Privacy protection method, terminal, and computer-readable storage medium

A privacy protection and computer technology, applied in the field of privacy protection, can solve the problems of leakage of user privacy information, low user experience, etc., to achieve the effect of protecting privacy and improving experience satisfaction

Inactive Publication Date: 2018-12-21
NUBIA TECHNOLOGY CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to solve the problem in the prior art that the user's private information is unintentionally leaked when the image is sent out, resulting in low user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method, terminal, and computer-readable storage medium
  • Privacy protection method, terminal, and computer-readable storage medium
  • Privacy protection method, terminal, and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0081] In order to solve the problem in the prior art that the user's private information is unintentionally leaked when the image is sent out, resulting in low user experience. This embodiment provides a privacy protection method. By judging whether an outgoing instruction for target image data is received, the method corresponds to the target image data according to preset rules when receiving an outgoing instruction for target image data. The area is divided into a public image area and a private image area, and then the public image data corresponding to the public image area is obtained, and the public image data is sent out. For details, please refer to image 3 as shown, image 3 The basic flowchart of the privacy protection method provided in this embodiment, the privacy protection method includes:

[0082] S301: judging whether an outgoing instruction for target image data is received;

[0083] If yes, execute S302; if not, continue to execute S301.

[0084] First...

no. 2 example

[0121] This embodiment is based on the first embodiment, taking a specific privacy protection method as an example to further illustrate the present invention. For details, see Figure 10 shown.

[0122] S1001: judging whether an outgoing instruction for target image data is received;

[0123] If yes, execute S1002; if not, continue to execute S1001.

[0124] Assuming that user A and user B have started video chatting, that is, user B is about to receive the target image data from user A at this time, that is, at this time, an outgoing instruction for the target image data has been received, and S1002 is executed.

[0125] S1002: Use image recognition technology to judge whether there is an image in the preset public image table in the target image data;

[0126] If yes, execute S1003; if not, continue to execute S1002.

[0127] Following the above example, further, assume that the image in the public image table set by user A is the image of user A himself, at this time, u...

no. 3 example

[0138] This embodiment provides a terminal, for details, refer to Figure 11 As shown, the terminal provided in this embodiment includes a processor 1101 , a memory 1102 and a communication bus 1103 .

[0139] Wherein, the communication bus 1103 in this embodiment is used to realize connection and communication between the processor 1101 and the memory 1102, and the processor 1101 is used to execute one or more programs stored in the memory 1102, so as to realize the following steps:

[0140] Judging whether an outgoing instruction for the target image data is received;

[0141] If so, divide the area corresponding to the target image data into a public image area and a private image area according to preset rules;

[0142] The public image data corresponding to the public image area is obtained, and the public image data is sent out.

[0143] It should be noted that the above steps implemented by the processor 1101 may be an independent application, that is, it is separate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for protect privacy Terminal and computer readable storage media, the privacy protection method judges whether an outgoing instruction for target image data is received or not, When the outgoing instruction of the target image data is received, the region corresponding to the target image data is divided into a common image region and a private image region according to a preset rule, andthe common image data corresponding to the common image region is acquired and outgoing of the common image data is performed. The invention solves the problem of low user experience caused by unintentional disclosure of user privacy information when outgoing images in the prior art. The invention also discloses a terminal and a computer-readable storage medium. By implementing the scheme, when the target image is outputted, only the public image data of the target image is outputted, that is, the privacy image data is not outputted, the privacy of the user is protected, the humanization is enhanced, and the experience satisfaction of the user is greatly improved.

Description

technical field [0001] The present invention relates to the technical field of privacy protection, and more specifically, to a privacy protection method, a terminal, and a computer-readable storage medium. Background technique [0002] With the development of terminal technology and Internet technology, terminals have become an indispensable part of people's lives. Users install various third-party applications and service software on terminals to meet daily needs. For the convenience of description, the above-mentioned terminal takes mobile phone as an example. At present, camera is an important function of mobile phone, which is deeply loved by users. Users use cameras more and more frequently in various scenes of work and life, such as video chatting. Uploading to Moments, etc. However, in the process of video chatting or uploading photos, the probability of inadvertently leaking privacy-sensitive information through images is increasing. Privacy-sensitive information on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 李杰
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products