Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A device and method for identifying picture browsing operation authority

A technology of operating permissions and pictures, applied in the field of communication, can solve problems such as privacy leakage, and achieve the effect of overcoming security protection

Active Publication Date: 2020-01-07
北京蓝色银河终端科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the increasingly powerful functions of smart devices, pictures with high picture quality can already be taken through smart devices. Whether users are working, traveling or shopping, they like to take various pictures as souvenirs. When gathering or chatting together, it is often used to open commemorative or interesting pictures through smart devices, and pass the smart devices to others to view the opened pictures. Users who get other people’s smart devices are often used to reading the current After taking the picture, perform related operations such as sliding to view other pictures in the smart device. At this time, the smart device may store pictures with personal privacy information, and because the smart device is controlled by the current user, the pictures with private information May be seen by others, leading to privacy leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device and method for identifying picture browsing operation authority
  • A device and method for identifying picture browsing operation authority
  • A device and method for identifying picture browsing operation authority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0047] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0048] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0049] The invention includes a device for authenticating the operation authority of picture browsing.

[0050]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a device and a method for identifying picture browsing operation permissions. The device and the method are applied to intelligent equipment. The intelligent equipment comprises an operation interface and an operation receiving module, wherein the operation receiving module provides an operation interface, is used for receiving operations of a user and comprises a picture display module and an encryption module; the encryption module is used for providing the user for encryption operation and outputting a discarding operation instruction to the operation receiving module when the user does not perform decryption operation, and is used for providing the user for decryption operation and outputting an execution operation instruction to the operation receiving module according to the decryption operation of the user; the operation receiving module is used for discarding the picture browsing operation performed by the user on the operation interface according to the discarding operation instruction and executing receiving of the picture browsing operation performed by the user on the operation interface according to the execution operation instruction. By means of the device and the method, the defect of leakage of user privacy information caused by the lack of safety protection of browsed pictures in the prior art is overcome.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a device and method for authenticating picture browsing operation authority. Background technique [0002] With the increasingly powerful functions of smart devices, pictures with high picture quality can already be taken through smart devices. Whether users are working, traveling or shopping, they like to take various pictures as souvenirs. When gathering or chatting together, it is often used to open commemorative or interesting pictures through smart devices, and pass the smart devices to others to view the opened pictures. Users who get other people’s smart devices are often used to reading the current After taking the picture, perform related operations such as sliding to view other pictures in the smart device. At this time, the smart device may store pictures with personal privacy information, and because the smart device is controlled by the current user, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/62
CPCG06F21/32G06F21/6245G06F2221/2141
Inventor 胥鑫鑫
Owner 北京蓝色银河终端科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products