Photo naming method and naming system

A naming system and photo technology, applied in still image data retrieval, special data processing applications, instruments, etc., can solve the problem of non-targeted security loopholes in photo encryption, and achieve the effect of avoiding leaks, filling security loopholes, and strong pertinence

Inactive Publication Date: 2016-02-24
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of this, the purpose of the present invention is to provide a photo naming method and naming system, which can solve the technical problems of untargeted photo encryption and security loopholes in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Photo naming method and naming system
  • Photo naming method and naming system
  • Photo naming method and naming system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] see figure 1 , which is a schematic flowchart of a method for naming photos provided by an embodiment of the present invention. The naming method of the photos is mainly implemented in terminal devices such as smart phones and digital cameras, and will not be enumerated here.

[0030] The naming method of the photos, including:

[0031] In step S101, security levels are respectively set for a plurality of photos.

[0032] Wherein, the security level includes: a high security level and a low security level.

[0033] The selection rules for the setting include one or a combination of the following methods:

[0034] (1) Locate the shooting location, such as the first meeting room of a building in Nanshan District, Shenzhen City, Guangdong Province. The photos taken at this location are all of high security level;

[0035] (2) Set the shooting time, such as 2015-09-18 9:00~11:00, the photos taken during this time period are all of high security level;

[0036] (3) Loca...

Embodiment 2

[0050] see figure 2 , which is a schematic flowchart of a method for naming photos provided by an embodiment of the present invention. The method for naming photos is mainly implemented in smart phones.

[0051] The naming method of the photos, including:

[0052] In step S201, security levels are respectively set for a plurality of photos, and the security levels include high security level and low security level.

[0053] The selection rules for the setting include one or a combination of the following methods:

[0054] (1) Locate the shooting location, and the photos taken at this location are all of high security level;

[0055] (2) Set the shooting time, and the photos taken during this time period are all of high security level;

[0056] (3) Locate the keyword, if the captured content is a document, whether the full text of the search contains the keyword, if included, the security level is high;

[0057] (4) Collect the characteristics of the portrait, and the pho...

Embodiment 3

[0080] see image 3 , is a block diagram of a photo naming system provided by an embodiment of the present invention. The photo naming system is mainly implemented in terminal devices such as smart phones and digital cameras, and will not be listed here.

[0081] The photo naming system 300 includes: a setting module 31 , a classification module 32 , a first naming module 33 , an encryption module 34 , and a second naming module 35 .

[0082] The setting module 31 is connected to a memory (not shown) in the terminal device, such as a gallery or a photo folder, and is used to set security levels for multiple photos therein.

[0083] Wherein, the security level includes: a high security level and a low security level.

[0084] The selection rules for the setting include one or a combination of the following methods:

[0085] (1) Locate the shooting location, such as the first meeting room of a building in Nanshan District, Shenzhen City, Guangdong Province. The photos taken a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a photo naming method and a photo naming system. The photo naming method comprises: setting security levels for a plurality of photos respectively; according to the security levels, classifying the plurality of photos to form a first category of photos and a second category of photos; storing the first category of photos into a first folder, and performing consecutive naming according to a first preset rule; and storing the second category of photos into a second folder, and performing consecutive naming according to a second preset rule. According to the photo naming method and the photo naming system which are provided by the invention, the photos at dierent security levels are named respectively by multiple sets of preset rules, so that leakage caused by the consecutive naming of the photos is avoided; the naming method and naming system have the advantage of strong pertinence; and security vulnerabilities caused by an original naming rule are filled up.

Description

technical field [0001] The invention belongs to the field of computer storage and security, in particular to a photo naming method and naming system. Background technique [0002] The popularity of smart terminal devices has brought great joy to users' lives, for example, they can take photos or videos anytime and anywhere to record or share beautiful moments. However, as personal privacy is increasingly concerned, improper handling of files such as photos or videos may cause great distress to users. [0003] At present, the naming methods of photos mainly include the following methods or their combinations: named by the pixels of the photo, such as 1080*14400001; named by the size of the photo, such as 300KB0002; named by the shooting address of the photo, such as Shenzhen, Guangdong Province 0003, Nanshan District, Shinanshan District; named after the shooting time of the photo, such as 201510010004; named after the shooting equipment, such as iPhone60005; named after the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F17/30G06F21/60
CPCG06F21/6218G06F16/51G06F21/602G06F2221/2107
Inventor 张海平周意保
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products