或者缩略图上的小图标时,相应图片的缩略图处于选中状态。被选中的图片缩略图上显示被选中图标。如图3-(2)中,图片缩略图1和图片缩略图2被点击选中。如图3-(3)所示,被点击选中的图片缩略图上处于选中状态。如图片缩略图1和图片缩略图2处于选中状态。进一步,处于选中模式的缩略图展示界面上显示锁定功能按钮4。用户点击锁定功能按钮4之后,图片缩略图1和图片缩略图2对应的图片被确定为锁定图片。并且图库的缩略图展示界面中显示锁定图片的权限设置弹窗,权限设置弹窗包括多个权限选项。如图3-(4)所示,权限设置弹窗中的权限选项可以包括:仅图库可见,或者,仅图库验证身份后可见。FIG. 3 is a schematic diagram of setting an access authority for a first picture according to an embodiment of the present invention. As shown in FIG. 3 , the process of locking pictures based on the gallery includes: (1) The terminal device enters the thumbnail display interface of the gallery. The thumbnail display interface displays the thumbnails of each image contained in the gallery. In FIG. 3, the thumbnails of each picture are represented by boxes. When it is detected that the user triggers a long-press action on the thumbnail display interface, the thumbnail display interface enters the selection mode. (2) In the selection mode, each thumbnail in the thumbnail display interface is in a selection state. Optionally, an icon in a selected state may be displayed on each thumbnail, for example, a small box in the thumbnail frame is used to indicate that the thumbnail is in a selected state. When it is detected that the user clicks the thumbnail of one of the pictures or the small icon on the thumbnail, the thumbnail of the corresponding picture is selected. The selected icon is displayed on the thumbnail of the selected image. As shown in Figure 3-(2), Picture Thumbnail 1 and Picture Thumbnail 2 are clicked to select. As shown in Figure 3-(3), the thumbnail of the image selected by clicking is in the selected state. For example, Picture Thumbnail 1 and Picture Thumbnail 2 are selected. Further, the lock function button 4 is displayed on the thumbnail display interface in the selected mode. After the user clicks the lock function button 4, the pictures corresponding to the picture thumbnail 1 and the picture thumbnail 2 are determined as locked pictures. In addition, the thumbnail display interface of the gallery displays a permission setting pop-up window for locking images, and the permission setting pop-up window includes multiple permission options. As shown in Figure 3-(4), the permission options in the permission setting pop-up window can include: only the gallery is visible, or, only the gallery is visible after identity verification.

如图4所示,如果用户点击仅图库可见,则锁定图片的权限为仅图库可见,除图库之外的其它第三方应用均不具有对锁定图片的操作权限,所述操作权限包含图片的查看、调用、编辑等所有操作权限。如图4所示,图片缩略图1和图片缩略图2对应的图片仅图库可见。设置锁定图片的访问权限为仅图库可见之后,图片缩略图1和图片缩略图2上显示锁定图标5。As shown in Figure 4, if the user clicks that only the gallery is visible, the permission to lock the picture is that only the gallery is visible, and other third-party applications except the gallery do not have the operation permission to the locked image, and the operation permission includes viewing the image. , call, edit and all other operation permissions. As shown in FIG. 4 , the pictures corresponding to the picture thumbnail 1 and the picture thumbnail 2 are only visible in the gallery. After setting the access permission of the locked picture to be visible only to the gallery, the lock icon 5 is displayed on the picture thumbnail 1 and the picture thumbnail 2.

如图5所示,如果用户点击仅图库验证身份后可见,则锁定图片的权限为在密钥验证通过后,仅图库可见,除图库之外的其它第三方应用均不具有对锁定图片的操作权限,所述操作权限包含图片的查看、调用、编辑等所有操作权限。如图5所示,图片缩略图1和图片缩略图2对应的图片在密钥验证通过后仅图库可见。设置锁定图片的访问权限为仅图库验证身份后可见之后,锁定图片的缩略图以密文6形式显示。当然,锁定图片的缩略图在图库中还可以隐藏显示。可选的,在图5所示示例中,可以将终端设备的开机密钥自动确定为锁定图片的验证密钥,当然也可以单独设置图库访问锁定图片的密钥。As shown in Figure 5, if the user clicks only the gallery to verify the identity, then the permission to lock the image is that after the key verification is passed, only the gallery is visible, and other third-party applications except the gallery do not have the operation to lock the image. Permissions, the operation permissions include all operation permissions such as viewing, calling, and editing pictures. As shown in FIG. 5 , the pictures corresponding to the picture thumbnail 1 and the picture thumbnail 2 are only visible to the gallery after the key verification is passed. After setting the access permission of the locked picture to be visible only after the identity verification of the gallery, the thumbnail of the locked picture is displayed in the form of ciphertext 6. Of course, the thumbnails of locked pictures can also be hidden and displayed in the gallery. Optionally, in the example shown in FIG. 5 , the power-on key of the terminal device may be automatically determined as the verification key for locking the picture, and of course, the key for accessing the locked picture from the gallery may be separately set.

如图6所示,当锁定图片的权限为仅图库验证身份后可见时,用户在照片界面点击以密文6形式显示的图片缩略图时,照片界面跳转到图片展示界面。图片展示界面中提示进行密钥验证。在一些实施例中,当验证密钥为用户指纹时,则可以提示用户输入指纹,如果指纹验证通过,则在图片展示界面显示锁定图片内容。As shown in FIG. 6 , when the permission to lock the picture is only visible after the identity verification of the gallery, when the user clicks the picture thumbnail displayed in the form of cipher text 6 on the photo interface, the photo interface jumps to the picture display interface. The image display interface prompts for key verification. In some embodiments, when the verification key is the user's fingerprint, the user may be prompted to input the fingerprint, and if the fingerprint verification passes, the locked picture content will be displayed on the picture display interface.

在一些实施例中,当在图库设置锁定图片时,当执行到图3-(3)选定待锁定的图片之后,设置锁定图片权限的界面如图7所示,锁定图片的权限包括:图库权限和第三方应用权限,当选择图库权限时进入到图3-(4)所示;当选择第三方应用权限时,如图7所示,显示可设置第一图片权限的应用列表,包括:应用A、应用B等。如果选择应用A对第一图片的权限设置,在显示应用A的权限列表。当选定“调用”权限时,可以设置对“调用”权限的允许、拒绝或者限制。如果选择“限制”,则会进一步设置调用受限方式,如可以设置A应用调用锁定图片时需输入的密钥,或者,可以设置A应用锁定图片时终端需保持的姿态,或者,可以设置A应用锁定图片时自动拍摄人脸图像进行验证。对于A应用对锁定图片的其它操作权限的设置方式可以参见“调用”权限的设置方式,此处不再一一赘述。In some embodiments, when setting a locked picture in the gallery, after the picture to be locked is selected in FIG. 3-(3), the interface for setting the permission to lock the picture is shown in FIG. 7 , and the permission to lock the picture includes: gallery Permissions and third-party application permissions, when selecting gallery permissions, enter into Figure 3-(4); when selecting third-party application permissions, as shown in Figure 7, the list of applications that can set the first picture permissions is displayed, including: App A, App B, etc. If you select the permission setting of application A for the first picture, the permission list of application A is displayed. When the "Invoke" permission is selected, you can set the permission, denial or restriction on the "Invoke" permission. If you select "restricted", you will further set the restricted method of calling, for example, you can set the key to be entered when application A calls the locked picture, or you can set the posture that the terminal needs to maintain when application A locks the picture, or you can set A Automatically take a face image for verification when the app locks the picture. For the setting method of the other operation permission of the locked picture of the A application, please refer to the setting method of the "call" permission, which will not be repeated here.

在图库中,除了可以在缩略图展示界面设置锁定图片之外,还可以在图片展示界面对图片进行锁定。如图8所示,用户可以在缩略图展示界面点击某张图片(如图片1)的缩略图进入到图片1展示界面。在图片1的展示界面显示锁定功能按钮4。用户点击锁定功能按钮4,图片1被确定为锁定图片。并且图片1展示界面中显示权限设置弹窗,权限设置弹窗包括多个权限选项。如图8所示,权限设置弹窗中的权限选项可以包括:仅图库可见,或者,仅图库验证身份后可见。当然也可以如图7所示,包括:图库权限和第三方应用权限。In the gallery, in addition to setting the locked picture on the thumbnail display interface, you can also lock the picture on the picture display interface. As shown in FIG. 8 , the user may click the thumbnail of a certain picture (eg, picture 1 ) on the thumbnail display interface to enter the picture 1 display interface. The lock function button 4 is displayed on the display interface of the picture 1. The user clicks the lock function button 4, and the picture 1 is determined as the lock picture. And the permission setting pop-up window is displayed in the display interface of picture 1, and the permission setting pop-up window includes multiple permission options. As shown in FIG. 8 , the permission options in the permission setting pop-up window may include: only the gallery is visible, or, only the gallery is visible after identity verification. Of course, it can also be shown in Figure 7, including: gallery permissions and third-party application permissions.

如图8所示,如果用户点击仅图库可见,则图片1的权限为仅图库可见,除图库之外的其它第三方应用均不具有对锁定图片的操作权限,所述操作权限包含图片的查看、调用、编辑等所有操作权限。如图9所示,设置图片1的访问权限为仅图库可见之后,图片1的展示界面中显示锁定图标5。As shown in Figure 8, if the user clicks only the gallery to be visible, the permission of the image 1 is that only the gallery is visible, and other third-party applications except the gallery do not have the operation permission to lock the image, and the operation permission includes the viewing of the image , call, edit and all other operation permissions. As shown in FIG. 9 , after the access authority of the picture 1 is set to be visible only to the gallery, a lock icon 5 is displayed on the display interface of the picture 1 .

