US20150009333A1 - Security device and display method thereof - Google Patents
Security device and display method thereof Download PDFInfo
- Publication number
- US20150009333A1 US20150009333A1 US14/378,615 US201314378615A US2015009333A1 US 20150009333 A1 US20150009333 A1 US 20150009333A1 US 201314378615 A US201314378615 A US 201314378615A US 2015009333 A1 US2015009333 A1 US 2015009333A1
- Authority
- US
- United States
- Prior art keywords
- security device
- combination
- predetermined
- current information
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/183—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
- H04N7/186—Video door telephones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Alarm Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Provided is a display method for a security device installed with a photographing module and a display module. The method comprises: A. when the security device captures a specific image via the photographing module, the security device displays a password input interface via the display module; and B. when password matching is successful, the security device displays a predetermined object via the display module. The present invention improves security performance of a device by concealing the password input interface, and satisfies the current requirement for information security.
Description
- This application is a U.S. National Phase Application of International Application No. PCT/CN2013/072600, filed on Mar. 14, 2013, entitled “SECURITY DEVICE AND DISPLAY METHOD THEREOF,” which claims priority to Chinese Application No. 201210127980.2, filed on Apr. 27, 2012, both of which are incorporated herein by reference in their entirety.
- The present disclosure relates to a security device and display method thereof.
- With development of the information technology, information security is becoming increasingly important. However, the existing information security still relies on conventional methods to protect, for example, by encryptions using passwords or patterns and the like. This cannot satisfy the current requirement for information security.
- In view of this, the object of the present disclosure is to provide a security device and a display method thereof for improving the existing encryptions, so as to meet the current requirement for information security.
- Therefore, the present disclosure provides a display method for a security device installed with a photographing module and a display module, the method comprising:
-
- A. when the security device captures a specific image via the photographing module, the security device displays a password input interface via the display module; and
- B. when password matching is successful, the security device displays a predetermined object via the display module.
- According to the above method, wherein this specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof.
- According to the above method, wherein the password comprises either of text and pattern, or a combination thereof.
- According to the above method, wherein the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
- According to the above method, wherein the method further comprises:
-
- C. when the password matching is failed, the security device records the number of failures, and when the number exceeds a predetermined value, the security device records the current information of the security device.
- According to the above method, wherein the method further comprises: the security device transmits the current information to a predetermined address in a predetermined way.
- According to the above method, wherein the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
- According to the above method, wherein the current information comprises any of time, location, and background, or any combination thereof.
- The present disclosure further provides a security device comprising a photographing module and a display module, characterized in that the security device further comprises:
-
- a determining module configured to determine whether an image captured via the photographing module is a specific image, and if so, to have the display module display a password input interface; and
- a judging module configured to judge whether an input password is matched, and if so, to have the display module display a predetermined object.
- According to the above security device, wherein the specific image includes any of a predetermined color, luminance, and pattern, or any combination thereof.
- According to the above security device, wherein the password comprises either of text and pattern, or a combination thereof.
- According to the above security device, wherein the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
- According to the above security device, wherein the security device further comprises:
-
- a recording module configured to record the number of failures when the password matching is failed, and to record the current information of the security device when the number exceeds a predetermined value.
- According to the above security device, wherein the security device further comprises:
-
- a transmission module configured to transmit the current information to a predetermined address in a predetermined way.
- According to the above security device, wherein the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
- According to the above security device, wherein the current information comprises any of time, location, and background, or any combination thereof.
- In summary, the present disclosure can improve security performance of a device by concealing its password input interface, and meet the current requirement for information security.
- To illustrate embodiments of the present disclosure or solutions of prior art in a clearer manner, brief introductions will be given below with respect to the figures to be used in the descriptions of the embodiments or prior art. It is obvious that the figures in the following descriptions are merely some embodiments of the present disclosure. For one ordinarily skilled in the art, other figures may be derived, without any inventive efforts, from these figures in which:
-
FIG. 1 is a display schematic diagram of a display module of a security device in accordance with an embodiment of the present disclosure; -
FIG. 2 is a text password input interface displayed on a display module of a security device in accordance with an embodiment of the present disclosure; -
FIG. 3 is a pattern password input interface displayed on a display module of a security device in accordance with an embodiment of the present disclosure; -
FIG. 4 is a flow chart of a display method in accordance with an embodiment of the present disclosure; and -
FIG. 5 is a block diagram of a security device in accordance with an embodiment of the present disclosure. - To present the objects, solutions, and advantages of the embodiments of the present disclosure in a clearer manner, detailed descriptions of the embodiments of the present disclosure will be further given below in conjunction with the figures. Here, the illustrative embodiments of the present disclosure and the description thereof are given for the purpose of illustration only, not for the purpose of limitation.
-
FIG. 1 is a schematic diagram of an interface of a security device in accordance with an embodiment of the present disclosure. Thesecurity device 100 comprises a photographing module (not shown) such as a camera and adisplay module 120 such as a display screen. Thesecurity device 100 may be any device comprising, but not limited to, a mobile phone, a tablet computer, a desktop computer, or a notebook computer, or the like. There are several icons, such as, 130, 140, 150, and 160, on thedisplay module 120. The objects represented by these icons comprise, but not limited to, an image, a video, an app, or an interface, etc. - Taking the
icon 130 as an example, the object it represents is an app. When a user clicks thisicon 130 via a mouse, a keyboard, a touch screen, etc., a process of a method in accordance with an embodiment of the present disclosure is shown inFIG. 4 . - At Step S10, an image, which is being captured by the photographing module, is displayed on the
display module 120, while the photographing module is in the photo taking mode or video taking mode. - At Step S20, when the photographing module captures a specific image, a password input interface is displayed on the
display module 120. This specific image may contain any of color, luminance, or pattern, which meets a predetermined condition, or any combination thereof. - Embodiments utilizing color, luminance, and pattern are described as follows, respectively.
- 1. Embodiment Utilizing Color
- The user sets a certain color value as the base color in advance, and sets positive/negative tolerances. In this way, a color represented by a color value within the range of the positive/negative tolerances is a trigger color. When the photographing module captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module, and in the case where the number of pixels is less than the resolution of the photographing module, the color value of each unit is equal to the average of the color values of all actual pixels within this unit). If a ratio of the number of the pixel units which have color values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger color is met. In other words, the specific image is captured.
- 2. Embodiment Utilizing Luminance
- The user sets a certain luminance value as the base luminance in advance, and sets positive/negative tolerances. In this way, a luminance represented by a luminance value within the range of the positive/negative tolerances is a specific luminance. When the photographing module captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module, and in the case where the number of pixels is less than the resolution of the photographing module, the luminance value of each unit is equal to the average of the luminance values of all actual pixels within this unit). If a ratio of the number of the pixel units which have luminance values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger luminance is met. In other words, the specific image is captured.
- 3. Embodiment Utilizing Pattern
- The user draws a contour on the
display module 120 as the trigger pattern, and the contour may not be closed. When the photographing module captures an image, it will detect an object in the image (when necessary, the detection may be performed at different focal lengths, and the detection may determine edge lines of the object based on a color contrast value, but not limited thereto), so as to compare the detected edge lines of the object with the trigger pattern. If matched, the trigger pattern is met. In other words, the specific image is captured. - Of course, the above three embodiments are given for the purpose of illustration only. Any method that can distinguish color, luminance, or pattern of an image may be used.
- Furthermore, the set password may be text or pattern, and therefore the password input interfaces are shown as
FIG. 2 andFIG. 3 , in whichFIG. 2 is a text input interface andFIG. 3 is a pattern input interface. InFIG. 3 , a pattern may be formed by connecting dots. Of course, the password input interface may also be a combination of the both. It should be appreciated that the above password setting and input methods are merely examples, and any appropriate method for password setting and inputting may be used. - At Step S30, it is judged whether a password is matched.
- At Step S40, if the password is matched, then an object expected by the user (i.e., an app) is displayed on the
display module 120. - At Step S50, if the password is not matched, when a predetermined number of failures is reached, the
display module 120 prompts the user that no input is possible. The current information is recorded and transmitted to a predetermined address in a predetermined way. The current information comprises, but not limited to, time, location (for example, acquired via a GPS device), background (for example, acquired via the photographing module), etc. For example, the time is Apr. 16, 2012, Monday, and the location is 39° 54′ north latitude and 116° 23′ east longitude. The predetermined way comprises, but not limited to, any of a phone call, a voice message, an SMS message, an MMS message, an email, an instant messenger, and a social network, or any combination thereof. The predetermined address may be preset by the user or chosen from a location such as an address book. Of course, a warning may be issued in any other existing way. - In this embodiment, within the predetermined number of failures (for example, 10 times), the user may keep trying until the predetermined number of failures is reached. The user may record the number of failures.
- The present disclosure further provides a
security device 200. As shown inFIG. 5 , it comprises a photographingmodule 201, adisplay module 202, a determiningmodule 210, a judgingmodule 220, arecording module 230, and atransmission module 240. - The photographing
module 201 is a module that is capable of capturing an image, and it comprises but not limited to a camera. The photographingmodule 201 is configured to capture an image in a photo taking mode or a video taking mode. - The
display module 202 is a module that is capable of displaying an icon, an image, an app, an interface, or the like. It comprises, but not limited to, a display screen or a touch screen, or the like. - The determining
module 210 is configured to have thedisplay module 202 present a password input interface when it is determined that a specific image is captured by the photographingmodule 201. This specific image comprises any of color, luminance, or pattern, which meets a predetermined condition, or any combination thereof. - Embodiments utilizing color, luminance, and pattern are described as follows, respectively:
- 1. Embodiment Utilizing Color
- The user sets a certain color value as the base color in advance, and sets positive/negative tolerances. In this way, a color represented by a color value within the range of the positive/negative tolerances is a trigger color. When the photographing
module 201 captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographingmodule 201, and in the case where the number of pixels is less than the resolution of the photographingmodule 201, the color value of each unit is equal to the average of the color values of all actual pixels within this unit). If a ratio of the number of the pixel units which have color values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger color is met. In other words, the specific image is captured. - 2. Embodiment Utilizing Luminance
- The user sets a certain luminance value as the base luminance in advance, and sets positive/negative tolerances. In this way, a luminance represented by a luminance value within the range of the positive/negative tolerances is a specific luminance. When the photographing
module 201 captures an image, it divides the image into n x n pixel units (the number of pixels may be equal to or less than the resolution of the photographingmodule 201, and in the case where the number of pixels is less than the resolution of the photographingmodule 201, the luminance value of each unit is equal to the average of the luminance values of all actual pixels within this unit). If a ratio of the number of the pixel units which have luminance values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger luminance is met. In other words, the specific image is captured. - 3. Embodiment Utilizing Pattern
- The user draws a contour on the
display module 202 as the trigger pattern, and the contour may not be closed. When the photographingmodule 201 captures an image, it will detect an object in the image (when necessary, the detection may be performed at different focal lengths, and the detection may determine edge lines of the object based on a color contrast value, but not limited thereto), so as to compare the detected edge lines of the object with the trigger pattern. If matched, then the trigger pattern is met. In other words, the specific image is captured. - Of course, the above three embodiments are given for the purpose of illustration only. Any method that can distinguish color, luminance, or pattern of an image may be used.
- Furthermore, the set password may be text or pattern, and therefore the password input interfaces are shown as
FIG. 2 andFIG. 3 , in whichFIG. 2 is a text input interface andFIG. 3 is a pattern input interface. InFIG. 3 , a pattern may be formed by connecting dots. Of course, the password input interface may also be a combination of the both. It should be appreciated that the above password setting and input methods are merely examples and any appropriate method for password setting and inputting may be used. - The judging
module 220 is configured to judge whether a password input by the user is matched, and if so, to have thedisplay module 202 display an object expected by the user. If not, the user may keep trying within the predetermined number of failures (for example, 10 times). When the predetermined number of failures is reached, the judgingmodule 220 is configured to have thedisplay module 202 display information to prompt the user that no input is possible. At the same time, the judgingmodule 220 is configured to have therecording module 230 record the current information comprising, but not limited to, time, location (for example, acquired via a GPS device), background (for example, acquired via the photographing module), etc. For example, the time is Apr. 16, 2012, Monday, and the location is 39° 54′ north latitude and 116° 23′ east longitude. At the same time, thetransmission module 240 transmits the current information to a predetermined address in a predetermined way. The predetermined way comprises, but not limited to, any of a phone call, a voice message, an SMS message, an MMS message, an email, an instant messenger, and a social network, or any combination thereof. The predetermined address may be preset by the user or chosen from a location such as an address book. Of course, a warning may be issued in any other existing way. - The objects, solutions, and advantages of the present disclosure are further detailed by the above specific embodiments. It should be appreciated that the above descriptions are merely specific embodiments of the present disclosure and not for the purpose of limiting the scope of the present disclosure. Any modification, equivalent substitution, improvement, or the like made within the spirit and principle of the present disclosure should be embraced by the scope of the present disclosure.
Claims (20)
1. A display method for a security device installed with a photographing module and a display module, characterized in that the method comprises:
A. displaying, by the security device, a password input interface via the display module when the security device captures a specific image via the photographing module; and
B. displaying, by the security device, a predetermined object via the display module when password matching is successful.
2. The method of claim 1 , characterized in that the specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof
3. The method of claim 1 , characterized in that the password comprises either of text and pattern, or a combination thereof.
4. The method of claim 1 , characterized in that the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
5. The method of claim 1 , characterized in that the method further comprises:
C. recording, by the security device, the number of failures when the password matching is failed, and recording, by the security device, the current information of the security device when the number exceeds a predetermined value.
6. The method of claim 5 , characterized in that the method further comprises: transmitting, by the security device, the current information to a predetermined address in a predetermined way.
7. The method of claim 6 , characterized in that the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
8. The method of any of claim 5 , characterized in that the current information comprises any of time, location, and background, or any combination thereof.
9. A security device comprising a photographing module and a display module, characterized in that the security device further comprises:
a determining module configured to determine whether an image captured via the photographing module is a specific image, and if so, to have the display module display a password input interface; and
a judging module configured to judge whether an input password is matched, and if so, to have the display module display a predetermined object.
10. The security device of claim 9 , characterized in that the specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof.
11. The security device of claim 9 , characterized in that the password comprises either of text and pattern, or a combination thereof.
12. The security device of claim 9 , characterized in that the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
13. The security device of claim 9 , characterized in that the security device further comprises:
a recording module configured to record the number of failures when the password matching is failed, and to record the current information of the security device when the number exceeds a predetermined value.
14. The security device of claim 13 , characterized in that the security device further comprises:
a transmission module configured to transmit the current information to a predetermined address in a predetermined way.
15. The security device of claim 14 , characterized in that the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
16. The security device of claim 15 , characterized in that the current information comprises any of time, location, and background, or any combination thereof.
17. The method of claim 6 , characterized in that the current information comprises any of time, location, and background, or any combination thereof.
18. The method of claim 7 , characterized in that the current information comprises any of time, location, and background, or any combination thereof.
19. The security device of claim 14 , characterized in that the current information comprises any of time, location, and background, or any combination thereof.
20. The security device of claim 15 , characterized in that the current information comprises any of time, location, and background, or any combination thereof.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210127980.2 | 2012-04-27 | ||
CN2012101279802A CN103425912A (en) | 2012-04-27 | 2012-04-27 | Safety device and display method thereof |
PCT/CN2013/072600 WO2013159609A1 (en) | 2012-04-27 | 2013-03-14 | Security device and display method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150009333A1 true US20150009333A1 (en) | 2015-01-08 |
Family
ID=49478579
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/527,023 Expired - Fee Related US8966615B2 (en) | 2012-04-27 | 2012-06-19 | Security device and display method thereof |
US14/378,615 Abandoned US20150009333A1 (en) | 2012-04-27 | 2013-03-14 | Security device and display method thereof |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/527,023 Expired - Fee Related US8966615B2 (en) | 2012-04-27 | 2012-06-19 | Security device and display method thereof |
Country Status (3)
Country | Link |
---|---|
US (2) | US8966615B2 (en) |
CN (1) | CN103425912A (en) |
WO (1) | WO2013159609A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9280656B2 (en) * | 2012-11-16 | 2016-03-08 | University-Industry Foundation, Yonsei University | Device and method for providing security channel interface |
CN105096501B (en) * | 2014-04-25 | 2019-02-12 | 北京奇虎科技有限公司 | Intelligent terminal theft preventing method and intelligent terminal |
CN105577633B (en) * | 2015-06-27 | 2019-10-11 | 宇龙计算机通信科技(深圳)有限公司 | A kind of verification method and terminal |
KR20170006210A (en) * | 2015-07-07 | 2017-01-17 | 한화테크윈 주식회사 | Surveillance method |
CN105760735B (en) * | 2016-02-16 | 2019-04-23 | Oppo广东移动通信有限公司 | A kind of display methods and its device of mobile terminal encrypted content |
US11080649B2 (en) * | 2017-07-25 | 2021-08-03 | Amazon Technologies, Inc. | Remote access monitoring |
US10019860B1 (en) | 2017-07-25 | 2018-07-10 | Amazon Technologies, Inc. | Remote access authentication and authorization |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6023688A (en) * | 1997-11-28 | 2000-02-08 | Diebold, Incorporated | Transaction apparatus and method that identifies an authorized user by appearance and voice |
US20020035539A1 (en) * | 2000-07-17 | 2002-03-21 | O'connell Richard | System and methods of validating an authorized user of a payment card and authorization of a payment card transaction |
US7175076B1 (en) * | 2004-07-07 | 2007-02-13 | Diebold Self-Service Systems Division Of Diebold, Incorporated | Cash dispensing automated banking machine user interface system and method |
US20080209510A1 (en) * | 2007-02-26 | 2008-08-28 | Semiconductor Energy Laboratory Co., Ltd. | Memory Device |
US7494053B1 (en) * | 2005-11-14 | 2009-02-24 | Diebold Self-Service Systems Division Of Diebold, Incorporated | Cash dispensing automated banking machine and method |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7280134B1 (en) * | 1998-01-26 | 2007-10-09 | Thales Avionics, Inc. | Landscape camera system with electronic field of view switching |
US6584466B1 (en) * | 1999-04-07 | 2003-06-24 | Critical Path, Inc. | Internet document management system and methods |
US20060206429A1 (en) * | 2005-01-28 | 2006-09-14 | Martinez Pamela J | Secure identification apparatus, system and method in a portable electronic device for financial and other secure systems |
CN101179386A (en) * | 2007-11-20 | 2008-05-14 | 常志良 | Network account anti-theft method |
US20090324025A1 (en) * | 2008-04-15 | 2009-12-31 | Sony Ericsson Mobile Communicatoins AB | Physical Access Control Using Dynamic Inputs from a Portable Communications Device |
CN101604379A (en) * | 2009-07-09 | 2009-12-16 | 交通银行股份有限公司 | A kind of identity identifying method and device based on ATM |
CN101958892B (en) * | 2010-09-16 | 2013-02-20 | 汉王科技股份有限公司 | Electronic data protection method, device and system based on face recognition |
TW201216107A (en) * | 2010-10-14 | 2012-04-16 | Hon Hai Prec Ind Co Ltd | Electronic device and method for obtaining information of an illegal user of the electronic device |
CN102145683A (en) * | 2011-03-11 | 2011-08-10 | 广东铁将军防盗设备有限公司 | Video recording instrument of vehicle |
-
2012
- 2012-04-27 CN CN2012101279802A patent/CN103425912A/en active Pending
- 2012-06-19 US US13/527,023 patent/US8966615B2/en not_active Expired - Fee Related
-
2013
- 2013-03-14 WO PCT/CN2013/072600 patent/WO2013159609A1/en active Application Filing
- 2013-03-14 US US14/378,615 patent/US20150009333A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6023688A (en) * | 1997-11-28 | 2000-02-08 | Diebold, Incorporated | Transaction apparatus and method that identifies an authorized user by appearance and voice |
US20020035539A1 (en) * | 2000-07-17 | 2002-03-21 | O'connell Richard | System and methods of validating an authorized user of a payment card and authorization of a payment card transaction |
US7175076B1 (en) * | 2004-07-07 | 2007-02-13 | Diebold Self-Service Systems Division Of Diebold, Incorporated | Cash dispensing automated banking machine user interface system and method |
US7494053B1 (en) * | 2005-11-14 | 2009-02-24 | Diebold Self-Service Systems Division Of Diebold, Incorporated | Cash dispensing automated banking machine and method |
US20080209510A1 (en) * | 2007-02-26 | 2008-08-28 | Semiconductor Energy Laboratory Co., Ltd. | Memory Device |
Also Published As
Publication number | Publication date |
---|---|
US8966615B2 (en) | 2015-02-24 |
WO2013159609A1 (en) | 2013-10-31 |
CN103425912A (en) | 2013-12-04 |
US20130291095A1 (en) | 2013-10-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20150009333A1 (en) | Security device and display method thereof | |
WO2020248955A1 (en) | Content sharing method and electronic device | |
US11023572B2 (en) | Augmented reality object providing method and server using image authentication | |
RU2643473C2 (en) | Method and tools for fingerprinting identification | |
TWI684886B (en) | Method and device for generating security problems and identity verification | |
US20200150850A1 (en) | Method and device for displaying an application interface | |
US9251404B2 (en) | Name bubble handling | |
US9715751B2 (en) | Zooming to faces depicted in images | |
US20150085146A1 (en) | Method and system for storing contact information in an image using a mobile device | |
US20150058788A1 (en) | Information processing method and electronic device | |
CN105721514A (en) | User device, cloud server and shared link identification method thereof | |
CN105554227A (en) | Method and apparatus for improving terminal information security, and terminal | |
EP3022675B1 (en) | Methods, apparatuses, and computer program products for hiding access to information in an image | |
US10956607B2 (en) | Controlling non-owner access to media content on a computing device | |
US20090226101A1 (en) | System, devices, method, computer program product | |
WO2019061185A1 (en) | Method and terminal for digitally signing picture | |
US10880735B2 (en) | Method for detecting the possible taking of screenshots | |
CN104394270B (en) | The method and apparatus that auxiliary receives calls | |
KR100984307B1 (en) | Digital picture frame capable of offering communication service and method thereof | |
US20180091463A1 (en) | Collaboration conversation notification | |
CN110381064B (en) | Verification method, verification device and computer-readable storage medium | |
WO2019022921A1 (en) | Method and apparatus for cropping and displaying an image | |
US11176021B2 (en) | Messaging systems with improved reliability | |
US20230252183A1 (en) | Information processing apparatus, information processing method, and computer program | |
CN110300214B (en) | Communication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BEIJING NETQIN TECHNOLOGY CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHENG, PING;YANG, XIAO;YU, JIA;AND OTHERS;REEL/FRAME:033532/0414 Effective date: 20140805 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |