Unlock instant, AI-driven research and patent intelligence for your innovation.

The hidden protection method of terminal and data information

A data information and information hiding technology, applied in the direction of digital data authentication, electronic digital data processing, special data processing applications, etc.

Active Publication Date: 2018-04-10
DONGGUAN YULONG COMM TECH +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is no better way to hide the annotation information on the image in the existing technology, so that the privacy of the user cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • The hidden protection method of terminal and data information
  • The hidden protection method of terminal and data information
  • The hidden protection method of terminal and data information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0047] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0048] figure 1 A block diagram of a terminal according to an embodiment of the present invention is shown.

[0049] like figure 1 As shown, the terminal 100 according to the embodiment of the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a terminal, comprising: an information collection unit, configured to obtain, according to the information hiding command received by the current image, the auxiliary information added by the user for the current image, and collect authentication information related to the user; An information processing unit, configured to perform the following steps: eliminate the auxiliary information on the current image, and associate the auxiliary information with the authentication information and embed them into the file of the current image from which the auxiliary information has been eliminated; Or eliminate the display mark of the auxiliary information on the current image, and embed the auxiliary information, the display mark and the authentication information into the file of the current image without the display mark. The invention also proposes a method for hiding and protecting data information. Through the technical scheme of the invention, the auxiliary information in the image can be conveniently and effectively hidden and protected according to the needs of the user, which is beneficial to protect the privacy of the user and avoid peeping by others.

Description

technical field [0001] The present invention relates to the technical field of terminal manipulation, in particular, to a terminal and a method for hiding and protecting data information. Background technique [0002] For the sake of intuition and convenience, users often mark their relevant information next to the image objects of interest (such as faces, buildings, etc.), such as their name, work unit, title and contact number, etc. next to the face image. However, users often hope that the annotation information on the image will not be viewed by others when borrowing their mobile phone, or be viewed by the picker when the mobile phone is lost. However, no better way is proposed in the prior art to hide content such as annotation information on images, so that user privacy cannot be guaranteed. [0003] Therefore, the present invention proposes a technical solution that can conveniently and effectively hide and protect the auxiliary information in the image according to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30
CPCG06F21/31H04W12/02H04W12/06G06F16/5866H04N1/32144G06F21/6227G06F21/6245
Inventor 曹坚
Owner DONGGUAN YULONG COMM TECH