WO2021092769A1 - 安全防护方法、装置、移动终端及存储介质 - Google Patents
安全防护方法、装置、移动终端及存储介质 Download PDFInfo
- Publication number
- WO2021092769A1 WO2021092769A1 PCT/CN2019/117609 CN2019117609W WO2021092769A1 WO 2021092769 A1 WO2021092769 A1 WO 2021092769A1 CN 2019117609 W CN2019117609 W CN 2019117609W WO 2021092769 A1 WO2021092769 A1 WO 2021092769A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- interface
- setting
- security protection
- mobile terminal
- face image
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Definitions
- This application relates to the technical field of mobile terminals, and more specifically, to a security protection method, device, mobile terminal, and storage medium.
- Mobile terminals such as tablet computers and mobile phones, have become one of the most commonly used consumer electronic products in people's daily lives. With the rapid development of mobile terminals, more and more applications are installed in mobile terminals, and security protection during application operation has become a key issue.
- this application proposes a security protection method, device, mobile terminal, and storage medium.
- the embodiments of the present application provide a security protection method, which is applied to the operating system of a mobile terminal, the mobile terminal includes a camera, and the method includes: when it is detected that the mobile terminal is running a setting application, and displaying When the setting interface of the application is set, an environment image is collected through the camera; if the environment image includes a face image, face recognition is performed on the face image to obtain a recognition result; when the recognition The result indicates that when the environmental image includes a face image corresponding to an unregistered user, the preset security protection processing is performed on the setting interface. .
- an embodiment of the present application provides a security protection device applied to an operating system of a mobile terminal
- the mobile terminal includes a camera
- the device includes: an image acquisition module, a face recognition module, and a protection processing module
- the image acquisition module is used to collect environmental images through the camera when it is detected that the mobile terminal is running the setting application and displays the setting interface of the setting application
- the face recognition module is used to: If the environmental image includes a human face image, then face recognition is performed on the human face image to obtain a recognition result
- the protection processing module is used for when the recognition result indicates that the environmental image includes the corresponding non-registered user In the case of a face image, the preset security protection processing is performed on the setting interface.
- an embodiment of the present application provides a mobile terminal, including: one or more processors; a memory; one or more application programs, wherein the one or more application programs are stored in the memory and Is configured to be executed by the one or more processors, and the one or more programs are configured to execute the security protection method provided by the first aspect described above.
- an embodiment of the present application provides a computer-readable storage medium.
- the computer-readable storage medium stores program code, and the program code can be invoked by a processor to execute the security provided by the first aspect. Protection method.
- the solution provided by this application is to collect environmental images through the camera when it is detected that the mobile terminal is running the setting application and the setting interface of the application is set. If the environmental image includes a face image, face recognition is performed on the face image , To obtain the recognition result, when the recognition result characterizes the environment image including the face image corresponding to the non-registered user, perform the preset security protection processing on the setting interface, so as to realize the setting interface for the setting application displayed on the mobile terminal Protection, protect the content and information in the setting interface, and improve the security of the mobile terminal.
- Fig. 1 shows a flowchart of a security protection method according to an embodiment of the present application.
- Fig. 2 shows a flowchart of a security protection method according to another embodiment of the present application.
- Fig. 3 shows a flowchart of a security protection method according to another embodiment of the present application.
- Fig. 4 shows a schematic diagram of an interface provided by another embodiment of the present application.
- Fig. 5 shows a schematic diagram of another interface provided by another embodiment of the present application.
- FIG. 6 shows a schematic diagram of another interface provided by another embodiment of the present application.
- FIG. 7 shows a schematic diagram of still another interface provided by another embodiment of the present application.
- Fig. 8 shows a flowchart of a security protection method according to still another embodiment of the present application.
- Fig. 9 shows a block diagram of a safety protection device according to an embodiment of the present application.
- FIG. 10 is a block diagram of a mobile terminal for executing the security protection method according to the embodiment of the present application according to an embodiment of the present application.
- Fig. 11 is a storage unit for storing or carrying program code for implementing the security protection method according to the embodiment of the present application according to an embodiment of the present application.
- chat software, payment software, etc. are installed in the mobile terminal, so that it is convenient for users to use the mobile terminal for chatting and payment.
- the application when some applications (such as payment software) running in the mobile terminal log in and pay, the application will perform an identity verification process according to its own software logic. However, for some interfaces involving important information (such as private information, property information, etc.) in the application, since the application does not perform identity verification, information may be leaked. For example, after running a chat application, the mobile terminal is placed aside, and strangers can pick up the phone to see the chat information, etc., which may easily cause privacy leakage. For another example, since the payment application will only perform identity verification during payment according to the software logic, and if the payment application is opened by a stranger, the stranger can see information such as bills and balances.
- important information such as private information, property information, etc.
- the inventor proposes the security protection method, device, mobile terminal, and storage medium provided by the embodiments of the present application.
- the camera captures Environmental image, and perform face recognition on the face image in the environmental image. If the environmental image includes the face image corresponding to the non-registered user, perform security protection processing on the setting interface to prevent information leakage in the setting interface.
- specific security protection methods are described in detail in the subsequent embodiments.
- FIG. 1 shows a schematic flowchart of a security protection method provided by an embodiment of the present application.
- the security protection method is used for the operating system of the mobile terminal to perform security protection processing on the setting interface of the setting application to prevent leakage of user information in the setting interface.
- the safety protection method is applied to the safety protection device 400 shown in FIG. 9 and the mobile terminal 100 equipped with the safety protection device 400 (FIG. 10 ).
- the following will take a mobile terminal as an example to describe the specific process of this embodiment.
- the mobile terminal applied in this embodiment may be a smart phone, a tablet computer, an e-book, etc., which is not limited here.
- the mobile terminal includes a camera.
- the security protection method may specifically include the following steps:
- Step S110 When it is detected that the mobile terminal runs the setting application and displays the setting interface of the setting application, collect an environment image through the camera.
- the mobile terminal may be pre-configured with a setting application that needs security protection, and a setting interface in the setting application that needs security protection.
- the operating system of the mobile terminal can detect the running application and detect the interface of the displayed application to determine whether the displayed application interface is an interface that requires security protection.
- the setting application and setting interface can be configured according to the user's operation, or according to the recommended information of the application manufacturer when the application is installed, which is not limited here.
- the operating system of the mobile terminal can detect running applications and the displayed interface of the application in real time; the operating system of the mobile terminal can also detect the running application and the displayed interface according to a set interval. The interface of the application.
- the operating system of the mobile terminal can obtain the currently running application through the process management of the operating system, and can obtain the status and information of the running application, for example, the application is running in the foreground or in the background, and the application is running.
- the manner of obtaining the currently running application in the mobile terminal may not be a limitation.
- the mobile terminal can determine whether there is a setting application from the currently running applications, and detect the displayed setting application interface when the setting application is running in the foreground.
- the operating system can determine the displayed setting application interface based on the rendered interface layer when the interface of the setting application is displayed. For example, when displaying the billing interface of a payment application, it will render the image corresponding to the billing interface. When rendering the layer corresponding to the billing interface, you can determine that the displayed application interface is the billing interface according to the layer file of the layer called.
- the system bottom layer of the operating system can also initiate an interface determination instruction from the application layer to the setting application, and the system bottom layer receives the interface identification returned by the setting application, thereby determining the currently displayed application interface according to the interface identification.
- the specific method of detecting the currently displayed application interface may not be a limitation.
- the environment image can be collected through the camera to perform identity verification based on the collected environment image, thereby determining Whether to perform security protection processing on the setting interface.
- the operating system can call the camera from the background and control the camera to collect environmental images, so that the environmental image collection can be completed without the user's awareness.
- the camera may be a front camera to collect environmental images with the display screen facing one side.
- Step S120 If the environment image includes a face image, perform face recognition on the face image to obtain a recognition result.
- the environment image after the environment image is acquired, it can be determined whether the environment image includes a human face image.
- the image collected by the camera is a two-dimensional image.
- the environment image captured by the camera is based on structured light imaging, and the environment image is collected.
- the three-dimensional information collected by the structured light can be used to determine whether there is three-dimensional face information, so as to determine whether the environmental image includes Face image.
- the face image can be recognized by the face to obtain the recognition result.
- the facial features of the facial image can be recognized, and the recognized facial features can be matched with the facial image of the registered user's facial image; if they match, it is determined that the environment image includes the registered user's corresponding facial features Image; if it does not match, it is determined that the environment image includes the face image corresponding to the non-registered user.
- a registered user refers to a user who is pre-registered or pre-stored in the mobile terminal, and the mobile terminal pre-stores the face image of the registered user, and the non-registered user is opposite to the registered user. Registered or pre-stored users.
- Step S130 When the recognition result indicates that the environmental image includes a face image corresponding to an unregistered user, perform a preset security protection process on the setting interface.
- the operating system after the operating system performs face recognition on the face image in the environment image and obtains the recognition result, it can determine whether the setting interface needs to be subjected to security protection processing according to the recognition result.
- a preset security protection process may be performed on the setting interface. It is understandable that when the mobile terminal displays the setting interface of the setting application, if the environment of the mobile terminal includes unregistered users, it means that there are unregistered users around the mobile terminal. At this time, the unregistered users may be viewing the setting interface. , So you can perform security protection processing on the setting interface to avoid leakage of personal information in the setting interface.
- performing security protection processing on the setting interface may include one of exiting the setting application, switching the setting interface to another interface, recording operation behavior, sending prompt information to other devices, and issuing an alarm prompt. Or multiple.
- the operating system can control the closing of the setting application, so that non-registered users cannot see the content of the setting interface, so as to protect the content in the setting interface.
- the security protection method provided by the embodiments of this application collects environmental images through a camera when it is detected that the mobile terminal is running the setting application and displays the setting interface of the setting application. Face recognition is performed on the image to obtain the recognition result. When the recognition result indicates that the environmental image includes the face image corresponding to the non-registered user, the preset security protection processing is performed on the setting interface, so as to realize the setting of the display of the mobile terminal.
- the protection of the setting interface of the application protects the content and information in the setting interface and improves the security of the mobile terminal.
- FIG. 2 shows a schematic flowchart of a security protection method provided by another embodiment of the present application.
- the security protection method can be applied to the operating system of the above-mentioned mobile terminal. The following will elaborate on the process shown in FIG. 2, and the security protection method may specifically include the following steps:
- Step S210 When it is detected that the mobile terminal is running the setting application and displaying the setting interface of the setting application, collect an environment image through the camera.
- Step S220 If the environment image includes a face image, perform face recognition on the face image to obtain a recognition result.
- step S210 and step S220 can refer to the content of the foregoing embodiment, and will not be repeated here.
- Step S230 When the recognition result indicates that the environmental image includes a face image corresponding to an unregistered user, it is determined whether the environmental image also includes a face image corresponding to a registered user.
- the recognition result characterizes that the environmental image includes the face image corresponding to the non-registered user
- a registered user refers to a user who is pre-registered or pre-stored in the mobile terminal, and the mobile terminal pre-stores the face image of the registered user, and the non-registered user is opposite to the registered user.
- the non-registered user refers to the user who is not in the mobile terminal Pre-registered or pre-stored users.
- the multiple face images may include both face images corresponding to registered users and face images corresponding to non-registered users.
- the mobile phone of a registered user is taken by a friend to play and enters the setting interface of the setting application.
- the environment image collected by the camera may include both the face image corresponding to the registered user and the non-registered user.
- the operating system can confirm the face image in the environment image to determine whether the environment image also includes the face image corresponding to the registered user, that is, it includes both the face image corresponding to the registered user and the face image corresponding to the non-registered user.
- Step S240 If the environment image does not include the face image corresponding to the registered user, perform a preset security protection process on the setting interface.
- the environment image does not include the face image corresponding to the registered user, that is, there is only the face image corresponding to the non-registered user in the environment image, it means that the user who uses the mobile terminal to view the setting interface at this time is non-registered user.
- Registered users so in order to avoid information leakage in the setting interface, preset security protection processing can be performed on the setting interface.
- step S240 may include:
- the environment image does not include the face image corresponding to the registered user, determine whether the target environment image is obtained within the preset time before the current time, and the target environment image includes the face image corresponding to the registered user; if not If the target environment image exists, the preset security protection processing is performed on the setting interface.
- the operating system can determine whether the target environment image is acquired within the preset time period before the current time based on the face recognition results of the face images in all the environment images acquired within the preset time period before the current time. If there is no target environment image, it means that the current setting application is running and the setting interface is displayed. It is not a scene where the registered user actively shows the setting interface to non-registered users. Therefore, the setting interface can be protected. To avoid the leakage of information in the setting interface. For example, when user 1 is viewing the chat history interface of a chat application, the chat application is the setting application, and the interface for understanding records is the setting interface. If user 1 finds an interesting conversation with a netizen and wants to share it with user 2, then At this time, the security protection processing of the setting interface will not be triggered to ensure the user's demand for sharing content.
- Step S250 If the environment image also includes the face image corresponding to the registered user, the preset security protection processing is not performed on the setting interface.
- the environment image also includes the face image corresponding to the registered user, it means that the environment image includes both the face image corresponding to the registered user and the face image corresponding to the non-registered user. In this case, It is not necessary to perform preset security protection processing on the setting interface. It is understandable that when a registered user is holding a mobile terminal to view the setting interface, there may also be unregistered users in the environment. At this time, the viewing scene of the setting interface is a normal viewing scene, so the setting interface may not be preset Safe protection processing.
- the mobile terminal may also perform preset security protection processing when the environment image includes both the face image corresponding to the registered user and the face image corresponding to the non-registered user, so as to prevent the user from viewing the setting interface. , Was peeped by non-registered users around.
- the first strategy and the second strategy may be pre-stored in the mobile terminal.
- the first strategy and the second strategy are used to determine whether to perform preset security protection processing when the face image corresponding to the registered user and the face image corresponding to the non-registered user are included in the environment image.
- the environmental image when the environmental image includes both the face image corresponding to the registered user and the face image corresponding to the non-registered user, no security protection processing is performed; under the second strategy, the environmental image also includes the corresponding face image of the registered user Face images and face images corresponding to non-registered users are processed for security protection.
- the mobile terminal may display a setting interface for setting the first strategy or the second strategy, and when the selection operation of the first strategy is detected, the first strategy is used as the environment image and the face corresponding to the registered user is included.
- the image and the face image corresponding to the non-registered user determine whether to perform the preset security protection processing judgment strategy on the setting interface; when the selection operation of the second strategy is detected, the second strategy is used as the environment image
- the face image corresponding to the registered user and the face image corresponding to the non-registered user are included at the same time, it is determined whether to perform the predetermined security protection processing judgment strategy on the setting interface.
- the current decision strategy can be determined according to the strategy identifier of the decision strategy.
- Strategy identification if it is determined that the current judgment strategy is the first strategy, the preset security protection processing will not be performed on the setting interface; if the current judgment strategy is determined to be the second strategy according to the measurement flag, the setting interface is pre-defined Set up safety protection processing.
- the security protection method may further include:
- the security protection processing is performed.
- the registered user may pick up the mobile phone and look at the display interface, and there are non-registered users in the environment.
- the user or it may be a non-registered user holding a mobile phone and viewing the display interface in the same environment as the registered user.
- the face image corresponding to the user holding the mobile terminal is usually in the central area of the environmental image. Therefore, the central area in the environmental image can be set as the designated area, and it is determined whether the facial image corresponding to the registered user is in the environmental image.
- the specific size of the designated area is not limited, and can be obtained based on multiple experiments; if the face image corresponding to the registered user is in the designated area of the environmental image, it means that the registered user is currently holding the mobile terminal Check the setting interface. At this time, the viewing behavior of the setting interface is the normal operation behavior of the registered user, so the preset security protection processing is not performed on the setting; and if the face image corresponding to the registered user is not in the environment image
- the designated area of it means that an unregistered user is currently viewing the setting interface with a mobile terminal. At this time, the viewing behavior of the setting interface is the operation behavior of the unregistered user. Therefore, the preset security protection processing is performed on the setting interface to avoid The content in the setting interface is viewed and operated by non-registered users.
- the method further includes:
- the other face images include the face image corresponding to the registered user, determine the proportion of the face image corresponding to the registered user in the environmental image; if the proportion is less than the set proportion, proceed The safety protection treatment.
- the registered user may pick up the mobile phone and look at the display interface, and there are non-registered users in the environment.
- the user or it may be a non-registered user holding a mobile phone and viewing the display interface in the same environment as the registered user.
- the face image corresponding to the user holding the mobile terminal will occupy a larger proportion of the environmental image. Set the proportion of the user image to the environmental image in the environmental image collected when the user views the mobile phone as the set proportion.
- the specific size of the fixed proportion is not limited, and can be obtained based on multiple experiments; if the proportion of the environmental image corresponding to the registered user's face image is greater than or equal to the set proportion, it means that the registered user is currently holding The mobile terminal checks the setting interface. At this time, the viewing behavior of the setting interface is the normal operation behavior of the registered user, so the preset security protection processing is not performed on the setting; and if the face image corresponding to the registered user occupies the environmental image If the proportion is less than the set proportion, it means that an unregistered user is currently holding the mobile terminal to view the setting interface. At this time, the viewing behavior of the setting interface is the operation behavior of the unregistered user, so the setting interface is preset Security protection processing to prevent the content in the setting interface from being viewed and operated by non-registered users.
- the security protection method may further include:
- the prompt information is used to prompt the user to input verification information; receive the input verification information; if the verification information does not match the set verification information, perform the security protection processing.
- the verification information can be obtained and verified. If the received verification information does not match the setting verification information, security protection processing will be performed; if it is received When the verification information matches the setting verification information, no security protection processing is performed. Among them, the prompt information can be prompted in the form of a pop-up window.
- the verification information can be preset for the registered user.
- Digital password, verification code information, fingerprint information, voiceprint information, iris information, etc. are not limited here.
- the verification information is a digital password or verification code information
- the user can also enter the verification information in the pop-up window. Therefore, when registered users and non-registered users view the setting interface together, the registered user can enter the verification information and verify it to ensure normal viewing; instead of when the registered user actively views the setting interface with the non-registered user, for example, the registered user and the non-registered user Non-registered users are in the same environment, and non-registered users secretly hold the mobile terminal to view, so they can perform security protection processing on the setting interface to avoid the content of the setting interface from leaking.
- the security protection method provided by the embodiments of this application collects environmental images through a camera when it is detected that the mobile terminal is running the setting application and displays the setting interface of the setting application. Face recognition is performed on the image, and the recognition result is obtained. If the recognition result indicates that the environmental image includes the facial image corresponding to the non-registered user, determine whether the environmental image also includes the facial image corresponding to the registered user.
- the face image corresponding to the user performs the preset security protection processing on the setting interface, and if the environment image includes the face image corresponding to the registered user, the preset security protection processing is not performed on the setting interface, and the mobile terminal displays
- the protection of the setting interface of the setting application protects the content and information in the setting interface, improves the security of the mobile terminal, and also ensures the normal viewing of the setting interface.
- FIG. 3 shows a schematic flowchart of a security protection method provided by another embodiment of the present application.
- the security protection method can be applied to the operating system of the above-mentioned mobile terminal. The following will elaborate on the process shown in FIG. 3, and the security protection method may specifically include the following steps:
- Step S301 Display a first configuration interface, where the first configuration interface includes a first control, and the first control is used to configure a set interval time.
- the mobile terminal may display a first configuration interface A1, and the first configuration interface A1 is used to set the set interval duration.
- the first configuration interface A1 includes a first space A2, and A2 is used to adjust the size of the set interval duration to complete the configuration of the set interval duration.
- the mobile terminal may display a basic configuration interface A3 for setting security protection functions.
- This A3 includes option A4 for entering page configuration, option A5 for entering interval time configuration, and option A5 for entering policy configuration.
- Option A6 and Option A7 to enter the protection mode configuration.
- option A4 is used to enter and display the configuration interface of the setting application and setting interface when it is triggered; when option A5 is triggered, enter and display the configuration interface of the set interval time (ie, the first configuration interface A1);
- the configuration interface of the first strategy and the second strategy in the foregoing embodiment is entered and displayed;
- option A7 is triggered, the configuration interface of the protection mode is entered.
- the mobile terminal may display the first configuration interface A1 so that the user can set the set interval.
- Step S302 Configure the set interval duration according to the detected operation on the first control.
- the operation in the first configuration interface can be detected, and the set set interval duration can be obtained according to the detected operation on the first control, and the set interval duration can be stored.
- Step S303 Display a second configuration interface, where the second configuration interface includes a plurality of application options, and the application options are used to select the setting application.
- the mobile terminal may also display a second configuration interface A8, and the second configuration interface A8 is used to select a setting application.
- the second configuration interface A8 includes multiple application options, and the set application can be set according to the detected operations on the different application options.
- Step S304 According to the detected selection operation of the multiple application options, one or more applications are selected as the setting application.
- the user can check one or more application options. If it is detected that an application option is checked, the application corresponding to the application option will be used as the setting application. Tick multiple application options, and the application corresponding to each application option will be used as the setting application.
- Step S305 Display a third configuration interface, the third configuration interface includes a plurality of interface options corresponding to the setting application, and the interface options are used to select the setting interface.
- the mobile terminal may also display a third configuration interface A9, and the third configuration interface A9 is used to configure the setting interface.
- the third configuration interface A9 includes multiple interface options corresponding to the setting application, and the setting application can be set according to the detected operations on the different interface options.
- the third configuration interface can be entered and displayed, and the third configuration interface is the configuration interface corresponding to the selected application option.
- the third configuration interface may also provide an interface preview function, so that the user can determine the selected application interface after previewing the interface.
- Step S306 According to the detected selection operation of the multiple interface options, one or more application interfaces are selected as the setting interface.
- the user can check one or more interface options. If it is detected that an interface option is checked, the interface corresponding to the interface option will be used as the setting interface of the setting application , If it is detected that multiple interface options are checked, the interface corresponding to each interface option will be used as the setting interface of the setting application.
- Step S307 When it is detected that the mobile terminal is running the setting application and displaying the setting interface of the setting application, collect environmental images through the camera according to the set interval.
- the environment image can be collected through the camera according to the aforementioned setting interval. That is to say, at every set interval, execute “collect environmental images through the camera. If the environmental images include face images, then perform face recognition on the face images to obtain the recognition results”, thereby reducing the collection of images and people. Face recognition consumes the processor resources and power of the mobile terminal and improves the battery life of the mobile terminal.
- the security protection method may further include: detecting the occupancy rate of the processor of the mobile terminal; if the occupancy rate is greater than the set occupancy rate, increasing the set interval duration.
- the occupancy rate of the processor of the mobile terminal is greater than the set occupancy rate, it means that the current mobile terminal has more processing tasks and the processor is under greater pressure, so the set interval can be increased to reduce the collection of environmental images and The number of face recognitions reduces the burden on the processor and avoids system crashes.
- the specific size of the set occupancy rate may not be a limitation, for example, it may be 80%, or 75%, etc.
- the safety protection method may further include: detecting the remaining power of the battery; if the remaining power is lower than a set power, increasing the set interval duration. Among them, if the remaining power of the battery of the mobile terminal is lower than the set power, it means that the current sound power of the battery is not enough. Therefore, the set interval can be increased to reduce the number of environmental image collection and face recognition, and reduce the number of Consumption of battery power.
- the specific size of the set power amount is not limited, for example, it may be 50%, or 40%, etc.
- Step S308 If the environment image includes a face image, perform face recognition on the face image to obtain a recognition result.
- step S308 can refer to the content of the foregoing embodiment, which will not be repeated here.
- Step S309 When the recognition result indicates that the environmental image includes a face image corresponding to an unregistered user, perform a preset security protection process on the setting interface.
- performing preset security protection processing on the setting interface may include: closing the setting application. It is understandable that when the recognition result indicates that the environment image includes a face image corresponding to an unregistered user, closing the setting application can effectively avoid the leakage of content and information in the setting interface.
- performing preset security protection processing on the setting interface may also include: continuing to collect environmental images through the camera; if the environmental images that the camera continues to collect include face images corresponding to non-registered users, then Output an alarm sound for prompting; record the operation behavior of the setting application; obtain the current positioning position, and send the operation behavior and the positioning position to a designated terminal. It is understandable that if the environment image collected by the camera still includes the face image corresponding to the non-registered user after the setting application is closed, it means that the non-registered user may still be holding the mobile terminal, so the alarm sound can be outputted. Warn non-registered users, and also prompt.
- the designated terminal may be a terminal preset by the registered user. For example, when the operation behavior and the location location are sent to the designated terminal in the form of a short message, the mobile terminal may pre-store the phone number of the designated terminal.
- the mobile terminal may pre-store security protection policies corresponding to each setting interface.
- the mobile terminal can display an associated interface for associating a security protection policy with a setting interface.
- the associated interface includes options for different security protection policies, and can display detailed information about the security protection policy, thereby facilitating users Associate the security protection strategy with the setting interface.
- different setting interfaces have different security protection levels.
- interfaces related to private information such as chat content, shopping records, browsing records, etc.
- the security protection level corresponding to the interface can be used as the first security protection level
- the interface involving property information such as bill content, bank card information, payment information, etc.
- the level can be used as the second safety protection level
- the first safety protection level is less than the second safety protection level.
- the mobile terminal can set a security protection strategy corresponding to the security protection level on the setting interface according to the security protection levels corresponding to different setting interfaces.
- the mobile terminal can identify information in different setting interfaces to determine whether the setting interface belongs to the first type of interface or the second type of interface; the mobile terminal can also classify different setting interfaces according to the user's operation To the first type of interface or the second type of interface, there is no limitation here.
- performing preset security protection processing on the setting interface may include: when the setting interface is the first type of interface, according to the security corresponding to the first security protection level A protection strategy to perform anti-peeping processing on the setting interface; when the setting interface is the second type of interface, close the setting application according to the security protection policy corresponding to the second security protection level . It is understandable that in the first type of interface, since it involves private information, and the importance of private information is lower than the importance of property information, the first security protection level is lower than the second security protection level.
- the security protection strategy of the first security level it can only be anti-peeping processing, such as switching the setting interface to the target interface with prompt effect, replacing the content of the target area in the setting interface, or lowering the setting interface
- the target interface can be set in advance, such as a high-brightness pure color interface, etc.; the target area can be the central area of the setting interface and the ratio of the target area to the setting interface can be greater than the preset ratio ( For example, 70%, 80%, etc.); the setting brightness may be the brightness at which the user cannot clearly see the content of the setting interface, and the specific brightness value may not be a limitation.
- the setting application can be directly closed to prevent non-registered users from using illegal software to steal property information.
- the environment image can also be collected through the camera; if the environment image collected by the camera includes the face corresponding to the non-registered user Image, output an alarm sound for prompting; record the operation behavior of the setting application; obtain the current positioning position, and send the operation behavior and the positioning position to the designated terminal.
- the security protection method provided by the embodiments of this application provides multiple configuration interfaces, so that users can configure the setting applications that need security protection, the setting interface, the setting interval for testing, etc., to meet the needs of different users for information protection .
- the setting application is running and the setting interface is displayed, the environment image is collected and face recognition is performed. If the recognition result indicates that the environment image includes the face image corresponding to the non-registered user, the preset security protection processing is performed on the setting interface Therefore, protection of the setting interface of the setting application displayed on the mobile terminal can be realized, the content and information in the setting interface can be protected, and the security of the mobile terminal can be improved.
- FIG. 8 shows a schematic flowchart of a security protection method provided by another embodiment of the present application.
- the security protection method can be applied to the operating system of the above mobile terminal. The following will elaborate on the process shown in FIG. 8.
- the security protection method may specifically include the following steps:
- Step S410 Detect the environmental information where the mobile terminal is currently located.
- the mobile terminal may also detect the environmental information in which the mobile terminal is currently located before executing the procedure of the security protection method.
- the environmental information may include positioning information, time information, and so on.
- the mobile terminal can obtain environmental information through built-in sensors such as positioning modules.
- Step S420 If the environmental information satisfies the set environmental conditions, when it is detected that the mobile terminal runs the setting application and displays the setting interface of the setting application, collect environmental images through the camera.
- the environmental information after obtaining the environmental information, it can be determined whether the environmental information meets the set conditions.
- the environmental information meets the set environmental conditions, it will execute when it is detected that the mobile terminal runs the set application and displays the When setting the setting interface of the application, the environment image is collected through the camera.
- the environmental information does not meet the set environmental conditions, it is not executed when it is detected that the mobile terminal runs the setting application and displays the setting interface of the setting application, collecting environmental images through the camera.
- the set environmental conditions can be used to characterize that the mobile terminal is in a safe environment.
- the environmental information includes positioning information of the mobile terminal; the environmental information satisfies a set environmental condition, including: the positioning information is not set positioning information.
- the set location information can include the registered user's address, office address, etc.
- the mobile terminal is in a relatively safe environment, so there is no need to perform the process of security protection methods.
- the location corresponding to the positioning information is determined, the mobile terminal is not in a safe environment, so a security protection process is required.
- Step S430 If the environment image includes a face image, perform face recognition on the face image to obtain a recognition result.
- Step S440 When the recognition result indicates that the environmental image includes a face image corresponding to an unregistered user, perform a preset security protection process on the setting interface.
- step S430 and step S440 can refer to the content of the foregoing embodiment, and will not be repeated here.
- the security protection method detects the environment information of the mobile terminal, and when the environment information meets the set environmental conditions, executes when it is detected that the mobile terminal runs the setting application and displays the setting interface of the setting application
- the environment image is collected through the camera, when the environment image includes a face image, face recognition is performed, and when the recognition result indicates that the environment image includes the corresponding face image of an unregistered user, the preset security protection processing is performed on the setting interface
- the preset security protection processing is performed on the setting interface
- FIG. 9 shows a structural block diagram of a safety protection device 400 provided by an embodiment of the present application.
- the safety protection device 400 can be applied to the operating system of the above-mentioned mobile terminal, and the mobile terminal includes a touch screen.
- the safety protection device 400 includes: an image acquisition module 410, a face recognition module 420, and a protection processing module 430.
- the image acquisition module 410 is used for collecting environmental images through the camera when it is detected that the mobile terminal is running a setting application and displaying the setting interface of the setting application;
- the face recognition module is used for If the environmental image includes a human face image, perform face recognition on the human face image to obtain a recognition result;
- the protection processing module is used for when the recognition result indicates that the environmental image includes an unregistered user For the corresponding face image, the preset security protection processing is performed on the setting interface.
- the protection processing module 430 includes an image determination unit and a protection execution unit.
- the image determining unit is used to determine whether the environmental image also includes the facial image corresponding to the registered user when the recognition result indicates that the environmental image includes the facial image corresponding to the registered user;
- the protection execution unit is used to determine whether the environmental image also includes the facial image corresponding to the registered user;
- the environment image does not include the face image corresponding to the registered user, and the preset security protection processing is performed on the setting interface.
- the protection execution unit may be specifically configured to: if the face image corresponding to the registered user is not included in the environment image, determine whether the target environment image is acquired within a preset period of time before the current time, the target environment image Including the face image corresponding to the registered user; if the target environment image does not exist, the preset security protection processing is performed on the setting interface.
- the protection processing module 430 may also be used to: after determining whether the environmental image also includes a face image corresponding to a registered user, if the environmental image also includes a face image corresponding to the registered user Face image, to determine whether the face image corresponding to the registered user is in the designated area in the environmental image; if the face image corresponding to the registered user is not in the designated area in the environmental image, perform the Safe protection processing.
- the protection processing module 430 may also be used to: after determining whether the environmental image also includes the face image corresponding to the registered user, if the other face image includes the person corresponding to the registered user The face image determines the proportion of the face image corresponding to the registered user in the environmental image; if the proportion is less than the set proportion, the security protection processing is performed.
- the safety protection device may also include an information prompt module and an information input module.
- the information prompt module is used to display prompt information before the security protection processing is performed, and the prompt information is used to prompt the user to enter verification information; the information input module is used to receive the entered verification information; if the verification information is related to the device When the verification information does not match, the security protection processing is performed.
- the protection processing module 430 may also be used to: after determining whether the environmental image also includes a face image corresponding to a registered user, if the environmental image also includes a face image corresponding to the registered user For the face image, the preset security protection processing is not performed on the setting interface.
- the protection processing module 430 may be specifically configured to: close the setting application.
- the protection processing module 430 can also be specifically used to: continue to collect environmental images through the camera; if the environmental images that the camera continues to collect include face images corresponding to non-registered users, output an alarm for prompting Sound; will record the operation behavior of the setting application; obtain the current positioning position, and send the operation behavior and the positioning position to a designated terminal.
- the image acquisition module 410 may be specifically configured to collect environmental images through the camera according to a set interval.
- the safety protection device 400 may further include a first interface display module and a duration determination module.
- the first interface display module is used to display a first configuration interface
- the first configuration interface includes a first control
- the first control is used to configure the set interval duration;
- the operation of the first control configures the set interval duration.
- the safety protection device 400 may further include: an occupancy detection module and a first duration adjustment module.
- the occupancy rate detection module is used to detect the occupancy rate of the processor of the mobile terminal; the first duration adjustment module is used to increase the set interval duration if the occupancy rate is greater than the set occupancy rate.
- the safety protection device 400 may further include: a power detection module and a second duration adjustment module.
- the power detection module is used to detect the remaining power of the battery; the second time length adjustment module is used to increase the set interval time if the remaining power is lower than the set power.
- the safety protection device 400 may further include an environment detection module.
- the environment detection module is used to detect the environment information where the mobile terminal is currently located; if the environment information meets the set environmental conditions, the image acquisition module 410 executes and displays the set application when the mobile terminal is detected When the setting interface of the application is set, the environment image is collected through the camera.
- the environmental information includes positioning information of the mobile terminal; the environmental information satisfies a set environmental condition, including: the positioning information is not set positioning information.
- the safety protection device 400 may further include a second interface display module, an application setting module, a third interface display module, and an interface setting module.
- the second interface display module is used to display a second configuration interface before collecting environmental images through the camera when it is detected that the mobile terminal is running the setting application and displaying the setting interface of the setting application.
- the second configuration interface includes a plurality of application options, and the application options are used to select the setting application; the application setting module is used to select one or more application options according to a detected selection operation on the multiple application options.
- the third interface display module is used to display a third configuration interface, the third configuration interface includes a plurality of interface options corresponding to the setting application, the interface options are used to select the settings Setting interface; the interface setting module is used to select one or more application interfaces as the setting interface according to the detected selection operation of the multiple interface options.
- the image acquisition module 410 may be specifically configured to: the operating system of the mobile terminal invokes the camera from the background, and controls the camera to collect environmental images.
- the coupling between the modules may be electrical, mechanical or other forms of coupling.
- each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module.
- the above-mentioned integrated modules can be implemented in the form of hardware or software function modules.
- the solution provided by this application collects environmental images through the camera when it detects that the mobile terminal is running the setting application and displays the setting interface of the setting application. Face recognition is performed on the face image, and the recognition result is obtained. When the recognition result characterizes the environment image including the face image corresponding to the non-registered user, the preset security protection processing is performed on the setting interface, so as to realize the display setting of the mobile terminal.
- the protection of the setting interface of the application protect the content and information in the setting interface, and improve the security of the mobile terminal.
- FIG. 10 shows a structural block diagram of a mobile terminal provided by an embodiment of the present application.
- the mobile terminal 100 may be an electronic device capable of running applications, such as a smart phone, a tablet computer, an e-book, or a smart watch.
- the mobile terminal 100 in this application may include one or more of the following components: a processor 110, a memory 120, a camera 130, and one or more application programs, of which one or more application programs may be stored in the memory 120 and configured To be executed by one or more processors 110, one or more programs are configured to execute the methods described in the foregoing method embodiments.
- the processor 110 may include one or more processing cores.
- the processor 110 uses various interfaces and lines to connect various parts of the entire mobile terminal 100, and executes by running or executing instructions, programs, code sets, or instruction sets stored in the memory 120, and calling data stored in the memory 120.
- Various functions and processing data of the mobile terminal 100 may adopt at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA).
- DSP Digital Signal Processing
- FPGA Field-Programmable Gate Array
- PDA Programmable Logic Array
- the processor 110 may be integrated with one or a combination of a central processing unit (CPU), a graphics processing unit (GPU), a modem, and the like.
- the CPU mainly processes the operating system, user interface, and application programs; the GPU is used for rendering and drawing of display content; the modem is used for processing wireless communication. It can be understood that the above-mentioned modem may not be integrated into the processor 110, but may be implemented by a communication chip alone.
- the memory 120 may include random access memory (RAM) or read-only memory (Read-Only Memory).
- the memory 120 may be used to store instructions, programs, codes, code sets or instruction sets.
- the memory 120 may include a program storage area and a data storage area, where the program storage area may store instructions for implementing the operating system and instructions for implementing at least one function (such as touch function, sound playback function, image playback function, etc.) , Instructions used to implement the following various method embodiments, etc.
- the data storage area can also store data (such as phone book, audio and video data, chat record data) created by the terminal 100 during use.
- the camera 130 is used to collect environmental images of the environment in which the mobile terminal is located.
- the camera 130 may be a color camera or an infrared camera, and the specific type is not limited in the embodiment of the present application.
- FIG. 11 shows a structural block diagram of a computer-readable storage medium provided by an embodiment of the present application.
- the computer-readable medium 800 stores program code, and the program code can be invoked by a processor to execute the method described in the foregoing method embodiment.
- the computer-readable storage medium 800 may be an electronic memory such as flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, hard disk, or ROM.
- the computer-readable storage medium 800 includes a non-transitory computer-readable storage medium.
- the computer-readable storage medium 800 has storage space for the program code 810 for executing any method steps in the above-mentioned methods. These program codes can be read from or written into one or more computer program products.
- the program code 810 may be compressed in a suitable form, for example.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
一种安全防护方法、装置、移动终端及存储介质,该安全防护方法应用于移动终端的操作系统,该移动终端包括摄像头,该安全防护方法包括:当检测到所述移动终端运行设定应用,并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像(S110);如果所述环境图像中包括人脸图像,则对所述人脸图像进行人脸识别,获得识别结果(S120);当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,对所述设定界面进行预设的安全防护处理(S130)。可以较好实现对于用户的信息的保护。
Description
本申请涉及移动终端技术领域,更具体地,涉及一种安全防护方法、装置、移动终端及存储介质。
移动终端,例如平板电脑、手机等,已经成为人们日常生活中最常用的消费型电子产品之一。随着移动终端的快速发展,移动终端中安装的应用程序也越来越多,而应用程序运行时的安全防护成为了重点问题。
发明内容
鉴于上述问题,本申请提出了一种安全防护方法、装置、移动终端及存储介质。
第一方面,本申请实施例提供了一种安全防护方法,应用于移动终端的操作系统,所述移动终端包括摄像头,所述方法包括:当检测到所述移动终端运行设定应用,并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像;如果所述环境图像中包括人脸图像,则对所述人脸图像进行人脸识别,获得识别结果;当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,对所述设定界面进行预设的安全防护处理。。
第二方面,本申请实施例提供了一种安全防护装置,应用于移动终端的操作系统,所述移动终端包括摄像头,所述装置包括:图像获取模块、人脸识别模块以及防护处理模块,其中,所述图像获取模块用于当检测到所述移动终端运行设定应用,并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像;所述人脸识别模块用于如果所述环境图像中包括人脸图像,则对所述人脸图像进行人脸识别,获得识别结果;所述防护处理模块用于当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,对所述设定界面进行预设的安全防护处理。
第三方面,本申请实施例提供了一种移动终端,包括:一个或多个处理器;存储器;一个或多个应用程序,其中所述一个或多个应用程序被存储在所述存储器中并被配置为由所述一个或多个处理器执行,所述一个或多个程序配置用于执行上述第一方面提供的安全防护方法。
第四方面,本申请实施例提供了一种计算机可读取存储介质,所述计算机可读取存储介质中存储有程序代码,所述程序代码可被处理器调用执行上述第一方面提供的安全防护方法。
本申请提供的方案,通过当检测到移动终端运行设定应用,并设定应用的设定界面时,通过摄像头采集环境图像,如果环境图像中包括人脸图像,对人脸图像进行人脸识别,获得识别结果,当识别结果表征环境图像包括非注册用户对应的人脸图像时,对该设定界面进行预设的安全防护处理,从而可以实现对于移动终端显示的设定应用的设定界面的防护,保护设定界面内的内容和信息,提升移动终端的安全性。
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1示出了根据本申请一个实施例的安全防护方法流程图。
图2示出了根据本申请另一个实施例的安全防护方法流程图。
图3示出了根据本申请又一个实施例的安全防护方法流程图。
图4示出了本申请又一个实施例提供的一种界面示意图。
图5示出了本申请又一个实施例提供的另一种界面示意图。
图6示出了本申请又一个实施例提供的又一种界面示意图。
图7示出了本申请又一个实施例提供的再一种界面示意图。
图8示出了根据本申请再一个实施例的安全防护方法流程图。
图9示出了根据本申请一个实施例的安全防护装置的一种框图。
图10是本申请实施例的用于执行根据本申请实施例的安全防护方法的移动终端的框图。
图11是本申请实施例的用于保存或者携带实现根据本申请实施例的安全防护方法的程序代码的存储单元。
为了使本技术领域的人员更好地理解本申请方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。
随着科技和生活水平的进步,人们对于移动终端的使用需求越来越高,越来越多的应用程序被安装于移动终端中,从而方便用户的日常使用。例如,移动终端中安装有聊天软件、支付软件等,从而便于用户利用移动终端进行聊天和支付。
另外,移动终端中运行的一些应用程序(例如支付软件)在登录和支付时,应用程序根据自身的软件逻辑,会进行身份验证的过程。但是对于应用程序中一些涉及重要信息(例如隐私信息、财产信息等)的界面,由于应用程序并不会进行身份验证,因此可能造成信息的泄露。例如,运行聊天应用后,移动终端被放在一旁,而陌生人拿起手机即可看到聊天信息等,容易造成隐私泄露。又例如,由于支付应用只会根据软件逻辑,在支付时进行身份验证,而如果支付应用被陌生人打开后,陌生人可以看到账单、余额等信息。
针对上述问题,发明人提出了本申请实施例提供的安全防护方法、装置、移动终端以及存储介质,通过检测到移动终端运行设定应用,并显示设定应用的设定界面时,通过摄像头采集环境图像,并对环境图像中的人脸图像进行人脸识别,如果环境图像中包括非注册用户对应的人脸图像时,对设定界面进行安全防护处理,防止设定界面中的信息泄露。其中,具体的安全防护方法在后续的实施例中进行详细的说明。
请参阅图1,图1示出了本申请一个实施例提供的安全防护方法的流程示意图。所述安全防护方法用于移动终端的操作系统对设定应用的设定界面,进行安全防护处理,防止设定界面中的用户信息泄露。在具体的实施例中,所述安全防护方法应用于如图9所示的安全防护装置400以及配置有所述安全防护装置400的移动终端100(图10)。下面将以移动终端为例,说明本实施例的具体流程,当然,可以理解的,本实施例所应用的移动终端可以为智能手机、平板电脑、电子书等,在此不做限定。其中,所述移动终端包括摄像头。下面将针对图1所示的流程进行详细的阐述,所述安全防护方法具体可以包括以下步骤:
步骤S110:当检测到所述移动终端运行设定应用,并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像。
在本申请实施例中,移动终端中可以预先配置有需要进行安全防护的设定应用,以及设定应用中需要进行安全防护的设定界面。移动终端的操作系统可以对运行的应用程序进行检测,并且对显示的应用程序的界面进行检测,以确定显示的应用界面是否为需要进行安全防护的界面。设定应用以及设定界面可以根据用户的操作而配置, 也可以根据安装应用时,应用厂商的推荐信息而配置,在此不做限定。
在一些实施方式中,移动终端的操作系统可以实时检测运行的应用程序,以及显示的应用程序的界面;移动终端的操作系统也可以按照设定的间隔时长,检测运行的应用程序,以及显示的应用程序的界面。
在一些实施方式中,移动终端的操作系统可以通过操作系统的进程管理获取当前运行的应用,并且可以获取到运行的应用的状态和信息等,例如应用在前台运行或者在后台运行,应用运行占用的处理器资源,应用当前调用的硬件模块等。当然,获取移动终端中当前运行的应用的方式可以不作为限定。
进一步的,移动终端可以从当前运行的应用中,确定是否存在设定应用,并在设定应用在前台运行时,检测显示的设定应用的界面。作为一种方式,操作系统可以根据显示设定应用的界面时,渲染的界面图层,确定显示的设定应用的界面,例如,显示支付应用的账单界面时,会渲染账单界面所对应的图层,而渲染账单界面所对应的图层时,可以根据调用的该图层的图层文件,确定显示的应用界面为账单界面。作为另一种方式,操作系统的系统底层也可以从应用层中向设定应用发起界面确定指令,系统底层再接收设定应用返回的界面标识,从而根据界面标识,确定当前显示的应用界面。当然,具体检测当前显示的应用界面的方式可以不作为限定。
在一些实施方式中,如果操作系统检测到当前正运行设定应用,并显示该设定应用的设定界面时,则可以通过摄像头采集环境图像,以根据采集的环境图像进行身份验证,从而确定是否对设定界面进行安全防护处理。作为一种具体的实施方式,操作系统可以从后台调用摄像头,并控制摄像头采集环境图像,从而可以在用户无察觉的情况下,完成环境图像的采集。其中,摄像头可以为前置摄像头,以采集显示屏朝向一面的环境图像。
步骤S120:如果所述环境图像中包括人脸图像,则对所述人脸图像进行人脸识别,获得识别结果。
在本申请实施例中,在获取到环境图像之后,则可以确定环境图像中是否包括人脸图像。作为一种方式,摄像头采集的图像为二维图像,通过查找该图像内是否有人脸五官特征点,能够确定环境图像中是否包括人脸图像。作为另一种方式,摄像头采集图像的环境图像为根据结构光成像,采集到环境图像,此时可以根据结构光所采集的三维信息,确定是否存在人脸三维信息,从而确定环境图像中是否包括人脸图像。
在本申请实施例中,如果采集的环境图像中包括人脸图像时,则可以对人脸图像进行人脸识别,获得识别结果。具体的,可以识别人脸图像的人脸特征,并将识别到的人脸特征与注册用户的人脸图像的人脸图像进行匹配;如果匹配,则确定环境图像中包括注册用户对应的人脸图像;如果不匹配,则确定环境图像中包括非注册用户对应的人脸图像。其中,注册用户指在移动终端中预先注册或者预先存储的用户,并且移动终端中预先存储有注册用户的人脸图像,而非注册用户与注册用户相对,非注册用户指未在移动终端中预先注册或者预先存储的用户。
步骤S130:当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,对所述设定界面进行预设的安全防护处理。
在本申请实施例中,操作系统在到对环境图像中的人脸图像进行人脸识别,并获取到识别结果后,则可以根据识别结果确定当前是否需要对设定界面进行安全防护处理。
在一些实施方式中,如果识别结果表征环境图像中包括非注册用户对应的人脸图像,则可以对设定界面进行预设的安全防护处理。可以理解的,移动终端在显示设定应用的设定界面时,如果移动终端所处环境中包括非注册用户,则表示移动终端周围存在非注册用户,此时可能非注册用户正在查看设定界面,因此可以对设定界面进行安全防护处理,以避免设定界面中的个人信息泄露。
在一些实施方式中,对设定界面进行安全防护处理,可以包括:退出设定应用、对设定界面切换为其他界面、记录操作行为、发送提示信息至其他设备、发出警报提示中的一种或者多种。作为一种可选的方式,操作系统可以控制设定应用关闭,从而使非注册用户无法看到设定界面的内容,实现对设定界面中的内容的保护。
本申请实施例提供的安全防护方法,通过当检测到移动终端运行设定应用,并显示设定应用的设定界面时,通过摄像头采集环境图像,如果环境图像中包括人脸图像,对人脸图像进行人脸识别,获得识别结果,当识别结果表征环境图像包括非注册用户对应的人脸图像时,对该设定界面进行预设的安全防护处理,从而可以实现对于移动终端显示的设定应用的设定界面的防护,保护设定界面内的内容和信息,提升移动终端的安全性。
请参阅图2,图2示出了本申请另一个实施例提供的安全防护方法的流程示意图。该安全防护方法可以应用于上述移动终端的操作系统。下面将针对图2所示的流程进行详细的阐述,所述安全防护方法具体可以包括以下步骤:
步骤S210:当检测到所述移动终端运行设定应用,并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像。
步骤S220:如果所述环境图像中包括人脸图像,则对所述人脸图像进行人脸识别,获得识别结果。
在本申请实施例中,步骤S210以及步骤S220可以参阅前述实施例的内容,在此不再赘述。
步骤S230:当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,确定所述环境图像中是否还包括注册用户对应的人脸图像。
在本申请实施例中,当识别结果表征环境图像中包括非注册用户对应的人脸图像时,还可以确定环境图像中是否还包括注册用户对应的人脸图像。同样的,注册用户指在移动终端中预先注册或者预先存储的用户,并且移动终端中预先存储有注册用户的人脸图像,而非注册用户与注册用户相对,非注册用户指未在移动终端中预先注册或者预先存储的用户。
可以理解的,可能环境图像中存在多个人脸图像,多个人脸图像中可能既包括注册用户对应的人脸图像,又包括非注册用户对应的人脸图像。例如,聚会时,用注册户的手机被其朋友拿去玩,并且进入到设定应用的设定界面,此时摄像头采集的环境图像可能既包括注册用户对应的人脸图像,又包括非注册用户对应的人脸图像。操作系统可以对环境图像中的人脸图像进行确认,从而确定出环境图像是否还包括注册用户对应的人脸图像,即同时包括注册用户对应的人脸图像以及非注册用户对应的人脸图像。
步骤S240:如果所述环境图像中不包括所述注册用户对应的人脸图像,对所述设定界面进行预设的安全防护处理。
在一些实施方式中,如果环境图像中不包括注册用户对应的人脸图像,即环境图像中仅存在非注册用户对应的人脸图像,则表示此时使用移动终端查看设定界面的用户为非注册用户,因此为了避免设定界面中的信息泄露,可以对设定界面进行预设的安全防护处理。
在一些实施方式中,考虑到可能注册用户与非注册用户同处于一场景下,移动终端在显示设定界面时,注册用户将移动终端递给非注册用户进行或查看,而此时为注册用户主动的行为,如果进行预设的安全防护处理,可能造成用户的不便。因此,步骤S240可以包括:
如果所述环境图像中不包括所述注册用户对应的人脸图像,判断当前时间之前的预设时长内是否获取到目标环境图像,所述目标环境图像包括注册用户对应的人脸图像;如果不存在所述目标环境图像,则对所述设定界面进行预设的安全防护处理。
可以理解的,操作系统可以根据当前时间之前的预设时长内,获取到的所有环境图像中人脸图像的人脸识别结果,确定是否当前时间之前的预设时长内是否获取到目标环境图像。如果不存在目标环境图像,则表示当前发生设定应用运行且显示设定界面的场景,不是注册用户主动向非注册用户展示设定界面的场景,因此,可以对设定界面进行安全防护处理,以避免设定界面中信息的泄露。例如,用户1在看聊天应用的聊天记录的界面时,其中,聊天应用为设定应用,了解记录的界面为设定界面,如果用户1发现网友有趣的对话,想分享给用户2看,则此时不会触发对设定界面进行安全防护处理,保证用户分享内容的需求。
步骤S250:如果所述环境图像中还包括所述注册用户对应的人脸图像,不对所述设定界面进行预设的安全防护处理。
在一些实施方式中,如果环境图像中还包括注册用户对应的人脸图像,则表示此时环境图像中同时包括注册用户对应的人脸图像以及非注册用户对应的人脸图像,该情况下,可以不对设定界面进行预设的安全防护处理。可以理解的,注册用户拿着移动终端查看设定界面时,可能所在环境中也存在非注册用户,此时对设定界面的查看场景为正常的查看场景,因此可以不对设定界面进行预设的安全防护处理。
在一些实施方式中,移动终端也可以在环境图像中同时包括注册用户对应的人脸图像以及非注册用户对应的人脸图像时,进行预设的安全防护处理,以避免用户查看设定界面时,被周围的非注册用户偷窥。
在一些实施方式中,移动终端中可以预先存储有第一策略以及第二策略。第一策略以及第二策略,用于在环境图像中同时包括注册用户对应的人脸图像以及非注册用户对应的人脸图像时,确定是否进行预设的安全防护处理。其中,第一策略下,环境图像中同时包括注册用户对应的人脸图像以及非注册用户对应的人脸图像时,不进行安全防护处理;第二策略下,环境图像中同时包括注册用户对应的人脸图像以及非注册用户对应的人脸图像时,进行安全防护处理。
进一步的,移动终端可以显示用于设置第一策略或者第二策略的设置界面,当检测到对第一策略的选择操作时,则将第一策略作为环境图像中同时包括注册用户对应的人脸图像以及非注册用户对应的人脸图像时,确定是否对设定界面进行预设的安全防护处理的判定策略;当检测到对第二策略的选择操作时,则将第二策略作为环境图像中同时包括注册用户对应的人脸图像以及非注册用户对应的人脸图像时,确定是否对设定界面进行预设的安全防护处理的判定策略。
在该实施方式下,当操作系统确定出环境图像同时包括注册用户对应的人脸图像以及非注册用户对应的人脸图像时,则可以根据判断策略的策略标识,确定当前的判定策略,如果根据策略标识,确定出当前的判断策略为第一策略,则不对设定界面进行预设的安全防护处理;如果根据测量标志,确定出当前的判断策略为第二策略,则对设定界面进行预设的安全防护处理。
在一些实施方式中,在所述确定所述环境图像中是否还包括注册用户对应的人脸图像之后,该安全防护方法还可以包括:
如果所述环境图像中还包括所述注册用户对应的人脸图像,确定所述注册用户对应的人脸图像是否处于所述环境图像中的指定区域;如果所述注册用户对应的人脸图像未处于所述环境图像中的指定区域,则进行所述安全防护处理。
可以理解的,由于环境图像中同时存在注册用户对应的人脸图像以及非注册用户对应的人脸图像,此时可能是注册用户自己拿起手机在看显示界面,并且所处环境中存在非注册用户,也可能是非注册用户拿着手机与注册用户处于同一环境查看显示界面。而拿着移动终端的用户对应的人脸图像通常处于环境图像中的中心区域,因此可以设置出环境图像中的中心区域作为指定区域,并且判断注册用户对应的人脸图像是否处于所述环境图像中的指定区域,指定区域的具体大小可以不作为限定,可以根据 多次实验获得;如果注册用户对应的人脸图像处于所述环境图像中的指定区域,则表示当前为注册用户拿着移动终端察看设定界面,此时对设定界面的查看行为是注册用户的正常操作行为,因此不对设定进行预设的安全防护处理;而如果注册用户对应的人脸图像未处于所述环境图像中的指定区域,则表示当前为非注册用户拿着移动终端察看设定界面,此时对设定界面的查看行为是非注册用户的操作行为,因此对设定界面进行预设的安全防护处理,避免设定界面中的内容被非注册用户查看和操作。
在一些实施方式中,在所述确定所述环境图像中是否还包括注册用户对应的人脸图像之后,所述方法还包括:
如果所述其他人脸图像中包括注册用户对应的人脸图像,确定所述注册用户对应的人脸图像所占所述环境图像的占比;如果所述占比小于设定占比,则进行所述安全防护处理。
可以理解的,由于环境图像中同时存在注册用户对应的人脸图像以及非注册用户对应的人脸图像,此时可能是注册用户自己拿起手机在看显示界面,并且所处环境中存在非注册用户,也可能是非注册用户拿着手机与注册用户处于同一环境查看显示界面。而拿着移动终端的用户对应的人脸图像占据环境图像的比例会较大,设置通常用户查看手机时采集到的环境图像中用户图像所占环境图像的占比,作为设定占比,设定占比的具体大小可以不作为限定,可以根据多次实验获得;如果注册用户对应的人脸图像所占环境图像的占比大于或等于该设定占比,则表示当前为注册用户拿着移动终端察看设定界面,此时对设定界面的查看行为是注册用户的正常操作行为,因此不对设定进行预设的安全防护处理;而如果注册用户对应的人脸图像所占环境图像的占比小于该设定占比,则表示当前为非注册用户拿着移动终端察看设定界面,此时对设定界面的查看行为是非注册用户的操作行为,因此对设定界面进行预设的安全防护处理,避免设定界面中的内容被非注册用户查看和操作。
在以上两种实施方式中,通过确定当前使用移动终端查看设定界面的用户是否为注册用户,而确定是否对设定界面进行预设的安全防护处理。在一些场景下,可能注册用户是主动将移动终端显示的设定界面,分享至非注册用户查看,因此在所述进行所述安全防护处理之前,该安全防护方法还可以包括:
显示提示信息,所述提示信息用于提示用户输入验证信息;接收输入的验证信息;如果所述验证信息与设定验证信息不匹配时,进行所述安全防护处理。
可以理解的,如果确定出注册用户对应的人脸图像未处于所述环境图像中的指定区域,或者确定出注册用户对应的人脸图像所占环境图像的占比小于设定占比,表示不是注册用户拿着移动终端查看设定界面。考虑到可能注册用户和非注册用户一起查看设定界面的情况,可以进行获取验证信息并进行验证,如果接收到的验证信息与设定验证信息不匹配时,则进行安全防护处理;如果接收到的验证信息与设定验证信息匹配时,则不进行安全防护处理。其中,提示信息可以以弹窗形式进行提示。验证信息可以为注册用户预先设置,数字密码、验证码信息、指纹信息、声纹信息、虹膜信息等,在此不做限定。当验证信息为数字密码或者验证码信息时,用户还可以于弹窗中输入验证信息。从而在注册用户与非注册用户共同查看设定界面时,注册用户可以输入验证信息,并进行验证,从而保证正常的查看;而不是注册用户主动与非注册用户共同查看时,例如,注册用户与非注册用户处于同一环境中,非注册用户悄悄拿着移动终端进行查看,因此可以对设定界面进行安全防护处理,避免设定界面中的内容泄露。
本申请实施例提供的安全防护方法,通过当检测到移动终端运行设定应用,并显示设定应用的设定界面时,通过摄像头采集环境图像,如果环境图像中包括人脸图像,对人脸图像进行人脸识别,获得识别结果,如果识别结果表征环境图像中包括非注册用户对应的人脸图像,则确定环境图像中是否还包括注册用户对应的人脸图像,如果 环境图像中不包括注册用户对应的人脸图像,对设定界面进行预设的安全防护处理,而如果环境图像中包括注册用户对应的人脸图像时,不对设定界面进行预设的安全防护处理,对于移动终端显示的设定应用的设定界面的防护,保护设定界面内的内容和信息,提升移动终端的安全性,同时也能保证正常的对设定界面的查看。
请参阅图3,图3示出了本申请又一个实施例提供的安全防护方法的流程示意图。该安全防护方法可以应用于上述移动终端的操作系统。下面将针对图3所示的流程进行详细的阐述,所述安全防护方法具体可以包括以下步骤:
步骤S301:显示第一配置界面,所述第一配置界面包括第一控件,所述第一控件用于配置设定间隔时长。
在本申请实施例中,如图4所示,移动终端可以显示第一配置界面A1,该第一配置界面A1用于对设定间隔时长进行设置。其中,第一配置界面A1中包括第一空间A2,A2用于调整设定间隔时长的大小,以完成对设定间隔时长的配置。
在一些实施方式中,请参见图5,移动终端可以显示用于设置安全防护功能的基础配置界面A3,该A3中包括进入页面配置的选项A4、进入间隔时长配置的选项A5、进入策略配置的选项A6以及进入防护方式配置的选项A7。其中,选项A4用于被触发时,进入和显示设定应用和设定界面的配置界面;选项A5被触发时,进入和显示设定间隔时长的配置界面(即第一配置界面A1);选项A6被触发时,进入和显示前述实施例中第一策略和第二策略的配置界面;选项A7被触发时,进入到防护方式的配置界面。
进一步的,当检测到对基础配置界面A3中选项A5的触发操作后,移动终端可以显示第一配置界面A1,以便用户设置设定间隔时长。
步骤S302:根据检测到的对所述第一控件的操作,配置所述设定间隔时长。
在显示第一配置界面后,则可以检测第一配置界面中的操作,并根据检测到的对第一控件的操作,获取设置的设定间隔时长,并将设定间隔时长进行存储。
步骤S303:显示第二配置界面,所述第二配置界面包括多个应用选项,所述应用选项用于选择所述设定应用。
在本申请实施例中,请参阅图6,移动终端还可以显示第二配置界面A8,该第二配置界面A8用于选择设定应用。其中,第二配置界面A8中包括多个应用选项,根据检测到的对不同应用选项的操作,即可设置设定应用。
步骤S304:根据检测到的对所述多个应用选项的选择操作,选择一个或者多个应用作为所述设定应用。
可以理解的,第二配置界面中,用户可以对一个或多个应用选项进行勾选,如果检测到对一个应用选项进行勾选,则将该应用选项对应的应用作为设定应用,如果检测到对多个应用选项进行勾选,则将每个应用选项对应的应用都作为设定应用。
步骤S305:显示第三配置界面,所述第三配置界面包括所述设定应用对应的多个界面选项,所述界面选项用于选择所述设定界面。
在本申请实施例中,请参阅图7,移动终端还可以显示第三配置界面A9,该第三配置界面A9用于配置设定界面。其中,第三配置界面A9中包括设定应用对应的多个界面选项,根据检测到的对不同界面选项的操作,即可设置设定应用。
可以理解的,在检测到对第二配置界面中任一应用选项的选择操作后,则可以进入并显示第三配置界面,第三配置界面为该被选择的应用选项对应的配置界面。
在一些实施方式中,第三配置界面中还可以提供界面预览功能,以便用户对界面进行预览后,而确定选择的应用界面。
步骤S306:根据检测到的对所述多个界面选项的选择操作,选择一个或者多个应用界面作为所述设定界面。
可以理解的,第三配置界面中,用户可以对一个或多个界面选项进行勾选,如果 检测到对一个界面选项进行勾选,则将该界面选项对应的界面作为设定应用的设定界面,如果检测到对多个界面选项进行勾选,则将每个界面选项对应的界面都作为设定应用的设定界面。
步骤S307:当检测到所述移动终端运行设定应用,并显示所述设定应用的设定界面时,按照设定间隔时长,通过所述摄像头采集环境图像。
在本申请实施例中,当移动终端的操作系统检测到移动终端运行设定应用,并显示设定应用的设定界面时,则可以按照上述设定间隔时长,通过摄像头采集环境图像。也就是说,每隔设定间隔时长,执行一次“通过摄像头采集环境图像,如果环境图像中包括人脸图像,则对人脸图像进行人脸识别,获得识别结果”,从而减少采集图像和人脸识别,对移动终端的处理器资源和电量的消耗,提升移动终端的续航时间。
在一些实施方式中,该安全防护方法还可以包括:检测所述移动终端的处理器的占用率;如果所述占用率大于设定占用率时,则增大所述设定间隔时长。其中,如果移动终端的处理器的占用率大于设定占用率时,表示当前移动终端的处理任务较多,处理器的压力较大,因此可以增大设定间隔时长,以减少采集环境图像以及人脸识别的次数,减轻处理器的负担,避免系统崩溃。其中,设定占用率的具体大小可以不作为限定,例如,可以为80%,也可以为75%等。
在一些实施方式中,该安全防护方法还可以包括:检测所述电池的剩余电量;如果所述剩余电量低于设定电量时,则增大所述设定间隔时长。其中,如果移动终端的电池的剩余电量低于设定电量时,表示电池当前的声音电量不足够多,因此可以增大设定间隔时长,以减少采集环境图像以及人脸识别的次数,减少对电池电量的消耗。其中,设定电量的具体大小可以不作为限定,例如,可以为50%,也可以为40%等。
步骤S308:如果所述环境图像中包括人脸图像,则对所述人脸图像进行人脸识别,获得识别结果。
在本申请实施例中,步骤S308可以参阅前述实施例的内容,在此不再赘述。
步骤S309:当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,对所述设定界面进行预设的安全防护处理。在一些实施方式中,对设定界面进行预设的安全防护处理,可以包括:关闭所述设定应用。可以理解的,在识别结果表征环境图像包括非注册用户对应的人脸图像时,关闭该设定应用,可以有效避免设定界面中内容和信息的泄露。
进一步的,对所述设定界面进行预设的安全防护处理,还可以包括:继续通过所述摄像头采集环境图像;如果所述摄像头继续采集的环境图像包括非注册用户对应的人脸图像,则输出用于提示的报警声;将对所述设定应用的操作行为进行记录;获取当前的定位位置,并将所述操作行为以及所述定位位置发送至指定终端。可以理解的,如果在关闭设定应用后,摄像头继续采集得到的环境图像中依然包括非注册用户对应的人脸图像,则表示非注册用户依然可能拿着移动终端,因此可以输出报警声,以警告非注册用户,并且也进行提示。另外,还将对设定应用的操作行为进行记录,获取当前的定位位置,并将操作行为以及定位位置发送至指定终端,方便指定终端能及时获取到该事件的发生,并可以根据定位位置快速查找移动终端。其中,指定终端可以为注册用户预先设置的终端,例如,当以短信形式发送操作行为以及定位位置给指定终端时,移动终端中可以预先存储有指定终端的电话号码。
在另一些实施方式中,移动终端中可以预先存储有与各个设定界面对应的安全防护策略。
作为一种实施方式,移动终端可以显示用于关联安全防护策略与设定界面的关联界面,关联界面中包括各个不同的安全防护策略的选项,并且可以显示安全防护策略的详细信息,从而便于用户将安全防护策略与设定界面进行关联。
作为另一种实施方式,不同的设定界面具有不同的安全防护级别,具体的,涉及 隐私信息(例如聊天内容、购物记录、浏览记录等)的界面可以作为第一类型的界面,第一类型的界面对应的安全防护级别可以作为第一安全防护级别,涉及财产信息(例如账单内容、银行卡信息、支付信息等)的界面可以作为第二类型的界面,第二类型的界面对应的安全防护级别可以作为第二安全防护级别,并且第一安全防护级别小于第二安全防护级别。移动终端可以根据不同设定界面对应的安全防护级别,而对设定界面设置与安全防护级别对应的安全防护策略。其中,移动终端可以识别不同设定界面中的信息,以确定设定界面属于第一类型的界面,或者属于第二类型的界面;移动终端也可以根据用户的操作,将不同的设定界面分类至第一类型的界面或者第二类型的界面,在此不做限定。
在该实施方式下,对所述设定界面进行预设的安全防护处理,可以包括:当所述设定界面为所述第一类型的界面时,根据所述第一安全防护级别对应的安全防护策略,对所述设定界面进行防偷窥处理;当所述设定界面为所述第二类型的界面时,根据所述第二安全防护级别对应的安全防护策略,关闭所述设定应用。可以理解的,在第一类型的界面中,由于其涉及隐私信息,而隐私信息的重要性低于财产信息的重要性,因此第一安全防护级别低于第二安全防护级别。针对第一安全级别的安全防护策略,则可以仅是进行防偷窥处理,例如将设定界面切换为具有提示作用的目标界面、将设定界面中目标区域的内容进行替换、或者降低设定界面的亮度至设定亮度,其中,目标界面可以预先设置,例如可以为高亮度的纯色界面等;目标区域可以为设定界面的中心区域并且目标区域占设定界面的比例可以大于预设比例(例如70%、80%等);设定亮度可以为用户无法看清设定界面的内容的亮度,具体的亮度值可以不作为限定。针对第二安全级别的安全防护策略,由于显示的设定界面为第二类型的界面,则可以是直接关闭设定应用,以避免非注册用户利用非法软件窃取财产信息等。
进一步的,在设定界面为第二类型的界面,对设定应用进行关闭之后,也可以继续通过所述摄像头采集环境图像;如果所述摄像头继续采集的环境图像包括非注册用户对应的人脸图像,则输出用于提示的报警声;将对所述设定应用的操作行为进行记录;获取当前的定位位置,并将所述操作行为以及所述定位位置发送至指定终端。
本申请实施例提供的安全防护方法,提供了多个配置界面,以便用户配置需要进行安全保护的设定应用、设定界面、进行检测的设定间隔时长等,满足不同用户对于信息保护的需求。在运行设定应用并显示设定界面时,采集环境图像并进行人脸识别,如果识别结果表征环境图像包括非注册用户对应的人脸图像时,对该设定界面进行预设的安全防护处理,从而可以实现对于移动终端显示的设定应用的设定界面的防护,保护设定界面内的内容和信息,提升移动终端的安全性。
请参阅图8,图8示出了本申请再一个实施例提供的安全防护方法的流程示意图。该安全防护方法可以应用于上述移动终端的操作系统。下面将针对图8所示的流程进行详细的阐述,所述安全防护方法具体可以包括以下步骤:
步骤S410:检测所述移动终端当前所处的环境信息。
在本申请实施例中,移动终端在执行安全防护方法的流程之前,还可以检测移动终端当前所处的环境信息。其中,环境信息可以包括定位信息、时间信息等。移动终端可以通过定位模块等内置的传感器获取环境信息。
步骤S420:如果所述环境信息满足设定环境条件,当检测到所述移动终端运行设定应用,并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像。
在本申请实施例中,获取到环境信息后,可以确定环境信息是否满足设定条件,当环境信息满足设定环境条件时,才执行当检测到所述移动终端运行设定应用并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像。而当环境信息不满足设定环境条件时,则不执行当检测到所述移动终端运行设定应用并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像。其中,该设定环境条件可以用于表征移 动终端处于安全的环境。
在一些实施方式中,所述环境信息包括所述移动终端的定位信息;所述环境信息满足设定环境条件,包括:所述定位信息不为设定定位信息。其中,设定定位信息可以包括注册用户的住址、办公室地址等,通常用户在设定定位信息对应的位置时,移动终端处于较为安全的环境,因此不需要进行安全防护方法的流程,而不在设定定位信息对应的位置时,则移动终端不处于安全的环境,因此需要进行安全防护的流程。通过上述对环境信息进行检测,并确定是否进行安全防护方法的流程,从而可以避免一些情况下无用的图像采集和人脸识别,造成移动终端的资源的浪费和电量损失。
步骤S430:如果所述环境图像中包括人脸图像,则对所述人脸图像进行人脸识别,获得识别结果。
步骤S440:当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,对所述设定界面进行预设的安全防护处理。
在本申请实施例中,步骤S430以及步骤S440可以参阅前述实施例的内容,在此不再赘述。
本申请实施例提供的安全防护方法,通过对移动终端所处环境信息进行检测,当环境信息满足设定环境条件时,执行当检测到移动终端运行设定应用并显示设定应用的设定界面时,通过摄像头采集环境图像,环境图像包括人脸图像时,进行人脸识别,并在识别结果表征环境图像包括非注册用户对应的人脸图像时,对设定界面进行预设的安全防护处理,从而实现通过上述对环境信息进行检测,并确定是否进行安全防护方法的流程,可以避免一些情况下无用的图像采集和人脸识别,造成移动终端的资源的浪费和电量损失。
请参阅图9,其示出了本申请实施例提供的一种安全防护装置400的结构框图。该安全防护装置400可以应用于上述移动终端的操作系统,移动终端包括触摸屏。该安全防护装置400包括:图像获取模块410、人脸识别模块420以及防护处理模块430。其中,所述图像获取模块410用于当检测到所述移动终端运行设定应用,并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像;所述人脸识别模块用于如果所述环境图像中包括人脸图像,则对所述人脸图像进行人脸识别,获得识别结果;所述防护处理模块用于当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,对所述设定界面进行预设的安全防护处理。
在一些实施方式中,防护处理模块430包括图像确定单元以及防护执行单元。图像确定单元用于当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,确定所述环境图像中是否还包括注册用户对应的人脸图像;防护执行单元用于如果所述环境图像中不包括所述注册用户对应的人脸图像,对所述设定界面进行预设的安全防护处理。
进一步的,防护执行单元可以具体用于:如果所述环境图像中不包括所述注册用户对应的人脸图像,判断当前时间之前的预设时长内是否获取到目标环境图像,所述目标环境图像包括注册用户对应的人脸图像;如果不存在所述目标环境图像,则对所述设定界面进行预设的安全防护处理。
在一些实施方式中,防护处理模块430还可以用于:在所述确定所述环境图像中是否还包括注册用户对应的人脸图像之后,如果所述环境图像中还包括所述注册用户对应的人脸图像,确定所述注册用户对应的人脸图像是否处于所述环境图像中的指定区域;如果所述注册用户对应的人脸图像未处于所述环境图像中的指定区域,则进行所述安全防护处理。
在一些实施方式中,防护处理模块430还可以用于:在所述确定所述环境图像中是否还包括注册用户对应的人脸图像之后,如果所述其他人脸图像中包括注册用户对应的人脸图像,确定所述注册用户对应的人脸图像所占所述环境图像的占比;如果所 述占比小于设定占比,则进行所述安全防护处理。
进一步的,该安全防护装置还可以包括信息提示模块以及信息输入模块。信息提示模块用于在所述进行所述安全防护处理之前,显示提示信息,所述提示信息用于提示用户输入验证信息;信息输入模块用于接收输入的验证信息;如果所述验证信息与设定验证信息不匹配时,进行所述安全防护处理。
在一些实施方式中,防护处理模块430还可以用于:在所述确定所述环境图像中是否还包括注册用户对应的人脸图像之后,如果所述环境图像中还包括所述注册用户对应的人脸图像,不对所述设定界面进行预设的安全防护处理。
在一些实施方式中,防护处理模块430可以具体用于:关闭所述设定应用。
在该方式下,防护处理模块430还可以具体用于:继续通过所述摄像头采集环境图像;如果所述摄像头继续采集的环境图像包括非注册用户对应的人脸图像,则输出用于提示的报警声;将对所述设定应用的操作行为进行记录;获取当前的定位位置,并将所述操作行为以及所述定位位置发送至指定终端。
在一些实施方式中,图像获取模块410可以具体用于:按照设定间隔时长,通过所述摄像头采集环境图像。
在一些实施方式中,安全防护装置400还可以包括第一界面显示模块以及时长确定模块。第一界面显示模块用于显示第一配置界面,所述第一配置界面包括第一控件,所述第一控件用于配置所述设定间隔时长;时长确定模块用于根据检测到的对所述第一控件的操作,配置所述设定间隔时长。
在一些实施方式中,安全防护装置400还可以包括:占用率检测模块以及第一时长调整模块。占用率检测模块用于检测所述移动终端的处理器的占用率;第一时长调整模块用于如果所述占用率大于设定占用率时,则增大所述设定间隔时长。
在一些实施方式中,安全防护装置400还可以包括:电量检测模块以及第二时长调整模块。电量检测模块用于检测所述电池的剩余电量;第二时长调整模块用于如果所述剩余电量低于设定电量时,则增大所述设定间隔时长。
在一些实施方式中,该安全防护装置400还可以包括环境检测模块。环境检测模块用于检测所述移动终端当前所处的环境信息;如果所述环境信息满足设定环境条件时,则图像获取模块410执行所述当检测到所述移动终端运行设定应用并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像。
进一步的,所述环境信息包括所述移动终端的定位信息;所述环境信息满足设定环境条件,包括:所述定位信息不为设定定位信息。
在一些实施方式中,该安全防护装置400还可以包括第二界面显示模块、应用设定模块、第三界面显示模块以及界面设定模块。第二界面显示模块用于在所述当检测到所述移动终端运行设定应用并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像之前,显示第二配置界面,所述第二配置界面包括多个应用选项,所述应用选项用于选择所述设定应用;应用设定模块用于根据检测到的对所述多个应用选项的选择操作,选择一个或者多个应用作为所述设定应用;第三界面显示模块用于显示第三配置界面,所述第三配置界面包括所述设定应用对应的多个界面选项,所述界面选项用于选择所述设定界面;界面设定模块用于根据检测到的对所述多个界面选项的选择操作,选择一个或者多个应用界面作为所述设定界面。
在一些实施方式中,图像获取模块410可以具体用于:所述移动终端的操作系统从后台调用所述摄像头,并控制所述摄像头采集环境图像。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述装置和模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,模块相互之间的耦合可以是电性,机械或其它形式的耦合。
另外,在本申请各个实施例中的各功能模块可以集成在一个处理模块中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
综上所述,本申请提供的方案,通过当检测到移动终端运行设定应用,并显示设定应用的设定界面时,通过摄像头采集环境图像,如果环境图像中包括人脸图像,对人脸图像进行人脸识别,获得识别结果,当识别结果表征环境图像包括非注册用户对应的人脸图像时,对该设定界面进行预设的安全防护处理,从而可以实现对于移动终端显示的设定应用的设定界面的防护,保护设定界面内的内容和信息,提升移动终端的安全性。
请参考图10,其示出了本申请实施例提供的一种移动终端的结构框图。该移动终端100可以是智能手机、平板电脑、电子书、智能手表等能够运行应用程序的电子设备。本申请中的移动终端100可以包括一个或多个如下部件:处理器110、存储器120、摄像头130以及一个或多个应用程序,其中一个或多个应用程序可以被存储在存储器120中并被配置为由一个或多个处理器110执行,一个或多个程序配置用于执行如前述方法实施例所描述的方法。
处理器110可以包括一个或者多个处理核。处理器110利用各种接口和线路连接整个移动终端100内的各个部分,通过运行或执行存储在存储器120内的指令、程序、代码集或指令集,以及调用存储在存储器120内的数据,执行移动终端100的各种功能和处理数据。可选地,处理器110可以采用数字信号处理(Digital Signal Processing,DSP)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、可编程逻辑阵列(Programmable Logic Array,PLA)中的至少一种硬件形式来实现。处理器110可集成中央处理器(Central Processing Unit,CPU)、图像处理器(Graphics Processing Unit,GPU)和调制解调器等中的一种或几种的组合。其中,CPU主要处理操作系统、用户界面和应用程序等;GPU用于负责显示内容的渲染和绘制;调制解调器用于处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器110中,单独通过一块通信芯片进行实现。
存储器120可以包括随机存储器(Random Access Memory,RAM),也可以包括只读存储器(Read-Only Memory)。存储器120可用于存储指令、程序、代码、代码集或指令集。存储器120可包括存储程序区和存储数据区,其中,存储程序区可存储用于实现操作系统的指令、用于实现至少一个功能的指令(比如触控功能、声音播放功能、图像播放功能等)、用于实现下述各个方法实施例的指令等。存储数据区还可以存储终端100在使用中所创建的数据(比如电话本、音视频数据、聊天记录数据)等。
摄像头130用于采集移动终端所处环境的环境图像。摄像头130可以为彩色摄像头,也可以为红外摄像头,具体类型在本申请实施例中并不作为限定。
请参考图11,其示出了本申请实施例提供的一种计算机可读存储介质的结构框图。该计算机可读介质800中存储有程序代码,所述程序代码可被处理器调用执行上述方法实施例中所描述的方法。
计算机可读存储介质800可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。可选地,计算机可读存储介质800包括非易失性计算机可读介质(non-transitory computer-readable storage medium)。计算机可读存储介质800具有执行上述方法中的任何方法步骤的程序代码810的存储空间。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。程序代码810可以例如以适当形式进行压缩。
最后应说明的是:以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员当理解:其依 然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不驱使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。
Claims (20)
- 一种安全防护方法,其特征在于,应用于移动终端的操作系统,所述移动终端包括摄像头,所述方法包括:当检测到所述移动终端运行设定应用,并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像;如果所述环境图像中包括人脸图像,则对所述人脸图像进行人脸识别,获得识别结果;当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,对所述设定界面进行预设的安全防护处理。
- 根据权利要求1所述的方法,其特征在于,所述当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,对所述设定界面进行预设的安全防护处理,包括:当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,确定所述环境图像中是否还包括注册用户对应的人脸图像;如果所述环境图像中不包括所述注册用户对应的人脸图像,对所述设定界面进行预设的安全防护处理。
- 根据权利要求2所述的方法,其特征在于,所述如果所述环境图像中不包括所述注册用户对应的人脸图像,对所述设定界面进行预设的安全防护处理,包括:如果所述环境图像中不包括所述注册用户对应的人脸图像,判断当前时间之前的预设时长内是否获取到目标环境图像,所述目标环境图像包括注册用户对应的人脸图像;如果不存在所述目标环境图像,则对所述设定界面进行预设的安全防护处理。
- 根据权利要求2所述的方法,其特征在于,在所述确定所述环境图像中是否还包括注册用户对应的人脸图像之后,所述方法还包括:如果所述环境图像中还包括所述注册用户对应的人脸图像,确定所述注册用户对应的人脸图像是否处于所述环境图像中的指定区域;如果所述注册用户对应的人脸图像未处于所述环境图像中的指定区域,则进行所述安全防护处理。
- 根据权利要求2所述的方法,其特征在于,在所述确定所述环境图像中是否还包括注册用户对应的人脸图像之后,所述方法还包括:如果所述其他人脸图像中包括注册用户对应的人脸图像,确定所述注册用户对应的人脸图像所占所述环境图像的占比;如果所述占比小于设定占比,则进行所述安全防护处理。
- 根据权利要求4或5所述的方法,其特征在于,在所述进行所述安全防护处理之前,所述方法还包括:显示提示信息,所述提示信息用于提示用户输入验证信息;接收输入的验证信息;如果所述验证信息与设定验证信息不匹配时,进行所述安全防护处理。
- 根据权利要求2所述的方法,其特征在于,在所述确定所述环境图像中是否还包括注册用户对应的人脸图像之后,所述方法还包括:如果所述环境图像中还包括所述注册用户对应的人脸图像,不对所述设定界面进行预设的安全防护处理。
- 根据权利要求1-7任一项所述的方法,其特征在于,所述对所述设定界面进行预 设的安全防护处理,包括:根据与所述设定界面对应的安全防护策略,对所述设定界面进行预设的安全防护处理。
- 根据权利要求8所述的方法,其特征在于,所述设定界面包括第一类型的界面以及第二类型的界面,所述第一类型的界面对应的第一安全防护级别小于所述第二类型的界面的第二安全防护级别,所述根据与所述设定界面对应的安全防护策略,对所述设定界面进行预设的安全防护处理,包括:当所述设定界面为所述第一类型的界面时,根据所述第一安全防护级别对应的安全防护策略,对所述设定界面进行防偷窥处理;当所述设定界面为所述第二类型的界面时,根据所述第二安全防护级别对应的安全防护策略,关闭所述设定应用。
- 根据权利要求9所述的方法,其特征在于,在所述关闭所述设定应用之后,所述方法还包括:继续通过所述摄像头采集环境图像;如果所述摄像头继续采集的环境图像包括非注册用户对应的人脸图像,则输出用于提示的报警声;将对所述设定应用的操作行为进行记录;获取当前的定位位置,并将所述操作行为以及所述定位位置发送至指定终端。
- 根据权利要求9所述的方法,其特征在于,所述对所述设定界面进行防偷窥处理,包括:将所述设定界面切换为具有提示作用的目标界面、将所述设定界面中目标区域的内容进行替换、或者降低所述设定界面的亮度至设定亮度。
- 根据权利要求1-11任一项所述的方法,其特征在于,所述通过所述摄像头采集环境图像,包括:按照设定间隔时长,通过所述摄像头采集环境图像。
- 根据权利要求12所述的方法,其特征在于,在所述按照设定间隔时长,通过所述摄像头采集环境图像之前,所述方法还包括:显示第一配置界面,所述第一配置界面包括第一控件,所述第一控件用于配置所述设定间隔时长;根据检测到的对所述第一控件的操作,配置所述设定间隔时长。
- 根据权利要求12或13所述的方法,其特征在于,所述方法还包括:检测所述移动终端的处理器的占用率;如果所述占用率大于设定占用率时,则增大所述设定间隔时长。
- 根据权利要求12-14任一项所述的方法,其特征在于,所述移动终端还包括电池,所述方法还包括:检测所述电池的剩余电量;如果所述剩余电量低于设定电量时,则增大所述设定间隔时长。
- 根据权利要求1-15任一项所述的方法,其特征在于,在所述当检测到所述移动终端运行设定应用并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像之前,所述方法还包括:检测所述移动终端当前所处的环境信息;如果所述环境信息满足设定环境条件时,则执行所述当检测到所述移动终端运行设定应用并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像。
- 根据权利要求16所述的方法,其特征在于,所述环境信息包括所述移动终端的定位信息;所述环境信息满足设定环境条件,包括:所述定位信息不为设定定位信息。
- 一种安全防护装置,其特征在于,应用于移动终端的操作系统,所述移动终端包括摄像头,所述装置包括:图像获取模块、人脸识别模块以及防护处理模块,其中,所述图像获取模块用于当检测到所述移动终端运行设定应用,并显示所述设定应用的设定界面时,通过所述摄像头采集环境图像;所述人脸识别模块用于如果所述环境图像中包括人脸图像,则对所述人脸图像进行人脸识别,获得识别结果;所述防护处理模块用于当所述识别结果表征所述环境图像中包括非注册用户对应的人脸图像时,对所述设定界面进行预设的安全防护处理。
- 一种移动终端,其特征在于,包括:一个或多个处理器;存储器;一个或多个应用程序,其中所述一个或多个应用程序被存储在所述存储器中并被配置为由所述一个或多个处理器执行,所述一个或多个程序配置用于执行如权利要求1-17任一项所述的方法。
- 一种计算机可读取存储介质,其特征在于,所述计算机可读取存储介质中存储有程序代码,所述程序代码可被处理器调用执行如权利要求1-17任一项所述的方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/117609 WO2021092769A1 (zh) | 2019-11-12 | 2019-11-12 | 安全防护方法、装置、移动终端及存储介质 |
CN201980100001.4A CN114341843A (zh) | 2019-11-12 | 2019-11-12 | 安全防护方法、装置、移动终端及存储介质 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/117609 WO2021092769A1 (zh) | 2019-11-12 | 2019-11-12 | 安全防护方法、装置、移动终端及存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021092769A1 true WO2021092769A1 (zh) | 2021-05-20 |
Family
ID=75911662
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/117609 WO2021092769A1 (zh) | 2019-11-12 | 2019-11-12 | 安全防护方法、装置、移动终端及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN114341843A (zh) |
WO (1) | WO2021092769A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116049868A (zh) * | 2022-07-26 | 2023-05-02 | 荣耀终端有限公司 | 隐私保护方法、设备及存储介质 |
CN116366763A (zh) * | 2023-02-28 | 2023-06-30 | 广东艾捷莫电子工业有限公司 | 隐私保护系统、方法及应用 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104036195A (zh) * | 2013-03-07 | 2014-09-10 | 联想(北京)有限公司 | 信息处理方法及装置 |
CN105260658A (zh) * | 2015-09-17 | 2016-01-20 | 广东欧珀移动通信有限公司 | 隐私界面的设置方法和系统 |
CN105956431A (zh) * | 2016-04-25 | 2016-09-21 | 维沃移动通信有限公司 | 一种应用保护处理方法和移动终端 |
CN106648760A (zh) * | 2016-11-30 | 2017-05-10 | 捷开通讯(深圳)有限公司 | 终端及其基于人脸识别清理后台应用程序的方法 |
CN106850667A (zh) * | 2017-03-03 | 2017-06-13 | 杭州智贝信息科技有限公司 | 一种持续认证安全防护系统及其方法 |
CN107609368A (zh) * | 2017-08-09 | 2018-01-19 | 百度在线网络技术(北京)有限公司 | 应用程序的安全防护方法、装置、设备和计算机存储介质 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105205371B (zh) * | 2015-08-26 | 2019-01-15 | Oppo广东移动通信有限公司 | 移动终端的锁定方法及装置 |
CN106960147A (zh) * | 2017-04-11 | 2017-07-18 | 广东小天才科技有限公司 | 一种隐私信息保护方法及装置、用户设备 |
CN107657159A (zh) * | 2017-08-31 | 2018-02-02 | 珠海市魅族科技有限公司 | 一种隐私保护方法及装置、终端和可读存储介质 |
CN107563168A (zh) * | 2017-09-05 | 2018-01-09 | 广东欧珀移动通信有限公司 | 移动终端的解锁方法、装置及移动终端 |
-
2019
- 2019-11-12 CN CN201980100001.4A patent/CN114341843A/zh active Pending
- 2019-11-12 WO PCT/CN2019/117609 patent/WO2021092769A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104036195A (zh) * | 2013-03-07 | 2014-09-10 | 联想(北京)有限公司 | 信息处理方法及装置 |
CN105260658A (zh) * | 2015-09-17 | 2016-01-20 | 广东欧珀移动通信有限公司 | 隐私界面的设置方法和系统 |
CN105956431A (zh) * | 2016-04-25 | 2016-09-21 | 维沃移动通信有限公司 | 一种应用保护处理方法和移动终端 |
CN106648760A (zh) * | 2016-11-30 | 2017-05-10 | 捷开通讯(深圳)有限公司 | 终端及其基于人脸识别清理后台应用程序的方法 |
CN106850667A (zh) * | 2017-03-03 | 2017-06-13 | 杭州智贝信息科技有限公司 | 一种持续认证安全防护系统及其方法 |
CN107609368A (zh) * | 2017-08-09 | 2018-01-19 | 百度在线网络技术(北京)有限公司 | 应用程序的安全防护方法、装置、设备和计算机存储介质 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116049868A (zh) * | 2022-07-26 | 2023-05-02 | 荣耀终端有限公司 | 隐私保护方法、设备及存储介质 |
CN116049868B (zh) * | 2022-07-26 | 2023-12-08 | 荣耀终端有限公司 | 隐私保护方法、设备及存储介质 |
CN116366763A (zh) * | 2023-02-28 | 2023-06-30 | 广东艾捷莫电子工业有限公司 | 隐私保护系统、方法及应用 |
CN116366763B (zh) * | 2023-02-28 | 2024-03-26 | 广东艾捷莫电子工业有限公司 | 隐私保护装置及方法 |
Also Published As
Publication number | Publication date |
---|---|
CN114341843A (zh) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11604891B2 (en) | Displaying sensitive content based on whether others are around user | |
EP3428819A1 (en) | Mobile security countermeasures | |
CN105117663B (zh) | 一种应用的加密对象显示方法及装置 | |
CN104765552B (zh) | 权限管理方法和装置 | |
CN104700010B (zh) | 个人信息保护方法及保护装置 | |
CN104850827B (zh) | 指纹识别方法及装置 | |
WO2017032029A1 (zh) | 一种应用程序加密方法及用户终端 | |
CN108197450B (zh) | 人脸识别方法、人脸识别装置、存储介质及电子设备 | |
CN106681717B (zh) | 一种终端应用程序管理方法、装置及电子设备 | |
CN105447422A (zh) | 一种保护用户隐私的方法及终端 | |
CN112115444A (zh) | 一种解锁方法及电子设备 | |
WO2021017843A1 (zh) | 一种屏幕亮度调节方法及装置 | |
CN107609368A (zh) | 应用程序的安全防护方法、装置、设备和计算机存储介质 | |
WO2021092769A1 (zh) | 安全防护方法、装置、移动终端及存储介质 | |
CN107766712A (zh) | 消息提示方法、终端及计算机可读介质 | |
CN109814964B (zh) | 一种界面展示方法、终端设备及计算机可读存储介质 | |
CN113923461A (zh) | 一种录屏方法和录屏系统 | |
US11681419B2 (en) | Method for disguising a computer system's login interface | |
CN106170794A (zh) | 一种信息处理方法和移动终端 | |
CN107391989A (zh) | 消息处理方法、装置、终端及存储介质 | |
TW201833759A (zh) | 聯絡人資訊的顯示方法和裝置以及資訊的顯示方法和裝置 | |
CN111953842A (zh) | 电子设备、安全保护方法及装置 | |
CN115086478A (zh) | 一种终端信息保密方法、装置、电子设备及存储介质 | |
CN116049867A (zh) | 反诈方法、图形界面和相关装置 | |
CN107392035B (zh) | 保护数据安全的方法、移动终端及计算机可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19952610 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19952610 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19952610 Country of ref document: EP Kind code of ref document: A1 |