如图10所示,如果用户点击仅图库验证身份后可见,则图片1的权限为在密钥验证通过后,仅图库可见,除图库之外的其它第三方应用均不具有对锁定图片的操作权限,所述操作权限包含图片的查看、调用、编辑等所有操作权限。如图10所示,设置图片1仅图库验证身份后可见之后,图片1的展示界面以密文7形式显示。当然,图片1还可以在图库中隐藏显示,用户可以通过访问图库的隐藏区域调出图片1。可选的,在图片展示界面设置图片1为锁定图片之后,其在缩略图展示界面的缩略图也以密文形式显示,显示形式可以参见图4中的密文6,此处不再赘述。当用户在密文7的界面点击访问图片1时,密文7会显示密钥验证窗口,通过密钥验证窗口进行密钥验证通过后,显示图片1的内容。其中,密钥验证窗口可以参考图5的示例,此处不再赘述。As shown in Figure 10, if the user clicks only the gallery to verify the identity, then the permission of image 1 is that after the key verification is passed, only the gallery is visible, and other third-party applications except the gallery do not have the operation to lock the image. Permissions, the operation permissions include all operation permissions such as viewing, calling, and editing pictures. As shown in Figure 10, after setting picture 1 to be visible only after the identity verification of the gallery, the display interface of picture 1 is displayed in the form of ciphertext 7. Of course, picture 1 can also be hidden and displayed in the gallery, and the user can call up picture 1 by accessing the hidden area of the gallery. Optionally, after the picture 1 is set as the locked picture on the picture display interface, its thumbnails on the thumbnail display interface are also displayed in cipher text form, and the display form can refer to cipher text 6 in FIG. When the user clicks to access the picture 1 on the interface of the ciphertext 7, the ciphertext 7 will display the key verification window. After the key verification is passed through the key verification window, the content of the picture 1 will be displayed. For the key verification window, reference may be made to the example in FIG. 5 , which will not be repeated here.

除了可以在图库锁定图片之外,本发明实施例支持在第三方应用的图库权限设置界面设置锁定图片。如图11所示,在A应用的图库权限设置界面,显示A应用的图库访问权限选项。可选的,图库访问权限选项可以包括:允许A应用访问图库、拒绝A应用访问图库以及A应用访问图库受限。如果应用点击允许A应用访问图库,则图库中的所有图片均可支持A应用访问。如果应用点击拒绝A应用访问图库,则图库中的所有图片均不支持A应用访问。如果用户点击受限选项时,则可以设置部分图片不支持A应用的访问,或者,也可以限定A应用对部分图片的操作权限。如图11所示,当用户点击受限选项时,从A应用的图库权限设置界面跳转到图库的缩略图展示界面。可选的,缩略图展示界面处于选择模式,缩略图展示界面中各图片缩略图处于可选择状态。用户点击需要锁定的图片缩略图之后,如选择图片缩略图1和图片缩略图2之后,相应图片缩略图上显示选中图标。可选的,缩略图展示界面上还包括确定按钮8,当用户点击确定按钮8之后,被选中的图片缩略图对应的图片被确定为锁定图片。在一些实施例中,当选定的图片被确定为锁定图片时,A应用无权访问锁定图片。在一些实施例中,如图12所示,当选定的图片被确定为锁定图片时,可以进一步编辑已选定照片的受限权限。具体的,当点击“编辑已选定照片的受限权限”按钮时,进入照片权限列表。在照片权限列表可以逐项设置A应用对所选定图片的操作权限。如图12所示,可以设置A应用对所选定图片的调用、编辑、查看以及分享等权限。例如当选择限制A应用对所选定图片的“调用”权限时,可以进一步显示限制的方式。如可以设置A应用调用锁定图片时需输入的密钥,或者,可以设置A应用锁定图片时终端需保持的姿态,或者,可以设置A应用锁定图片时自动拍摄人脸图像进行验证。对于A应用对锁定图片的其它操作权限的设置方式可以参见“调用”权限的设置方式,此处不再一一赘述。可选的,锁定图片可以在图库中正常显示,或者,锁定图片在图库中显示锁定图标或者以密文形式显示。在一个示例中,在图12中设置的锁定图片的权限为:调用时自动拍摄人脸图像,人脸验证成功后可以调用图像。则参见图14,当在A应用调用图库时,显示图库的缩略图展示界面,且锁定图片显示为密文。当用户点击其中一张或多张锁定图片时(如点击图片密文6),终端设备的摄像头自动拍摄当前用户的人脸图像,如果人脸图像验证成功,则在A应用显示锁定图片。In addition to locking the picture in the gallery, the embodiment of the present invention supports setting the locked picture in the gallery permission setting interface of the third-party application. As shown in FIG. 11 , in the gallery permission setting interface of the A application, the gallery access permission options of the A application are displayed. Optionally, the gallery access permission options may include: allowing application A to access the gallery, denying application A access to the gallery, and restricting application A from accessing the gallery. If the app clicks to allow app A to access the gallery, all the pictures in the gallery can support app A's access. If the application clicks to deny A application access to the gallery, all the pictures in the gallery do not support A application access. If the user clicks the restricted option, it can be set that some pictures do not support the access of the A application, or the operation permission of the A application to some pictures can also be limited. As shown in FIG. 11 , when the user clicks the restricted option, the user jumps from the gallery permission setting interface of the A application to the thumbnail display interface of the gallery. Optionally, the thumbnail display interface is in a selection mode, and each picture thumbnail in the thumbnail display interface is in a selectable state. After the user clicks the image thumbnail to be locked, for example, after selecting the image thumbnail 1 and the image thumbnail 2, a selection icon is displayed on the corresponding image thumbnail. Optionally, the thumbnail display interface further includes an OK button 8. After the user clicks the OK button 8, the picture corresponding to the selected picture thumbnail is determined as a locked picture. In some embodiments, when the selected picture is determined to be the locked picture, the A application does not have access to the locked picture. In some embodiments, as shown in FIG. 12, when the selected picture is determined to be a locked picture, the restricted permissions of the selected photo can be further edited. Specifically, when clicking the "Edit the restricted permission of the selected photo" button, the photo permission list is entered. In the photo permission list, you can set the operation permission of application A to the selected picture item by item. As shown in Figure 12, the permissions for application A to call, edit, view and share the selected picture can be set. For example, when it is selected to restrict the "calling" permission of the application A to the selected picture, the way of restriction can be further displayed. For example, you can set the key that needs to be entered when app A calls the locked picture, or you can set the posture that the terminal needs to maintain when app A locks the picture, or you can set it to automatically take a face image for verification when app A locks the picture. For the setting method of the other operation permission of the locked picture of the A application, please refer to the setting method of the "call" permission, which will not be repeated here. Optionally, the locked picture can be displayed normally in the gallery, or the locked picture can be displayed in the gallery with a lock icon or in the form of cipher text. In an example, the permission to lock the picture set in FIG. 12 is: automatically capture a face image when calling, and the image can be called after the face verification is successful. Referring to FIG. 14 , when application A calls the gallery, the thumbnail display interface of the gallery is displayed, and the locked image is displayed as cipher text. When the user clicks one or more of the locked pictures (such as clicking the picture cipher text 6), the camera of the terminal device automatically captures the current user's face image, and if the face image verification is successful, the locked picture is displayed in the A application.

在一些实施例中,设置的锁定图片的个数可以进行调整。如图13所示,当在A应用的图库权限设置界面设置两张锁定图片之后,用户可以进入A应用的锁定范围调整界面。在锁定范围调整界面中,显示编辑受限范围的按钮。用户点击编辑受限范围的按钮之后,进入缩略图展示界面。缩略图展示界面处于选择模式。在选择模式的缩略图展示界面中,用户可以增加或者减少锁定图片。如图14中,用户点击图片缩略图3,并点击确定按钮8,则图片缩略图3对应的图片增加为应用A的锁定图片。A应用则无权限访问图片缩略图3对应的图片。In some embodiments, the set number of locked pictures can be adjusted. As shown in FIG. 13 , after setting two locked pictures on the gallery permission setting interface of the A application, the user can enter the locked range adjustment interface of the A application. In the locked range adjustment interface, a button to edit the restricted range is displayed. After the user clicks the button to edit the restricted range, the thumbnail display interface is entered. The thumbnail display interface is in selection mode. In the thumbnail display interface of the selection mode, the user can increase or decrease the lock picture. As shown in FIG. 14 , the user clicks the picture thumbnail 3 and clicks the OK button 8 , then the picture corresponding to the picture thumbnail 3 is added as the locked picture of the application A. App A does not have permission to access the picture corresponding to picture thumbnail 3.

对应上述图片锁定方法,本发明实施例还提供了一种图片锁定装置。本领域技术人员可以理解,这些图片锁定装置均可使用市售的硬件组件通过本方案所教导的步骤进行配置来构成。图15是本发明实施例提供的一种图片锁定装置的结构示意图。如图15所示,该图片锁定装置包括:确定模块301,用于确定对图库的第一图片的锁定指令;权限设置模块302,用于根据所述锁定指令,设置所述第一图片的访问权限,所述访问权限包括:拒绝、允许或者限制第三方应用对所述第一图片的访问。Corresponding to the above picture locking method, an embodiment of the present invention further provides a picture locking device. Those skilled in the art can understand that these picture locking devices can be configured by using commercially available hardware components through the steps taught in this solution. FIG. 15 is a schematic structural diagram of a picture locking device according to an embodiment of the present invention. As shown in FIG. 15 , the picture locking device includes: a determining module 301 for determining a locking instruction for the first picture of the gallery; a permission setting module 302 for setting access to the first picture according to the locking instruction permission, where the access permission includes: denying, allowing or restricting the access of the third-party application to the first picture.

本发明实施例的图片锁定装置可以执行图1至图14所示实施例锁定图片的相关步骤。本实施例未详细描述的部分,可以参考对图1至图14所示实施例的相关说明。该技术方案的执行过程和技术效果参见图1至图14所示实施例中的描述,在此不再赘述。The picture locking device according to the embodiment of the present invention can perform the relevant steps of locking pictures in the embodiments shown in FIG. 1 to FIG. 14 . For parts that are not described in detail in this embodiment, reference may be made to the related descriptions of the embodiments shown in FIG. 1 to FIG. 14 . For the execution process and technical effects of the technical solution, refer to the descriptions in the embodiments shown in FIG. 1 to FIG. 14 , and details are not repeated here.

与上述图片访问管理方法相对应,本发明实施例还提供了一种图片访问管理装置,如图16所示包括:确定模块401,用于检测到第三方应用对图库的第一图片的访问操作时,确定所述第三方应用对所述第一图片的访问权限,所述访问权限包括:拒绝、允许或者限制第三方应用对所述第一图片的访问;访问管理模块402,用于根据所述第三方应用具有的对所述第一图片的访问权限,执行所述第三方应用对所述第一图片的访问。Corresponding to the above picture access management method, an embodiment of the present invention further provides a picture access management device, as shown in FIG. 16 , including: a determination module 401 for detecting an access operation of a third-party application to the first picture of the gallery , determine the access authority of the third-party application to the first picture, and the access authority includes: denying, allowing or restricting the third-party application's access to the first picture; the access management module 402 is configured to The access authority to the first picture possessed by the third-party application is performed, and the access to the first picture by the third-party application is executed.

本发明实施例的图片锁定装置可以执行图1至图14所示实施例解锁图片的相关步骤。本实施例未详细描述的部分,可以参考对图1至图14所示实施例的相关说明。该技术方案的执行过程和技术效果参见图1至图14所示实施例中的描述,在此不再赘述。The picture locking device according to the embodiment of the present invention may perform the relevant steps of unlocking the picture in the embodiments shown in FIG. 1 to FIG. 14 . For parts that are not described in detail in this embodiment, reference may be made to the related descriptions of the embodiments shown in FIG. 1 to FIG. 14 . For the execution process and technical effects of the technical solution, refer to the descriptions in the embodiments shown in FIG. 1 to FIG. 14 , and details are not repeated here.

应理解,图15和图16所示图片锁定装置和图片访问管理装置的各个模块的划分仅仅是一种逻辑功能的划分,实际实现时可以全部或部分集成到一个物理实体上,也可以物理上分开。且这些模块可以全部以软件通过处理元件调用的形式实现;也可以全部以硬件的形式实现;还可以部分模块以软件通过处理元件调用的形式实现,部分模块通过硬件的形式实现。例如,权限设置模块302可以为单独设立的处理元件,也可以集成在电子设备的某一个芯片中实现。其它模块的实现与之类似。此外这些模块全部或部分可以集成在一起,也可以独立实现。在实现过程中,上述方法的各步骤或以上各个模块可以通过处理器元件中的硬件的集成逻辑电路或者软件形式的指令完成。It should be understood that the division of each module of the picture locking device and the picture access management device shown in FIG. 15 and FIG. 16 is only a division of logical functions, and can be fully or partially integrated into a physical entity in actual implementation, or can be physically separate. And these modules can all be implemented in the form of software calling through processing elements; they can also all be implemented in hardware; some modules can also be implemented in the form of software calling through processing elements, and some modules can be implemented in hardware. For example, the authority setting module 302 may be a separately established processing element, or may be integrated in a certain chip of the electronic device. The implementation of other modules is similar. In addition, all or part of these modules can be integrated together, and can also be implemented independently. In the implementation process, each step of the above-mentioned method or each of the above-mentioned modules can be completed by an integrated logic circuit of hardware in the processor element or an instruction in the form of software.

例如,以上这些模块可以是被配置成实施以上方法的一个或多个集成电路,例如:一个或多个特定集成电路(Application Specific Integrated Circuit;以下简称:ASIC),或,一个或多个微处理器(Digital Singnal Processor;以下简称:DSP),或,一个或者多个现场可编程门阵列(Field Programmable Gate Array;以下简称:FPGA)等。再如,这些模块可以集成在一起,以片上系统(System-On-a-Chip;以下简称:SOC)的形式实现。For example, the above modules may be one or more integrated circuits configured to implement the above method, such as: one or more specific integrated circuits (Application Specific Integrated Circuit; hereinafter referred to as: ASIC), or one or more microprocessors A digital processor (Digital Singnal Processor; hereinafter referred to as: DSP), or, one or more Field Programmable Gate Arrays (Field Programmable Gate Array; hereinafter referred to as: FPGA), etc. For another example, these modules can be integrated together and implemented in the form of a system-on-a-chip (System-On-a-Chip; hereinafter referred to as: SOC).

图17是本发明实施例提供的另一种终端设备的结构示意图。如图12所示,终端设备以通用计算设备的形式表现。终端设备的组件可以包括但不限于:一个或者多个处理器510,通信接口520,存储器530,连接不同系统组件(包括存储器530、通信接口520和处理器510)的通信总线540。FIG. 17 is a schematic structural diagram of another terminal device provided by an embodiment of the present invention. As shown in Figure 12, the terminal device is represented in the form of a general-purpose computing device. Components of the terminal device may include, but are not limited to, one or more processors 510 , a communication interface 520 , a memory 530 , a communication bus 540 connecting different system components (including the memory 530 , the communication interface 520 and the processor 510 ).

通信总线540表示几类总线结构中的一种或多种,包括存储器总线或者存储器控制器,外围总线,图形加速端口,处理器或者使用多种总线结构中的任意总线结构的局域总线。举例来说,这些体系结构包括但不限于工业标准体系结构(Industry StandardArchitecture;以下简称:ISA)总线,微通道体系结构(Micro Channel Architecture;以下简称:MAC)总线,增强型ISA总线、视频电子标准协会(Video Electronics StandardsAssociation;以下简称:VESA)局域总线以及外围组件互连(Peripheral ComponentInterconnection;以下简称:PCI)总线。Communication bus 540 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a graphics acceleration port, a processor, or a local bus using any of a variety of bus structures. For example, these architectures include, but are not limited to, Industry Standard Architecture (hereinafter referred to as: ISA) bus, Micro Channel Architecture (hereinafter referred to as: MAC) bus, enhanced ISA bus, video electronic standard Association (Video Electronics Standards Association; hereinafter referred to as: VESA) local bus and Peripheral Component Interconnection (Peripheral Component Interconnection; hereinafter referred to as: PCI) bus.

电子设备典型地包括多种计算机系统可读介质。这些介质可以是任何能够被电子设备访问的可用介质,包括易失性和非易失性介质,可移动的和不可移动的介质。Electronic devices typically include various computer system readable media. These media can be any available media that can be accessed by the electronic device, including both volatile and nonvolatile media, removable and non-removable media.

存储器530可以包括易失性存储器形式的计算机系统可读介质,例如随机存取存储器(Random Access Memory;以下简称:RAM)和/或高速缓存存储器。电子设备可以进一步包括其它可移动/不可移动的、易失性/非易失性计算机系统存储介质。存储器530可以包括至少一个程序产品,该程序产品具有一组(例如至少一个)程序模块,这些程序模块被配置以执行本说明书图1至图14所示实施例的功能。The memory 530 may include a computer system readable medium in the form of volatile memory, such as random access memory (Random Access Memory; hereinafter referred to as: RAM) and/or cache memory. The electronic device may further include other removable/non-removable, volatile/non-volatile computer system storage media. The memory 530 may include at least one program product having a set (eg, at least one) of program modules configured to perform the functions of the embodiments shown in FIGS. 1 to 14 of the present specification.

具有一组(至少一个)程序模块的程序/实用工具,可以存储在存储器530中,这样的程序模块包括——但不限于——操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。程序模块通常执行本说明书所描述的实施例中的功能和/或方法。A program/utility having a set (at least one) of program modules that may be stored in memory 530, such program modules including, but not limited to, an operating system, one or more application programs, other program modules, and program data , each or some combination of these examples may include an implementation of a network environment. Program modules typically perform the functions and/or methods of the embodiments described in this specification.

处理器510通过运行存储在存储器530中的程序,从而执行各种功能应用以及数据处理,例如实现本说明书图1至图14所示实施例提供方法。The processor 510 executes various functional applications and data processing by running the programs stored in the memory 530 , for example, to implement the methods provided by the embodiments shown in FIGS. 1 to 14 of this specification.

具体实现中,本申请还提供一种计算机存储介质,其中,该计算机存储介质可存储有程序,该程序执行时可包括本申请提供的各实施例中的部分或全部步骤。所述的存储介质可为磁碟、光盘、只读存储记忆体(英文:read-only memory,简称:ROM)或随机存储记忆体(英文:random access memory,简称:RAM)等。In a specific implementation, the present application further provides a computer storage medium, wherein the computer storage medium can store a program, and when the program is executed, it can include some or all of the steps in the various embodiments provided in the present application. The storage medium may be a magnetic disk, an optical disk, a read-only memory (English: read-only memory, ROM for short) or a random access memory (English: random access memory, RAM for short).

具体实现中,本发明实施例还提供了一种计算机程序产品,所述计算机程序产品包含可执行指令,当所述可执行指令在计算机上执行时,使得计算机执行上述方法实施例中的部分或全部步骤。In a specific implementation, an embodiment of the present invention further provides a computer program product, where the computer program product includes executable instructions, and when the executable instructions are executed on a computer, causes the computer to execute part or some of the above method embodiments. all steps.

本发明实施例中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示单独存在A、同时存在A和B、单独存在B的情况。其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项”及其类似表达,是指的这些项中的任意组合,包括单项或复数项的任意组合。例如,a,b和c中的至少一项可以表示:a,b,c,a-b,a-c,b-c,或a-b-c,其中a,b,c可以是单个,也可以是多个。In the embodiments of the present invention, "at least one" refers to one or more, and "multiple" refers to two or more. "And/or", which describes the association relationship of the associated objects, means that there can be three kinds of relationships, for example, A and/or B, which can indicate the existence of A alone, the existence of A and B at the same time, and the existence of B alone. where A and B can be singular or plural. The character "/" generally indicates that the associated objects are an "or" relationship. "At least one of the following" and similar expressions refer to any combination of these items, including any combination of single or plural items. For example, at least one of a, b, and c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, where a, b, c may be single or multiple.

本领域普通技术人员可以意识到,本文中公开的实施例中描述的各单元及算法步骤,能够以电子硬件、计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。Those of ordinary skill in the art can realize that the units and algorithm steps described in the embodiments disclosed herein can be implemented by a combination of electronic hardware, computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of the present invention.

所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and brevity of description, the specific working process of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which will not be repeated here.

在本发明所提供的几个实施例中,任一功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,简称ROM)、随机存取存储器(random access memory,简称RAM)、磁碟或者光盘等各种可以存储程序代码的介质。In the several embodiments provided by the present invention, if any function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention can be embodied in the form of a software product in essence, or the part that contributes to the prior art or the part of the technical solution. The computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present invention. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM for short), random access memory (RAM for short), magnetic disk or optical disk, etc. that can store program codes medium.

以上所述,仅为本发明的具体实施方式,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。本发明的保护范围应以所述权利要求的保护范围为准。The above are only specific embodiments of the present invention. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed by the present invention, which should be included within the protection scope of the present invention. The protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (23)

1. A picture locking method, comprising:
determining a locking instruction for a first picture of a gallery;
according to the locking instruction, setting access authority of the first picture, wherein the access authority comprises: denying, allowing, or restricting access to the first picture by a third party application.
2. The method of claim 1, wherein determining a lock instruction for a first picture of a gallery comprises:
and when a locking action acting on the first picture is detected on a thumbnail display interface or a picture display interface of the gallery, determining to acquire a locking instruction of the first picture.
3. The method according to claim 2, wherein the thumbnail display interface or the picture display interface is triggered by an operation in the gallery; or,
the thumbnail display interface or the picture display interface calls the gallery trigger through a third-party application; or,
and the thumbnail display interface or the picture display interface is triggered by setting the gallery access authority of the third-party application.
4. The method according to claim 3, wherein the thumbnail display interface or the picture display interface is triggered by setting gallery access rights of a third-party application, and comprises:
when the gallery access limit of the third-party application is detected to be set, the gallery access limit option is displayed;
and when the operation of the gallery access limited option is detected, displaying the thumbnail display interface or the picture display interface.
5. The method of claim 1, wherein determining a lock instruction for a first picture of a gallery comprises:
when a first picture of a picture library is determined to contain preset privacy features based on a picture feature recognition algorithm, a locking instruction of the first picture is determined.
6. The method of claim 5, wherein determining that the first picture of the gallery contains the preset privacy feature based on the picture feature recognition algorithm comprises one or more of:
when the gallery is detected to be in a browsing state, determining whether each picture contained in the gallery contains a preset privacy feature through the picture feature recognition algorithm; if at least one picture in the gallery contains the preset privacy features, the at least one picture is the first picture, and the first picture is determined to contain the preset privacy features;
when detecting that the picture is added to the gallery, determining whether the added picture contains a preset privacy feature by adopting a picture feature recognition algorithm; if the pictures added to the gallery contain the preset privacy features, the pictures added to the gallery are the first pictures, and the first pictures are determined to contain the preset privacy features;
when detecting that the picture is deleted from the picture library, determining whether the picture to be deleted contains a preset privacy feature by adopting a picture feature recognition algorithm; if the picture deleted from the gallery contains the preset privacy feature, the picture deleted from the gallery is the first picture, and the first picture is determined to contain the preset privacy feature;
when the pictures in the gallery are called by a third-party application, determining whether the called pictures contain preset privacy features by adopting a picture feature recognition algorithm; if the called picture contains the preset privacy feature, the called picture is the first picture, and the first picture is determined to contain the preset privacy feature.
7. The method of any of claims 1 to 6, wherein said denying, allowing, or restricting access to the first picture by a third party application comprises:
and rejecting, allowing or restricting a combination of one or more of editing, invoking, viewing and sharing of the first picture by a third party application.
8. The method according to any one of claims 1 to 7, wherein setting the access right of the first picture according to the lock instruction further comprises:
setting an authentication key to be provided for accessing the first picture, wherein the authentication key comprises: the key management system comprises one or more of a human face key, a fingerprint key, a gesture key, a character string key and a terminal equipment posture key.
9. The method of claim 8, wherein setting an authentication key to be provided for accessing the first picture comprises:
configuring an unlocking key of terminal equipment where the gallery is located as a verification key of the first picture; or,
independently setting an authentication key for a third party application to access the first picture.
10. The method according to claim 8 or 9, wherein setting an authentication key to be provided for accessing the first picture comprises:
respectively setting authentication keys for accessing the first picture for different third-party applications; and/or the presence of a gas in the gas,
and the same third-party application sets the same or different verification keys for different access operations of the first picture.
11. The method according to claim 1, wherein after the setting of the access right of the first picture according to the lock instruction, the method further comprises: setting the display mode of the first picture in the gallery to be one or a combination of more than one of the following modes:
displaying a locking icon on the first picture;
displaying a locking icon on the thumbnail of the first picture;
the first picture is displayed as a ciphertext;
displaying the thumbnail of the first picture as a ciphertext;
the first picture is hidden in the gallery.
12. A picture access management method, comprising:
when the access operation of a third party application to a first picture of a gallery is detected, determining the access authority of the third party application to the first picture, wherein the access authority comprises: deny, allow, or restrict access to the first picture by a third party application;
and executing the access of the third-party application to the first picture according to the access authority of the third-party application to the first picture.
13. The method of claim 12, wherein the denying, allowing, or restricting access to the first picture by a third-party application comprises:
and rejecting, allowing or restricting a combination of one or more of editing, invoking, viewing and sharing of the first picture by a third party application.
14. The method according to claim 12 or 13, wherein the accessing of the first picture by the third-party application is performed according to the access right of the first picture possessed by the third-party application, and comprises:
when the access operation of a third-party application to the first picture is detected, prompting a user to input a verification key required by the third-party application to access the first picture, wherein the verification key comprises: one or more of a face key, a fingerprint key, a gesture key, a character string key and a terminal equipment posture key are combined;
and if the verification key input by the user passes the verification, executing the third-party application to access the first picture.
15. The method of claim 14, wherein performing the access of the third-party application to the first picture according to the access rights the third-party application has to the first picture comprises:
when the access operation of a third-party application to the first picture is detected, the acquisition of one or more of the following verification information is triggered, wherein the acquisition comprises the following steps: triggering a camera to shoot a face image of a current user, triggering the collection of user fingerprints and triggering the collection of terminal equipment postures;
and if the collected verification information passes verification, executing the third-party application to access the first picture.
16. The method according to claim 14 or 15, wherein different access operations of the third party application to the first picture have the same or different authentication keys.
17. The method according to claim 12, wherein when the access right of the third-party application to the first picture is denied, or the access right of the third-party application to the first picture is limited and authentication is not started or fails, the display manner of the first picture to the third-party application comprises one or more of the following:
pictures displayed to the third party application do not include the first picture;
the first picture is displayed as a ciphertext;
and displaying the thumbnail of the first picture as a ciphertext.
18. The method of claim 12, wherein the manner in which the first picture is viewed in the gallery includes one or more of:
the first picture is allowed to be viewed in the gallery;
the first picture is rejected from viewing in the gallery;
and the first picture is limited to be viewed in the gallery, wherein when the view is limited, if a key required for viewing the first picture is input, the view of the first picture in the gallery is supported.
19. The method according to claim 14 or 15, characterized in that the method further comprises:
and if the verification fails based on the verification key, calling a camera to shoot the current user information, and storing the shot current user information as an access record.
20. A picture locking device, comprising:
the determining module is used for determining a locking instruction of a first picture of the gallery;
an authority setting module, configured to set an access authority of the first picture according to the locking instruction, where the access authority includes: denying, allowing, or restricting access to the first picture by a third party application.
21. A picture access management apparatus, comprising:
the determination module is configured to determine, when an access operation of a third-party application to a first picture of a gallery is detected, an access right of the third-party application to the first picture, where the access right includes: deny, allow, or restrict access to the first picture by a third party application;
and the access management module is used for executing the access of the third-party application to the first picture according to the access authority of the third-party application to the first picture.
22. A terminal device, comprising:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
the memory stores program instructions executable by the processor, the processor calling the program instructions to perform the method of any of claims 1 to 11 or 12 to 19.
23. A computer-readable storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus on which the computer-readable storage medium resides to perform the method of any one of claims 1 to 11 or 12 to 19.
CN202111308091.1A 2021-11-05 2021-11-05 Picture locking method, access management method and device Pending CN114036555A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111308091.1A CN114036555A (en) 2021-11-05 2021-11-05 Picture locking method, access management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111308091.1A CN114036555A (en) 2021-11-05 2021-11-05 Picture locking method, access management method and device

Publications (1)

Publication Number Publication Date
CN114036555A true CN114036555A (en) 2022-02-11

Family

ID=80143080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111308091.1A Pending CN114036555A (en) 2021-11-05 2021-11-05 Picture locking method, access management method and device

Country Status (1)

Country Link
CN (1) CN114036555A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117235700A (en) * 2023-11-16 2023-12-15 荣耀终端有限公司 Data acquisition methods, electronic devices and readable storage media

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503498A (en) * 2016-09-22 2017-03-15 宇龙计算机通信科技(深圳)有限公司 Information locking method, information locking device and terminal
CN106845252A (en) * 2016-12-21 2017-06-13 北京奇虎科技有限公司 Terminal data access method, device and mobile terminal
CN107516027A (en) * 2017-09-25 2017-12-26 联想(北京)有限公司 Image processing method and electronic equipment
CN110866236A (en) * 2019-11-20 2020-03-06 Oppo广东移动通信有限公司 Private picture display method, device, terminal and storage medium
CN113094670A (en) * 2021-04-21 2021-07-09 上海传英信息技术有限公司 Privacy protection method, terminal and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503498A (en) * 2016-09-22 2017-03-15 宇龙计算机通信科技(深圳)有限公司 Information locking method, information locking device and terminal
CN106845252A (en) * 2016-12-21 2017-06-13 北京奇虎科技有限公司 Terminal data access method, device and mobile terminal
CN107516027A (en) * 2017-09-25 2017-12-26 联想(北京)有限公司 Image processing method and electronic equipment
CN110866236A (en) * 2019-11-20 2020-03-06 Oppo广东移动通信有限公司 Private picture display method, device, terminal and storage medium
CN113094670A (en) * 2021-04-21 2021-07-09 上海传英信息技术有限公司 Privacy protection method, terminal and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117235700A (en) * 2023-11-16 2023-12-15 荣耀终端有限公司 Data acquisition methods, electronic devices and readable storage media

Similar Documents

Publication Publication Date Title
US11882221B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN105117628B (en) Control method, device and the corresponding mobile device that file is shown in a kind of terminal
US10073985B2 (en) Apparatus and method for trusted execution environment file protection
US20140013422A1 (en) Continuous Multi-factor Authentication
CN104778416B (en) A kind of information concealing method and terminal
CN104156637A (en) Method and device for protecting private contents in intelligent terminal
CN112804445B (en) Display method and device and electronic equipment
US20200236539A1 (en) Method for protecting privacy on mobile communication device
CN108170844A (en) Storage method, device, terminal and storage medium for screen recording files
CN107609368A (en) Safety protecting method, device, equipment and the computer-readable storage medium of application program
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
CN114036555A (en) Picture locking method, access management method and device
JP2020140735A (en) Devices and methods for camera-based user authentication for content access
US20190289197A1 (en) Image capture device and method for secure image storage
CN115544586B (en) Safe storage method for user data, electronic device and storage medium
CN106446637B (en) Electronic device and operation method thereof
WO2017012216A1 (en) Login processing method and apparatus, and terminal
CN114357487A (en) File encryption method and device and electronic equipment
CN117540400A (en) File processing method, device, electronic equipment and readable storage medium
WO2021216426A1 (en) Fusion template for user authentication and vault for storing and using the same
HK1213334B (en) Method and device for unlocking touch screen, electronic equipment, displayer and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination