US20150009333A1 - Security device and display method thereof - Google Patents

Security device and display method thereof Download PDF

Info

Publication number
US20150009333A1
US20150009333A1 US14/378,615 US201314378615A US2015009333A1 US 20150009333 A1 US20150009333 A1 US 20150009333A1 US 201314378615 A US201314378615 A US 201314378615A US 2015009333 A1 US2015009333 A1 US 2015009333A1
Authority
US
United States
Prior art keywords
security device
combination
predetermined
current information
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/378,615
Inventor
Ping Cheng
Xiao Yang
Jia Yu
Linlin Gong
Jian Wang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Netqin Technology Co Ltd
Original Assignee
Beijing Netqin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Netqin Technology Co Ltd filed Critical Beijing Netqin Technology Co Ltd
Assigned to BEIJING NETQIN TECHNOLOGY CO., LTD. reassignment BEIJING NETQIN TECHNOLOGY CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHENG, Ping, GONG, LINLIN, WANG, JIAN, YANG, XIAO, YU, JIA
Publication of US20150009333A1 publication Critical patent/US20150009333A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/186Video door telephones
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Definitions

  • the present disclosure relates to a security device and display method thereof.
  • the object of the present disclosure is to provide a security device and a display method thereof for improving the existing encryptions, so as to meet the current requirement for information security.
  • the present disclosure provides a display method for a security device installed with a photographing module and a display module, the method comprising:
  • this specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof.
  • the password comprises either of text and pattern, or a combination thereof.
  • the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
  • the method further comprises:
  • the method further comprises: the security device transmits the current information to a predetermined address in a predetermined way.
  • the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
  • SMS Short Messaging Service
  • MMS Multimedia Messaging Service
  • the current information comprises any of time, location, and background, or any combination thereof.
  • the present disclosure further provides a security device comprising a photographing module and a display module, characterized in that the security device further comprises:
  • the specific image includes any of a predetermined color, luminance, and pattern, or any combination thereof.
  • the password comprises either of text and pattern, or a combination thereof.
  • the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
  • the security device further comprises:
  • the security device further comprises:
  • the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
  • SMS Short Messaging Service
  • MMS Multimedia Messaging Service
  • the current information comprises any of time, location, and background, or any combination thereof.
  • the present disclosure can improve security performance of a device by concealing its password input interface, and meet the current requirement for information security.
  • FIG. 1 is a display schematic diagram of a display module of a security device in accordance with an embodiment of the present disclosure
  • FIG. 2 is a text password input interface displayed on a display module of a security device in accordance with an embodiment of the present disclosure
  • FIG. 3 is a pattern password input interface displayed on a display module of a security device in accordance with an embodiment of the present disclosure
  • FIG. 4 is a flow chart of a display method in accordance with an embodiment of the present disclosure.
  • FIG. 5 is a block diagram of a security device in accordance with an embodiment of the present disclosure.
  • FIG. 1 is a schematic diagram of an interface of a security device in accordance with an embodiment of the present disclosure.
  • the security device 100 comprises a photographing module (not shown) such as a camera and a display module 120 such as a display screen.
  • the security device 100 may be any device comprising, but not limited to, a mobile phone, a tablet computer, a desktop computer, or a notebook computer, or the like.
  • the objects represented by these icons comprise, but not limited to, an image, a video, an app, or an interface, etc.
  • the object it represents is an app.
  • a process of a method in accordance with an embodiment of the present disclosure is shown in FIG. 4 .
  • Step S 10 an image, which is being captured by the photographing module, is displayed on the display module 120 , while the photographing module is in the photo taking mode or video taking mode.
  • Step S 20 when the photographing module captures a specific image, a password input interface is displayed on the display module 120 .
  • This specific image may contain any of color, luminance, or pattern, which meets a predetermined condition, or any combination thereof.
  • Embodiments utilizing color, luminance, and pattern are described as follows, respectively.
  • the user sets a certain color value as the base color in advance, and sets positive/negative tolerances. In this way, a color represented by a color value within the range of the positive/negative tolerances is a trigger color.
  • the photographing module captures an image, it divides the image into n ⁇ n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module, and in the case where the number of pixels is less than the resolution of the photographing module, the color value of each unit is equal to the average of the color values of all actual pixels within this unit).
  • a ratio of the number of the pixel units which have color values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger color is met. In other words, the specific image is captured.
  • a set value for example, 80%, but not limited thereto, which may be set based on the actual needs
  • the user sets a certain luminance value as the base luminance in advance, and sets positive/negative tolerances.
  • a luminance represented by a luminance value within the range of the positive/negative tolerances is a specific luminance.
  • the photographing module captures an image, it divides the image into n ⁇ n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module, and in the case where the number of pixels is less than the resolution of the photographing module, the luminance value of each unit is equal to the average of the luminance values of all actual pixels within this unit).
  • a ratio of the number of the pixel units which have luminance values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger luminance is met. In other words, the specific image is captured.
  • a set value for example, 80%, but not limited thereto, which may be set based on the actual needs
  • the user draws a contour on the display module 120 as the trigger pattern, and the contour may not be closed.
  • the photographing module captures an image, it will detect an object in the image (when necessary, the detection may be performed at different focal lengths, and the detection may determine edge lines of the object based on a color contrast value, but not limited thereto), so as to compare the detected edge lines of the object with the trigger pattern. If matched, the trigger pattern is met. In other words, the specific image is captured.
  • the set password may be text or pattern, and therefore the password input interfaces are shown as FIG. 2 and FIG. 3 , in which FIG. 2 is a text input interface and FIG. 3 is a pattern input interface. In FIG. 3 , a pattern may be formed by connecting dots.
  • the password input interface may also be a combination of the both. It should be appreciated that the above password setting and input methods are merely examples, and any appropriate method for password setting and inputting may be used.
  • Step S 30 it is judged whether a password is matched.
  • Step S 40 if the password is matched, then an object expected by the user (i.e., an app) is displayed on the display module 120 .
  • the display module 120 prompts the user that no input is possible.
  • the current information is recorded and transmitted to a predetermined address in a predetermined way.
  • the current information comprises, but not limited to, time, location (for example, acquired via a GPS device), background (for example, acquired via the photographing module), etc.
  • the time is Apr. 16, 2012, Monday, and the location is 39° 54′ north latitude and 116° 23′ east longitude.
  • the predetermined way comprises, but not limited to, any of a phone call, a voice message, an SMS message, an MMS message, an email, an instant messenger, and a social network, or any combination thereof.
  • the predetermined address may be preset by the user or chosen from a location such as an address book. Of course, a warning may be issued in any other existing way.
  • the user may keep trying until the predetermined number of failures is reached.
  • the user may record the number of failures.
  • the present disclosure further provides a security device 200 . As shown in FIG. 5 , it comprises a photographing module 201 , a display module 202 , a determining module 210 , a judging module 220 , a recording module 230 , and a transmission module 240 .
  • the photographing module 201 is a module that is capable of capturing an image, and it comprises but not limited to a camera.
  • the photographing module 201 is configured to capture an image in a photo taking mode or a video taking mode.
