The present disclosure relates to a security device and display method thereof.
With development of the information technology, information security is becoming increasingly important. However, the existing information security still relies on conventional methods to protect, for example, by encryptions using passwords or patterns and the like. This cannot satisfy the current requirement for information security.
In view of this, the object of the present disclosure is to provide a security device and a display method thereof for improving the existing encryptions, so as to meet the current requirement for information security.
Therefore, the present disclosure provides a display method for a security device installed with a photographing module and a display module, the method comprising:
According to the above method, wherein this specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof.
According to the above method, wherein the password comprises either of text and pattern, or a combination thereof.
According to the above method, wherein the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
According to the above method, wherein the method further comprises:
According to the above method, wherein the method further comprises: the security device transmits the current information to a predetermined address in a predetermined way.
According to the above method, wherein the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
According to the above method, wherein the current information comprises any of time, location, and background, or any combination thereof.
The present disclosure further provides a security device comprising a photographing module and a display module, characterized in that the security device further comprises:
According to the above security device, wherein the specific image includes any of a predetermined color, luminance, and pattern, or any combination thereof.
According to the above security device, wherein the password comprises either of text and pattern, or a combination thereof.
According to the above security device, wherein the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
According to the above security device, wherein the security device further comprises:
According to the above security device, wherein the security device further comprises:
According to the above security device, wherein the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
According to the above security device, wherein the current information comprises any of time, location, and background, or any combination thereof.
In summary, the present disclosure can improve security performance of a device by concealing its password input interface, and meet the current requirement for information security.
To illustrate embodiments of the present disclosure or solutions of prior art in a clearer manner, brief introductions will be given below with respect to the figures to be used in the descriptions of the embodiments or prior art. It is obvious that the figures in the following descriptions are merely some embodiments of the present disclosure. For one ordinarily skilled in the art, other figures may be derived, without any inventive efforts, from these figures in which:
To present the objects, solutions, and advantages of the embodiments of the present disclosure in a clearer manner, detailed descriptions of the embodiments of the present disclosure will be further given below in conjunction with the figures. Here, the illustrative embodiments of the present disclosure and the description thereof are given for the purpose of illustration only, not for the purpose of limitation.
Taking the icon 130 as an example, the object it represents is an app. When a user clicks this icon 130 via a mouse, a keyboard, a touch screen, etc., a process of a method in accordance with an embodiment of the present disclosure is shown in
At Step S10, an image, which is being captured by the photographing module, is displayed on the display module 120, while the photographing module is in the photo taking mode or video taking mode.
At Step S20, when the photographing module captures a specific image, a password input interface is displayed on the display module 120. This specific image may contain any of color, luminance, or pattern, which meets a predetermined condition, or any combination thereof.
Embodiments utilizing color, luminance, and pattern are described as follows, respectively.
1. Embodiment Utilizing Color
The user sets a certain color value as the base color in advance, and sets positive/negative tolerances. In this way, a color represented by a color value within the range of the positive/negative tolerances is a trigger color. When the photographing module captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module, and in the case where the number of pixels is less than the resolution of the photographing module, the color value of each unit is equal to the average of the color values of all actual pixels within this unit). If a ratio of the number of the pixel units which have color values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger color is met. In other words, the specific image is captured.
2. Embodiment Utilizing Luminance
The user sets a certain luminance value as the base luminance in advance, and sets positive/negative tolerances. In this way, a luminance represented by a luminance value within the range of the positive/negative tolerances is a specific luminance. When the photographing module captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module, and in the case where the number of pixels is less than the resolution of the photographing module, the luminance value of each unit is equal to the average of the luminance values of all actual pixels within this unit). If a ratio of the number of the pixel units which have luminance values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger luminance is met. In other words, the specific image is captured.
3. Embodiment Utilizing Pattern
The user draws a contour on the display module 120 as the trigger pattern, and the contour may not be closed. When the photographing module captures an image, it will detect an object in the image (when necessary, the detection may be performed at different focal lengths, and the detection may determine edge lines of the object based on a color contrast value, but not limited thereto), so as to compare the detected edge lines of the object with the trigger pattern. If matched, the trigger pattern is met. In other words, the specific image is captured.
Of course, the above three embodiments are given for the purpose of illustration only. Any method that can distinguish color, luminance, or pattern of an image may be used.
Furthermore, the set password may be text or pattern, and therefore the password input interfaces are shown as
At Step S30, it is judged whether a password is matched.
At Step S40, if the password is matched, then an object expected by the user (i.e., an app) is displayed on the display module 120.
At Step S50, if the password is not matched, when a predetermined number of failures is reached, the display module 120 prompts the user that no input is possible. The current information is recorded and transmitted to a predetermined address in a predetermined way. The current information comprises, but not limited to, time, location (for example, acquired via a GPS device), background (for example, acquired via the photographing module), etc. For example, the time is Apr. 16, 2012, Monday, and the location is 39° 54′ north latitude and 116° 23′ east longitude. The predetermined way comprises, but not limited to, any of a phone call, a voice message, an SMS message, an MMS message, an email, an instant messenger, and a social network, or any combination thereof. The predetermined address may be preset by the user or chosen from a location such as an address book. Of course, a warning may be issued in any other existing way.
In this embodiment, within the predetermined number of failures (for example, 10 times), the user may keep trying until the predetermined number of failures is reached. The user may record the number of failures.
The present disclosure further provides a security device 200. As shown in
The photographing module 201 is a module that is capable of capturing an image, and it comprises but not limited to a camera. The photographing module 201 is configured to capture an image in a photo taking mode or a video taking mode.
The display module 202 is a module that is capable of displaying an icon, an image, an app, an interface, or the like. It comprises, but not limited to, a display screen or a touch screen, or the like.
The determining module 210 is configured to have the display module 202 present a password input interface when it is determined that a specific image is captured by the photographing module 201. This specific image comprises any of color, luminance, or pattern, which meets a predetermined condition, or any combination thereof.
Embodiments utilizing color, luminance, and pattern are described as follows, respectively:
1. Embodiment Utilizing Color
The user sets a certain color value as the base color in advance, and sets positive/negative tolerances. In this way, a color represented by a color value within the range of the positive/negative tolerances is a trigger color. When the photographing module 201 captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module 201, and in the case where the number of pixels is less than the resolution of the photographing module 201, the color value of each unit is equal to the average of the color values of all actual pixels within this unit). If a ratio of the number of the pixel units which have color values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger color is met. In other words, the specific image is captured.
2. Embodiment Utilizing Luminance
The user sets a certain luminance value as the base luminance in advance, and sets positive/negative tolerances. In this way, a luminance represented by a luminance value within the range of the positive/negative tolerances is a specific luminance. When the photographing module 201 captures an image, it divides the image into n x n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module 201, and in the case where the number of pixels is less than the resolution of the photographing module 201, the luminance value of each unit is equal to the average of the luminance values of all actual pixels within this unit). If a ratio of the number of the pixel units which have luminance values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger luminance is met. In other words, the specific image is captured.
3. Embodiment Utilizing Pattern
The user draws a contour on the display module 202 as the trigger pattern, and the contour may not be closed. When the photographing module 201 captures an image, it will detect an object in the image (when necessary, the detection may be performed at different focal lengths, and the detection may determine edge lines of the object based on a color contrast value, but not limited thereto), so as to compare the detected edge lines of the object with the trigger pattern. If matched, then the trigger pattern is met. In other words, the specific image is captured.
Of course, the above three embodiments are given for the purpose of illustration only. Any method that can distinguish color, luminance, or pattern of an image may be used.
Furthermore, the set password may be text or pattern, and therefore the password input interfaces are shown as
The judging module 220 is configured to judge whether a password input by the user is matched, and if so, to have the display module 202 display an object expected by the user. If not, the user may keep trying within the predetermined number of failures (for example, 10 times). When the predetermined number of failures is reached, the judging module 220 is configured to have the display module 202 display information to prompt the user that no input is possible. At the same time, the judging module 220 is configured to have the recording module 230 record the current information comprising, but not limited to, time, location (for example, acquired via a GPS device), background (for example, acquired via the photographing module), etc. For example, the time is Apr. 16, 2012, Monday, and the location is 39° 54′ north latitude and 116° 23′ east longitude. At the same time, the transmission module 240 transmits the current information to a predetermined address in a predetermined way. The predetermined way comprises, but not limited to, any of a phone call, a voice message, an SMS message, an MMS message, an email, an instant messenger, and a social network, or any combination thereof. The predetermined address may be preset by the user or chosen from a location such as an address book. Of course, a warning may be issued in any other existing way.
The objects, solutions, and advantages of the present disclosure are further detailed by the above specific embodiments. It should be appreciated that the above descriptions are merely specific embodiments of the present disclosure and not for the purpose of limiting the scope of the present disclosure. Any modification, equivalent substitution, improvement, or the like made within the spirit and principle of the present disclosure should be embraced by the scope of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
201210127980.2 | Apr 2012 | CN | national |
This application is a U.S. National Phase Application of International Application No. PCT/CN2013/072600, filed on Mar. 14, 2013, entitled “SECURITY DEVICE AND DISPLAY METHOD THEREOF,” which claims priority to Chinese Application No. 201210127980.2, filed on Apr. 27, 2012, both of which are incorporated herein by reference in their entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CN2013/072600 | 3/14/2013 | WO | 00 |