Unlock instant, AI-driven research and patent intelligence for your innovation.

Electronic device, image deletion method and storage medium based on obfuscated binary code

A binary code, electronic device technology, applied in the direction of electrical digital data processing, data processing input/output process, instruments, etc., can solve problems such as user security risks and sensitive data leakage, and achieve the effect of improving security risks and difficult to recover

Active Publication Date: 2022-05-20
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the deleted pictures on the disk can be recovered. Once they fall into the hands of criminals, a large amount of sensitive data of the user will be leaked, causing unnecessary security risks to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic device, image deletion method and storage medium based on obfuscated binary code
  • Electronic device, image deletion method and storage medium based on obfuscated binary code
  • Electronic device, image deletion method and storage medium based on obfuscated binary code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0048] It should be noted that the descriptions involving "first", "second", etc. in the present invention are only for descriptive purposes, and should not be understood as indicating or implying their relative importance or implicitly indicating the number of indicated technical features . Thus, the features defined as "first" and "second" may explicitly or implicitly include at least one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a method for deleting pictures based on mixed binary codes. The method includes: encoding the picture files that need to be deleted in the picture library to generate corresponding binary picture files; The rule is to mix and compile the binary code of the binary picture file to obtain the target binary code; load the target binary code to a folder under a predetermined storage path, and delete the file in the folder under the storage path target binary code. It can make it difficult to restore deleted picture files, which improves the potential safety hazards caused by disk leaks. In addition, the invention also provides an electronic device and a storage medium.

Description

technical field [0001] The invention relates to the field of picture security deletion, in particular to an electronic device, a picture deletion method based on a mixed binary code and a storage medium. Background technique [0002] With the continuous development of network technology, it has brought great convenience to people's life, but at the same time, it is also accompanied by potential safety hazards of information leakage. For example, for large-scale comprehensive financial companies, when users handle various financial services such as securities, insurance, and banking, they usually need to submit pictures containing sensitive information such as ID card photos, bank statement photos, and medical records to a predetermined disk In it, it is used for OCR recognition. After OCR recognition, the picture is deleted. However, the deleted pictures on the disk can be recovered. Once they fall into the hands of criminals, a large amount of sensitive data of the user w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/06G06F21/60
CPCG06F3/0623G06F3/0643G06F3/0652G06F21/60
Inventor 赵骏
Owner PING AN TECH (SHENZHEN) CO LTD