  • the display module 202 is a module that is capable of displaying an icon, an image, an app, an interface, or the like. It comprises, but not limited to, a display screen or a touch screen, or the like.
  • the determining module 210 is configured to have the display module 202 present a password input interface when it is determined that a specific image is captured by the photographing module 201 .
  • This specific image comprises any of color, luminance, or pattern, which meets a predetermined condition, or any combination thereof.
  • Embodiments utilizing color, luminance, and pattern are described as follows, respectively:
  • the user sets a certain color value as the base color in advance, and sets positive/negative tolerances. In this way, a color represented by a color value within the range of the positive/negative tolerances is a trigger color.
  • the photographing module 201 captures an image, it divides the image into n ⁇ n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module 201 , and in the case where the number of pixels is less than the resolution of the photographing module 201 , the color value of each unit is equal to the average of the color values of all actual pixels within this unit).
  • a ratio of the number of the pixel units which have color values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger color is met. In other words, the specific image is captured.
  • a set value for example, 80%, but not limited thereto, which may be set based on the actual needs
  • the user sets a certain luminance value as the base luminance in advance, and sets positive/negative tolerances.
  • a luminance represented by a luminance value within the range of the positive/negative tolerances is a specific luminance.
  • the photographing module 201 captures an image, it divides the image into n x n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module 201 , and in the case where the number of pixels is less than the resolution of the photographing module 201 , the luminance value of each unit is equal to the average of the luminance values of all actual pixels within this unit).
  • a ratio of the number of the pixel units which have luminance values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger luminance is met. In other words, the specific image is captured.
  • a set value for example, 80%, but not limited thereto, which may be set based on the actual needs
  • the user draws a contour on the display module 202 as the trigger pattern, and the contour may not be closed.
  • the photographing module 201 captures an image, it will detect an object in the image (when necessary, the detection may be performed at different focal lengths, and the detection may determine edge lines of the object based on a color contrast value, but not limited thereto), so as to compare the detected edge lines of the object with the trigger pattern. If matched, then the trigger pattern is met. In other words, the specific image is captured.
  • the set password may be text or pattern, and therefore the password input interfaces are shown as FIG. 2 and FIG. 3 , in which FIG. 2 is a text input interface and FIG. 3 is a pattern input interface. In FIG. 3 , a pattern may be formed by connecting dots.
  • the password input interface may also be a combination of the both. It should be appreciated that the above password setting and input methods are merely examples and any appropriate method for password setting and inputting may be used.
  • the judging module 220 is configured to judge whether a password input by the user is matched, and if so, to have the display module 202 display an object expected by the user. If not, the user may keep trying within the predetermined number of failures (for example, 10 times). When the predetermined number of failures is reached, the judging module 220 is configured to have the display module 202 display information to prompt the user that no input is possible. At the same time, the judging module 220 is configured to have the recording module 230 record the current information comprising, but not limited to, time, location (for example, acquired via a GPS device), background (for example, acquired via the photographing module), etc. For example, the time is Apr.
  • the transmission module 240 transmits the current information to a predetermined address in a predetermined way.
  • the predetermined way comprises, but not limited to, any of a phone call, a voice message, an SMS message, an MMS message, an email, an instant messenger, and a social network, or any combination thereof.
  • the predetermined address may be preset by the user or chosen from a location such as an address book. Of course, a warning may be issued in any other existing way.

