System and method for realizing information security display based on depth camera

An information security, depth camera technology, applied in computer parts, internal/peripheral computer component protection, instruments, etc., to ensure safe display and avoid information leakage

Active Publication Date: 2021-02-26
SHENZHEN ORBBEC CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose a method and system for realizing information security display in order to solve the problem of information security display in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for realizing information security display based on depth camera
  • System and method for realizing information security display based on depth camera
  • System and method for realizing information security display based on depth camera

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. Wherein the same reference numerals denote the same components, unless otherwise specified. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0023] It should be noted that when an element is referred to as being “fixed” or “disposed on” another element, it may be directly on the other element or be indirectly on the other element. When an element is referred to as being "connected to" another element, it can be directly connected to the other element or indirectly connected to the other element. In addition, the connection can be used for both fixing and circuit communication.

[0024] It is to be understood th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a system for realizing information security display based on a depth camera, including: a display for displaying information; a depth camera for acquiring face images in a target space; a processor for comparing the face images through an image feature extraction algorithm According to the difference between all or part of the facial feature information of the pre-trained authorized person's face image, determine whether there is unauthorized person's face information in the target space, and determine the When an unauthorized person tends to spy on the display, perform anti-spying operations. The present invention also proposes a method based on a depth camera display and an intelligent mobile terminal, which can also determine whether there are others peeping at the display around. Information leakage caused by the content being snooped by others ensures the safe display of information.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and system for realizing information security display. Background technique [0002] As smart mobile terminals such as notebook computers, tablet computers, and smart phones become increasingly powerful, they handle more and more things, such as telecommuting, online shopping, and online payment. In order to facilitate the handling of personal affairs or company affairs, people often store important information in smart mobile terminals, especially smart phones. When people use a smart mobile terminal in a public place, such as a restaurant, a bus, a subway or an elevator and other relatively densely populated areas, the content displayed on the display is easy to be spied on by others. If the deliberate snooping by others cannot be detected in time, it will inevitably lead to the leakage of private information, important secrets, payment passwords and other informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/00G06F21/84
CPCG06F21/84G06V40/166G06V40/168G06V40/174
Inventor 邓想全许星
Owner SHENZHEN ORBBEC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products