Mobile terminal sensitive information identification method

A mobile terminal, information identification technology, applied in the field of information security identification, can solve problems such as national and unit construction losses, and achieve the effect of improving the face recognition rate

Inactive Publication Date: 2017-05-31
XIJING UNIV
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Smart mobile terminal equipment has become the chief culprit of leaking secrets. "Unconscious" illegal oper

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal sensitive information identification method
  • Mobile terminal sensitive information identification method
  • Mobile terminal sensitive information identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention is further described below in conjunction with embodiment.

[0051] like figure 1 As shown, a mobile terminal "sensitive" information identification method is divided into two stages of screen scanning and feature extraction and matching, including the following steps:

[0052] 1) The screen scanning stage is to convert the dynamic screen of the mobile terminal into a static picture:

[0053] Screen scanning takes 16×16 as a unit, scans the current screen every 30s, and initially extracts screen features. When two or more sensitive information features appear on the screen, screenshots are taken to the terminal memory, and stored in the memory to realize dynamic screens. conversion to static images;

[0054] 2) The feature extraction and matching stage is to analyze the picture and find out whether it is "sensitive" information. The feature extraction and matching stage is composed of inverted double triangle double discrimination algorithm, PCA fa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile terminal sensitive information identification method, and aims at identifying sensitive picture information (such as wearing military uniforms, policeman uniforms and the like) to the greatest extent. An efficient intelligent method is designed on the basis of a machine learning algorithm. The method comprises the following two main steps of: picture scanning: preliminarily extracting picture features to realize the conversion from a dynamic picture to a static picture; and feature extraction and matching: realizing sensitive picture identification through a reverse double-triangle double-discrimination algorithm, PCA face recognition, a Sobel edge detection algorithm and a KNN algorithm. The method can be used for rapidly and efficiently identifying the sensitive pictures referring to the party, the government and the army, and can comprehensively protect the mobile terminals so as to really ensure the safety of confidential information from the information link sources.

Description

technical field [0001] The invention relates to an information security identification method, in particular to a mobile terminal "sensitive" information identification method. Background technique [0002] With the advent of the information age, Internet technology has changed people's traditional production and lifestyle, and the penetration rate of mobile smart terminals is increasing year by year. According to the statistical report of The Consumer Barometer, the penetration rate of smart phones in China was 58% in 2016. It is estimated that by 2020, the penetration rate of smartphones in China will reach more than 90%. Mobile terminals have become an important entrance to the Internet, but a large amount of "sensitive" information (for example, sensitive pictures and text information related to the party, government, and military) is flooding the Internet. For example, on May 10, 2016, the female auxiliary policeman in Dandong, Liaoning The photo incident has a bad imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/62G06K9/46
CPCG06V40/171G06V10/44G06F18/22
Inventor 赵婧魏彬
Owner XIJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products