Abstract

Provided is a display method for a security device installed with a photographing module and a display module. The method comprises: A. when the security device captures a specific image via the photographing module, the security device displays a password input interface via the display module; and B. when password matching is successful, the security device displays a predetermined object via the display module. The present invention improves security performance of a device by concealing the password input interface, and satisfies the current requirement for information security.

Description

    CROSS-REFERENCE TO RELATED APPLICATION(S)
  • This application is a U.S. National Phase Application of International Application No. PCT/CN2013/072600, filed on Mar. 14, 2013, entitled “SECURITY DEVICE AND DISPLAY METHOD THEREOF,” which claims priority to Chinese Application No. 201210127980.2, filed on Apr. 27, 2012, both of which are incorporated herein by reference in their entirety.
  • TECHNICAL FIELD
  • The present disclosure relates to a security device and display method thereof.
  • BACKGROUND
  • With development of the information technology, information security is becoming increasingly important. However, the existing information security still relies on conventional methods to protect, for example, by encryptions using passwords or patterns and the like. This cannot satisfy the current requirement for information security.
  • SUMMARY
  • In view of this, the object of the present disclosure is to provide a security device and a display method thereof for improving the existing encryptions, so as to meet the current requirement for information security.
  • Therefore, the present disclosure provides a display method for a security device installed with a photographing module and a display module, the method comprising:
      • A. when the security device captures a specific image via the photographing module, the security device displays a password input interface via the display module; and
      • B. when password matching is successful, the security device displays a predetermined object via the display module.
  • According to the above method, wherein this specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof.
  • According to the above method, wherein the password comprises either of text and pattern, or a combination thereof.
  • According to the above method, wherein the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
  • According to the above method, wherein the method further comprises:
      • C. when the password matching is failed, the security device records the number of failures, and when the number exceeds a predetermined value, the security device records the current information of the security device.
  • According to the above method, wherein the method further comprises: the security device transmits the current information to a predetermined address in a predetermined way.
  • According to the above method, wherein the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
  • According to the above method, wherein the current information comprises any of time, location, and background, or any combination thereof.
  • The present disclosure further provides a security device comprising a photographing module and a display module, characterized in that the security device further comprises:
      • a determining module configured to determine whether an image captured via the photographing module is a specific image, and if so, to have the display module display a password input interface; and
      • a judging module configured to judge whether an input password is matched, and if so, to have the display module display a predetermined object.
  • According to the above security device, wherein the specific image includes any of a predetermined color, luminance, and pattern, or any combination thereof.
  • According to the above security device, wherein the password comprises either of text and pattern, or a combination thereof.
  • According to the above security device, wherein the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
  • According to the above security device, wherein the security device further comprises:
      • a recording module configured to record the number of failures when the password matching is failed, and to record the current information of the security device when the number exceeds a predetermined value.
  • According to the above security device, wherein the security device further comprises:
      • a transmission module configured to transmit the current information to a predetermined address in a predetermined way.
  • According to the above security device, wherein the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
  • According to the above security device, wherein the current information comprises any of time, location, and background, or any combination thereof.
  • In summary, the present disclosure can improve security performance of a device by concealing its password input interface, and meet the current requirement for information security.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • To illustrate embodiments of the present disclosure or solutions of prior art in a clearer manner, brief introductions will be given below with respect to the figures to be used in the descriptions of the embodiments or prior art. It is obvious that the figures in the following descriptions are merely some embodiments of the present disclosure. For one ordinarily skilled in the art, other figures may be derived, without any inventive efforts, from these figures in which:
  • FIG. 1 is a display schematic diagram of a display module of a security device in accordance with an embodiment of the present disclosure;
  • FIG. 2 is a text password input interface displayed on a display module of a security device in accordance with an embodiment of the present disclosure;
  • FIG. 3 is a pattern password input interface displayed on a display module of a security device in accordance with an embodiment of the present disclosure;
  • FIG. 4 is a flow chart of a display method in accordance with an embodiment of the present disclosure; and
  • FIG. 5 is a block diagram of a security device in accordance with an embodiment of the present disclosure.
  • DETAILED DESCRIPTION
  • To present the objects, solutions, and advantages of the embodiments of the present disclosure in a clearer manner, detailed descriptions of the embodiments of the present disclosure will be further given below in conjunction with the figures. Here, the illustrative embodiments of the present disclosure and the description thereof are given for the purpose of illustration only, not for the purpose of limitation.
  • FIG. 1 is a schematic diagram of an interface of a security device in accordance with an embodiment of the present disclosure. The security device 100 comprises a photographing module (not shown) such as a camera and a display module 120 such as a display screen. The security device 100 may be any device comprising, but not limited to, a mobile phone, a tablet computer, a desktop computer, or a notebook computer, or the like. There are several icons, such as, 130, 140, 150, and 160, on the display module 120. The objects represented by these icons comprise, but not limited to, an image, a video, an app, or an interface, etc.
  • Taking the icon 130 as an example, the object it represents is an app. When a user clicks this icon 130 via a mouse, a keyboard, a touch screen, etc., a process of a method in accordance with an embodiment of the present disclosure is shown in FIG. 4.
  • At Step S10, an image, which is being captured by the photographing module, is displayed on the display module 120, while the photographing module is in the photo taking mode or video taking mode.
  • At Step S20, when the photographing module captures a specific image, a password input interface is displayed on the display module 120. This specific image may contain any of color, luminance, or pattern, which meets a predetermined condition, or any combination thereof.
  • Embodiments utilizing color, luminance, and pattern are described as follows, respectively.
  • 1. Embodiment Utilizing Color
  • The user sets a certain color value as the base color in advance, and sets positive/negative tolerances. In this way, a color represented by a color value within the range of the positive/negative tolerances is a trigger color. When the photographing module captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module, and in the case where the number of pixels is less than the resolution of the photographing module, the color value of each unit is equal to the average of the color values of all actual pixels within this unit). If a ratio of the number of the pixel units which have color values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger color is met. In other words, the specific image is captured.
  • 2. Embodiment Utilizing Luminance
  • The user sets a certain luminance value as the base luminance in advance, and sets positive/negative tolerances. In this way, a luminance represented by a luminance value within the range of the positive/negative tolerances is a specific luminance. When the photographing module captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module, and in the case where the number of pixels is less than the resolution of the photographing module, the luminance value of each unit is equal to the average of the luminance values of all actual pixels within this unit). If a ratio of the number of the pixel units which have luminance values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger luminance is met. In other words, the specific image is captured.
  • 3. Embodiment Utilizing Pattern
  • The user draws a contour on the display module 120 as the trigger pattern, and the contour may not be closed. When the photographing module captures an image, it will detect an object in the image (when necessary, the detection may be performed at different focal lengths, and the detection may determine edge lines of the object based on a color contrast value, but not limited thereto), so as to compare the detected edge lines of the object with the trigger pattern. If matched, the trigger pattern is met. In other words, the specific image is captured.
  • Of course, the above three embodiments are given for the purpose of illustration only. Any method that can distinguish color, luminance, or pattern of an image may be used.
  • Furthermore, the set password may be text or pattern, and therefore the password input interfaces are shown as FIG. 2 and FIG. 3, in which FIG. 2 is a text input interface and FIG. 3 is a pattern input interface. In FIG. 3, a pattern may be formed by connecting dots. Of course, the password input interface may also be a combination of the both. It should be appreciated that the above password setting and input methods are merely examples, and any appropriate method for password setting and inputting may be used.
  • At Step S30, it is judged whether a password is matched.
  • At Step S40, if the password is matched, then an object expected by the user (i.e., an app) is displayed on the display module 120.
  • At Step S50, if the password is not matched, when a predetermined number of failures is reached, the display module 120 prompts the user that no input is possible. The current information is recorded and transmitted to a predetermined address in a predetermined way. The current information comprises, but not limited to, time, location (for example, acquired via a GPS device), background (for example, acquired via the photographing module), etc. For example, the time is Apr. 16, 2012, Monday, and the location is 39° 54′ north latitude and 116° 23′ east longitude. The predetermined way comprises, but not limited to, any of a phone call, a voice message, an SMS message, an MMS message, an email, an instant messenger, and a social network, or any combination thereof. The predetermined address may be preset by the user or chosen from a location such as an address book. Of course, a warning may be issued in any other existing way.
  • In this embodiment, within the predetermined number of failures (for example, 10 times), the user may keep trying until the predetermined number of failures is reached. The user may record the number of failures.
  • The present disclosure further provides a security device 200. As shown in FIG. 5, it comprises a photographing module 201, a display module 202, a determining module 210, a judging module 220, a recording module 230, and a transmission module 240.
  • The photographing module 201 is a module that is capable of capturing an image, and it comprises but not limited to a camera. The photographing module 201 is configured to capture an image in a photo taking mode or a video taking mode.
  • The display module 202 is a module that is capable of displaying an icon, an image, an app, an interface, or the like. It comprises, but not limited to, a display screen or a touch screen, or the like.
  • The determining module 210 is configured to have the display module 202 present a password input interface when it is determined that a specific image is captured by the photographing module 201. This specific image comprises any of color, luminance, or pattern, which meets a predetermined condition, or any combination thereof.
  • Embodiments utilizing color, luminance, and pattern are described as follows, respectively:
  • 1. Embodiment Utilizing Color
  • The user sets a certain color value as the base color in advance, and sets positive/negative tolerances. In this way, a color represented by a color value within the range of the positive/negative tolerances is a trigger color. When the photographing module 201 captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module 201, and in the case where the number of pixels is less than the resolution of the photographing module 201, the color value of each unit is equal to the average of the color values of all actual pixels within this unit). If a ratio of the number of the pixel units which have color values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger color is met. In other words, the specific image is captured.
  • 2. Embodiment Utilizing Luminance
  • The user sets a certain luminance value as the base luminance in advance, and sets positive/negative tolerances. In this way, a luminance represented by a luminance value within the range of the positive/negative tolerances is a specific luminance. When the photographing module 201 captures an image, it divides the image into n x n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module 201, and in the case where the number of pixels is less than the resolution of the photographing module 201, the luminance value of each unit is equal to the average of the luminance values of all actual pixels within this unit). If a ratio of the number of the pixel units which have luminance values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger luminance is met. In other words, the specific image is captured.
  • 3. Embodiment Utilizing Pattern
  • The user draws a contour on the display module 202 as the trigger pattern, and the contour may not be closed. When the photographing module 201 captures an image, it will detect an object in the image (when necessary, the detection may be performed at different focal lengths, and the detection may determine edge lines of the object based on a color contrast value, but not limited thereto), so as to compare the detected edge lines of the object with the trigger pattern. If matched, then the trigger pattern is met. In other words, the specific image is captured.
  • Of course, the above three embodiments are given for the purpose of illustration only. Any method that can distinguish color, luminance, or pattern of an image may be used.
  • Furthermore, the set password may be text or pattern, and therefore the password input interfaces are shown as FIG. 2 and FIG. 3, in which FIG. 2 is a text input interface and FIG. 3 is a pattern input interface. In FIG. 3, a pattern may be formed by connecting dots. Of course, the password input interface may also be a combination of the both. It should be appreciated that the above password setting and input methods are merely examples and any appropriate method for password setting and inputting may be used.
  • The judging module 220 is configured to judge whether a password input by the user is matched, and if so, to have the display module 202 display an object expected by the user. If not, the user may keep trying within the predetermined number of failures (for example, 10 times). When the predetermined number of failures is reached, the judging module 220 is configured to have the display module 202 display information to prompt the user that no input is possible. At the same time, the judging module 220 is configured to have the recording module 230 record the current information comprising, but not limited to, time, location (for example, acquired via a GPS device), background (for example, acquired via the photographing module), etc. For example, the time is Apr. 16, 2012, Monday, and the location is 39° 54′ north latitude and 116° 23′ east longitude. At the same time, the transmission module 240 transmits the current information to a predetermined address in a predetermined way. The predetermined way comprises, but not limited to, any of a phone call, a voice message, an SMS message, an MMS message, an email, an instant messenger, and a social network, or any combination thereof. The predetermined address may be preset by the user or chosen from a location such as an address book. Of course, a warning may be issued in any other existing way.
  • The objects, solutions, and advantages of the present disclosure are further detailed by the above specific embodiments. It should be appreciated that the above descriptions are merely specific embodiments of the present disclosure and not for the purpose of limiting the scope of the present disclosure. Any modification, equivalent substitution, improvement, or the like made within the spirit and principle of the present disclosure should be embraced by the scope of the present disclosure.

Claims (20)

1. A display method for a security device installed with a photographing module and a display module, characterized in that the method comprises:
A. displaying, by the security device, a password input interface via the display module when the security device captures a specific image via the photographing module; and
B. displaying, by the security device, a predetermined object via the display module when password matching is successful.
2. The method of claim 1, characterized in that the specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof
3. The method of claim 1, characterized in that the password comprises either of text and pattern, or a combination thereof.
4. The method of claim 1, characterized in that the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
5. The method of claim 1, characterized in that the method further comprises:
C. recording, by the security device, the number of failures when the password matching is failed, and recording, by the security device, the current information of the security device when the number exceeds a predetermined value.
6. The method of claim 5, characterized in that the method further comprises: transmitting, by the security device, the current information to a predetermined address in a predetermined way.
7. The method of claim 6, characterized in that the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
8. The method of any of claim 5, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
9. A security device comprising a photographing module and a display module, characterized in that the security device further comprises:
a determining module configured to determine whether an image captured via the photographing module is a specific image, and if so, to have the display module display a password input interface; and
a judging module configured to judge whether an input password is matched, and if so, to have the display module display a predetermined object.
10. The security device of claim 9, characterized in that the specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof.
11. The security device of claim 9, characterized in that the password comprises either of text and pattern, or a combination thereof.
12. The security device of claim 9, characterized in that the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
13. The security device of claim 9, characterized in that the security device further comprises:
a recording module configured to record the number of failures when the password matching is failed, and to record the current information of the security device when the number exceeds a predetermined value.
14. The security device of claim 13, characterized in that the security device further comprises:
a transmission module configured to transmit the current information to a predetermined address in a predetermined way.
15. The security device of claim 14, characterized in that the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
16. The security device of claim 15, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
17. The method of claim 6, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
18. The method of claim 7, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
19. The security device of claim 14, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
20. The security device of claim 15, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
US14/378,615 2012-04-27 2013-03-14 Security device and display method thereof Abandoned US20150009333A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2012101279802A CN103425912A (en) 2012-04-27 2012-04-27 Safety device and display method thereof
CN201210127980.2 2012-04-27
PCT/CN2013/072600 WO2013159609A1 (en) 2012-04-27 2013-03-14 Security device and display method thereof

Publications (1)

Publication Number Publication Date
US20150009333A1 true US20150009333A1 (en) 2015-01-08

Family

ID=49478579

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/527,023 Expired - Fee Related US8966615B2 (en) 2012-04-27 2012-06-19 Security device and display method thereof
US14/378,615 Abandoned US20150009333A1 (en) 2012-04-27 2013-03-14 Security device and display method thereof

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/527,023 Expired - Fee Related US8966615B2 (en) 2012-04-27 2012-06-19 Security device and display method thereof

Country Status (3)

Country Link
US (2) US8966615B2 (en)
CN (1) CN103425912A (en)
WO (1) WO2013159609A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9280656B2 (en) * 2012-11-16 2016-03-08 University-Industry Foundation, Yonsei University Device and method for providing security channel interface
CN105096501B (en) * 2014-04-25 2019-02-12 北京奇虎科技有限公司 Intelligent terminal theft preventing method and intelligent terminal
CN105577633B (en) * 2015-06-27 2019-10-11 宇龙计算机通信科技(深圳)有限公司 A kind of verification method and terminal
KR20170006210A (en) * 2015-07-07 2017-01-17 한화테크윈 주식회사 Surveillance method
CN105760735B (en) * 2016-02-16 2019-04-23 Oppo广东移动通信有限公司 A kind of display methods and its device of mobile terminal encrypted content
US10019860B1 (en) 2017-07-25 2018-07-10 Amazon Technologies, Inc. Remote access authentication and authorization
US11080649B2 (en) * 2017-07-25 2021-08-03 Amazon Technologies, Inc. Remote access monitoring

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6023688A (en) * 1997-11-28 2000-02-08 Diebold, Incorporated Transaction apparatus and method that identifies an authorized user by appearance and voice
US20020035539A1 (en) * 2000-07-17 2002-03-21 O'connell Richard System and methods of validating an authorized user of a payment card and authorization of a payment card transaction
US7175076B1 (en) * 2004-07-07 2007-02-13 Diebold Self-Service Systems Division Of Diebold, Incorporated Cash dispensing automated banking machine user interface system and method
US20080209510A1 (en) * 2007-02-26 2008-08-28 Semiconductor Energy Laboratory Co., Ltd. Memory Device
US7494053B1 (en) * 2005-11-14 2009-02-24 Diebold Self-Service Systems Division Of Diebold, Incorporated Cash dispensing automated banking machine and method

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7280134B1 (en) * 1998-01-26 2007-10-09 Thales Avionics, Inc. Landscape camera system with electronic field of view switching
US6584466B1 (en) * 1999-04-07 2003-06-24 Critical Path, Inc. Internet document management system and methods
US20060206429A1 (en) * 2005-01-28 2006-09-14 Martinez Pamela J Secure identification apparatus, system and method in a portable electronic device for financial and other secure systems
CN101179386A (en) * 2007-11-20 2008-05-14 常志良 Network account anti-theft method
US20090324025A1 (en) * 2008-04-15 2009-12-31 Sony Ericsson Mobile Communicatoins AB Physical Access Control Using Dynamic Inputs from a Portable Communications Device
CN101604379A (en) * 2009-07-09 2009-12-16 交通银行股份有限公司 A kind of identity identifying method and device based on ATM
CN101958892B (en) * 2010-09-16 2013-02-20 汉王科技股份有限公司 Electronic data protection method, device and system based on face recognition
TW201216107A (en) * 2010-10-14 2012-04-16 Hon Hai Prec Ind Co Ltd Electronic device and method for obtaining information of an illegal user of the electronic device
CN102145683A (en) * 2011-03-11 2011-08-10 广东铁将军防盗设备有限公司 Video recording instrument of vehicle

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6023688A (en) * 1997-11-28 2000-02-08 Diebold, Incorporated Transaction apparatus and method that identifies an authorized user by appearance and voice
US20020035539A1 (en) * 2000-07-17 2002-03-21 O'connell Richard System and methods of validating an authorized user of a payment card and authorization of a payment card transaction
US7175076B1 (en) * 2004-07-07 2007-02-13 Diebold Self-Service Systems Division Of Diebold, Incorporated Cash dispensing automated banking machine user interface system and method
US7494053B1 (en) * 2005-11-14 2009-02-24 Diebold Self-Service Systems Division Of Diebold, Incorporated Cash dispensing automated banking machine and method
US20080209510A1 (en) * 2007-02-26 2008-08-28 Semiconductor Energy Laboratory Co., Ltd. Memory Device

Also Published As

Publication number Publication date
CN103425912A (en) 2013-12-04
US8966615B2 (en) 2015-02-24
WO2013159609A1 (en) 2013-10-31
US20130291095A1 (en) 2013-10-31

Similar Documents

Publication Publication Date Title
US20150009333A1 (en) Security device and display method thereof
WO2020248955A1 (en) Content sharing method and electronic device
US11023572B2 (en) Augmented reality object providing method and server using image authentication
RU2643473C2 (en) Method and tools for fingerprinting identification
TWI684886B (en) Method and device for generating security problems and identity verification
US20200150850A1 (en) Method and device for displaying an application interface
US9251404B2 (en) Name bubble handling
US9715751B2 (en) Zooming to faces depicted in images
US20150085146A1 (en) Method and system for storing contact information in an image using a mobile device
US20150058788A1 (en) Information processing method and electronic device
CN105721514A (en) User device, cloud server and shared link identification method thereof
EP3022675B1 (en) Methods, apparatuses, and computer program products for hiding access to information in an image
CN106331328B (en) Information prompting method and device
US20090226101A1 (en) System, devices, method, computer program product
WO2019061185A1 (en) Method and terminal for digitally signing picture
US10880735B2 (en) Method for detecting the possible taking of screenshots
CN104394270B (en) The method and apparatus that auxiliary receives calls
KR100984307B1 (en) Digital picture frame capable of offering communication service and method thereof
US20180091463A1 (en) Collaboration conversation notification
CN110381064B (en) Verification method, verification device and computer-readable storage medium
WO2019022921A1 (en) Method and apparatus for cropping and displaying an image
US11176021B2 (en) Messaging systems with improved reliability
US20230252183A1 (en) Information processing apparatus, information processing method, and computer program
CN110300214B (en) Communication method and device
EP2966837B1 (en) Information processing device, information processing method and program

Legal Events

Date Code Title Description
AS Assignment

Owner name: BEIJING NETQIN TECHNOLOGY CO., LTD., CHINA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHENG, PING;YANG, XIAO;YU, JIA;AND OTHERS;REEL/FRAME:033532/0414

Effective date: 20140805

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION