Security device and display method thereof

ABSTRACT

Provided is a display method for a security device installed with a photographing module and a display module. The method comprises: A. when the security device captures a specific image via the photographing module, the security device displays a password input interface via the display module; and B. when password matching is successful, the security device displays a predetermined object via the display module. The present invention improves security performance of a device by concealing the password input interface, and satisfies the current requirement for information security.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a U.S. National Phase Application of International Application No. PCT/CN2013/072600, filed on Mar. 14, 2013, entitled “SECURITY DEVICE AND DISPLAY METHOD THEREOF,” which claims priority to Chinese Application No. 201210127980.2, filed on Apr. 27, 2012, both of which are incorporated herein by reference in their entirety.

TECHNICAL FIELD

The present disclosure relates to a security device and display method thereof.

BACKGROUND

With development of the information technology, information security is becoming increasingly important. However, the existing information security still relies on conventional methods to protect, for example, by encryptions using passwords or patterns and the like. This cannot satisfy the current requirement for information security.

SUMMARY

In view of this, the object of the present disclosure is to provide a security device and a display method thereof for improving the existing encryptions, so as to meet the current requirement for information security.

Therefore, the present disclosure provides a display method for a security device installed with a photographing module and a display module, the method comprising:

-   -   A. when the security device captures a specific image via the         photographing module, the security device displays a password         input interface via the display module; and     -   B. when password matching is successful, the security device         displays a predetermined object via the display module.

According to the above method, wherein this specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof.

According to the above method, wherein the password comprises either of text and pattern, or a combination thereof.

According to the above method, wherein the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.

According to the above method, wherein the method further comprises:

-   -   C. when the password matching is failed, the security device         records the number of failures, and when the number exceeds a         predetermined value, the security device records the current         information of the security device.

According to the above method, wherein the method further comprises: the security device transmits the current information to a predetermined address in a predetermined way.

According to the above method, wherein the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.

According to the above method, wherein the current information comprises any of time, location, and background, or any combination thereof.

The present disclosure further provides a security device comprising a photographing module and a display module, characterized in that the security device further comprises:

-   -   a determining module configured to determine whether an image         captured via the photographing module is a specific image, and         if so, to have the display module display a password input         interface; and     -   a judging module configured to judge whether an input password         is matched, and if so, to have the display module display a         predetermined object.

According to the above security device, wherein the specific image includes any of a predetermined color, luminance, and pattern, or any combination thereof.

According to the above security device, wherein the password comprises either of text and pattern, or a combination thereof.

According to the above security device, wherein the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.

According to the above security device, wherein the security device further comprises:

-   -   a recording module configured to record the number of failures         when the password matching is failed, and to record the current         information of the security device when the number exceeds a         predetermined value.

According to the above security device, wherein the security device further comprises:

-   -   a transmission module configured to transmit the current         information to a predetermined address in a predetermined way.

According to the above security device, wherein the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.

According to the above security device, wherein the current information comprises any of time, location, and background, or any combination thereof.

In summary, the present disclosure can improve security performance of a device by concealing its password input interface, and meet the current requirement for information security.

BRIEF DESCRIPTION OF THE DRAWINGS

To illustrate embodiments of the present disclosure or solutions of prior art in a clearer manner, brief introductions will be given below with respect to the figures to be used in the descriptions of the embodiments or prior art. It is obvious that the figures in the following descriptions are merely some embodiments of the present disclosure. For one ordinarily skilled in the art, other figures may be derived, without any inventive efforts, from these figures in which:

FIG. 1 is a display schematic diagram of a display module of a security device in accordance with an embodiment of the present disclosure;

FIG. 2 is a text password input interface displayed on a display module of a security device in accordance with an embodiment of the present disclosure;

FIG. 3 is a pattern password input interface displayed on a display module of a security device in accordance with an embodiment of the present disclosure;

FIG. 4 is a flow chart of a display method in accordance with an embodiment of the present disclosure; and

FIG. 5 is a block diagram of a security device in accordance with an embodiment of the present disclosure.

DETAILED DESCRIPTION

To present the objects, solutions, and advantages of the embodiments of the present disclosure in a clearer manner, detailed descriptions of the embodiments of the present disclosure will be further given below in conjunction with the figures. Here, the illustrative embodiments of the present disclosure and the description thereof are given for the purpose of illustration only, not for the purpose of limitation.

FIG. 1 is a schematic diagram of an interface of a security device in accordance with an embodiment of the present disclosure. The security device 100 comprises a photographing module (not shown) such as a camera and a display module 120 such as a display screen. The security device 100 may be any device comprising, but not limited to, a mobile phone, a tablet computer, a desktop computer, or a notebook computer, or the like. There are several icons, such as, 130, 140, 150, and 160, on the display module 120. The objects represented by these icons comprise, but not limited to, an image, a video, an app, or an interface, etc.

Taking the icon 130 as an example, the object it represents is an app. When a user clicks this icon 130 via a mouse, a keyboard, a touch screen, etc., a process of a method in accordance with an embodiment of the present disclosure is shown in FIG. 4.

At Step S10, an image, which is being captured by the photographing module, is displayed on the display module 120, while the photographing module is in the photo taking mode or video taking mode.

At Step S20, when the photographing module captures a specific image, a password input interface is displayed on the display module 120. This specific image may contain any of color, luminance, or pattern, which meets a predetermined condition, or any combination thereof.

Embodiments utilizing color, luminance, and pattern are described as follows, respectively.

1. Embodiment Utilizing Color

The user sets a certain color value as the base color in advance, and sets positive/negative tolerances. In this way, a color represented by a color value within the range of the positive/negative tolerances is a trigger color. When the photographing module captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module, and in the case where the number of pixels is less than the resolution of the photographing module, the color value of each unit is equal to the average of the color values of all actual pixels within this unit). If a ratio of the number of the pixel units which have color values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger color is met. In other words, the specific image is captured.

2. Embodiment Utilizing Luminance

The user sets a certain luminance value as the base luminance in advance, and sets positive/negative tolerances. In this way, a luminance represented by a luminance value within the range of the positive/negative tolerances is a specific luminance. When the photographing module captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module, and in the case where the number of pixels is less than the resolution of the photographing module, the luminance value of each unit is equal to the average of the luminance values of all actual pixels within this unit). If a ratio of the number of the pixel units which have luminance values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger luminance is met. In other words, the specific image is captured.

3. Embodiment Utilizing Pattern

The user draws a contour on the display module 120 as the trigger pattern, and the contour may not be closed. When the photographing module captures an image, it will detect an object in the image (when necessary, the detection may be performed at different focal lengths, and the detection may determine edge lines of the object based on a color contrast value, but not limited thereto), so as to compare the detected edge lines of the object with the trigger pattern. If matched, the trigger pattern is met. In other words, the specific image is captured.

Of course, the above three embodiments are given for the purpose of illustration only. Any method that can distinguish color, luminance, or pattern of an image may be used.

Furthermore, the set password may be text or pattern, and therefore the password input interfaces are shown as FIG. 2 and FIG. 3, in which FIG. 2 is a text input interface and FIG. 3 is a pattern input interface. In FIG. 3, a pattern may be formed by connecting dots. Of course, the password input interface may also be a combination of the both. It should be appreciated that the above password setting and input methods are merely examples, and any appropriate method for password setting and inputting may be used.

At Step S30, it is judged whether a password is matched.

At Step S40, if the password is matched, then an object expected by the user (i.e., an app) is displayed on the display module 120.

At Step S50, if the password is not matched, when a predetermined number of failures is reached, the display module 120 prompts the user that no input is possible. The current information is recorded and transmitted to a predetermined address in a predetermined way. The current information comprises, but not limited to, time, location (for example, acquired via a GPS device), background (for example, acquired via the photographing module), etc. For example, the time is Apr. 16, 2012, Monday, and the location is 39° 54′ north latitude and 116° 23′ east longitude. The predetermined way comprises, but not limited to, any of a phone call, a voice message, an SMS message, an MMS message, an email, an instant messenger, and a social network, or any combination thereof. The predetermined address may be preset by the user or chosen from a location such as an address book. Of course, a warning may be issued in any other existing way.

In this embodiment, within the predetermined number of failures (for example, 10 times), the user may keep trying until the predetermined number of failures is reached. The user may record the number of failures.

The present disclosure further provides a security device 200. As shown in FIG. 5, it comprises a photographing module 201, a display module 202, a determining module 210, a judging module 220, a recording module 230, and a transmission module 240.

The photographing module 201 is a module that is capable of capturing an image, and it comprises but not limited to a camera. The photographing module 201 is configured to capture an image in a photo taking mode or a video taking mode.

The display module 202 is a module that is capable of displaying an icon, an image, an app, an interface, or the like. It comprises, but not limited to, a display screen or a touch screen, or the like.

The determining module 210 is configured to have the display module 202 present a password input interface when it is determined that a specific image is captured by the photographing module 201. This specific image comprises any of color, luminance, or pattern, which meets a predetermined condition, or any combination thereof.

Embodiments utilizing color, luminance, and pattern are described as follows, respectively:

1. Embodiment Utilizing Color

The user sets a certain color value as the base color in advance, and sets positive/negative tolerances. In this way, a color represented by a color value within the range of the positive/negative tolerances is a trigger color. When the photographing module 201 captures an image, it divides the image into n×n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module 201, and in the case where the number of pixels is less than the resolution of the photographing module 201, the color value of each unit is equal to the average of the color values of all actual pixels within this unit). If a ratio of the number of the pixel units which have color values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger color is met. In other words, the specific image is captured.

2. Embodiment Utilizing Luminance

The user sets a certain luminance value as the base luminance in advance, and sets positive/negative tolerances. In this way, a luminance represented by a luminance value within the range of the positive/negative tolerances is a specific luminance. When the photographing module 201 captures an image, it divides the image into n x n pixel units (the number of pixels may be equal to or less than the resolution of the photographing module 201, and in the case where the number of pixels is less than the resolution of the photographing module 201, the luminance value of each unit is equal to the average of the luminance values of all actual pixels within this unit). If a ratio of the number of the pixel units which have luminance values within the tolerance range to the total number of the pixel units exceeds a set value (for example, 80%, but not limited thereto, which may be set based on the actual needs), it may be determined that the trigger luminance is met. In other words, the specific image is captured.

3. Embodiment Utilizing Pattern

The user draws a contour on the display module 202 as the trigger pattern, and the contour may not be closed. When the photographing module 201 captures an image, it will detect an object in the image (when necessary, the detection may be performed at different focal lengths, and the detection may determine edge lines of the object based on a color contrast value, but not limited thereto), so as to compare the detected edge lines of the object with the trigger pattern. If matched, then the trigger pattern is met. In other words, the specific image is captured.

Of course, the above three embodiments are given for the purpose of illustration only. Any method that can distinguish color, luminance, or pattern of an image may be used.

Furthermore, the set password may be text or pattern, and therefore the password input interfaces are shown as FIG. 2 and FIG. 3, in which FIG. 2 is a text input interface and FIG. 3 is a pattern input interface. In FIG. 3, a pattern may be formed by connecting dots. Of course, the password input interface may also be a combination of the both. It should be appreciated that the above password setting and input methods are merely examples and any appropriate method for password setting and inputting may be used.

The judging module 220 is configured to judge whether a password input by the user is matched, and if so, to have the display module 202 display an object expected by the user. If not, the user may keep trying within the predetermined number of failures (for example, 10 times). When the predetermined number of failures is reached, the judging module 220 is configured to have the display module 202 display information to prompt the user that no input is possible. At the same time, the judging module 220 is configured to have the recording module 230 record the current information comprising, but not limited to, time, location (for example, acquired via a GPS device), background (for example, acquired via the photographing module), etc. For example, the time is Apr. 16, 2012, Monday, and the location is 39° 54′ north latitude and 116° 23′ east longitude. At the same time, the transmission module 240 transmits the current information to a predetermined address in a predetermined way. The predetermined way comprises, but not limited to, any of a phone call, a voice message, an SMS message, an MMS message, an email, an instant messenger, and a social network, or any combination thereof. The predetermined address may be preset by the user or chosen from a location such as an address book. Of course, a warning may be issued in any other existing way.

The objects, solutions, and advantages of the present disclosure are further detailed by the above specific embodiments. It should be appreciated that the above descriptions are merely specific embodiments of the present disclosure and not for the purpose of limiting the scope of the present disclosure. Any modification, equivalent substitution, improvement, or the like made within the spirit and principle of the present disclosure should be embraced by the scope of the present disclosure. 

1. A display method for a security device installed with a photographing module and a display module, characterized in that the method comprises: A. displaying, by the security device, a password input interface via the display module when the security device captures a specific image via the photographing module; and B. displaying, by the security device, a predetermined object via the display module when password matching is successful.
 2. The method of claim 1, characterized in that the specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof
 3. The method of claim 1, characterized in that the password comprises either of text and pattern, or a combination thereof.
 4. The method of claim 1, characterized in that the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
 5. The method of claim 1, characterized in that the method further comprises: C. recording, by the security device, the number of failures when the password matching is failed, and recording, by the security device, the current information of the security device when the number exceeds a predetermined value.
 6. The method of claim 5, characterized in that the method further comprises: transmitting, by the security device, the current information to a predetermined address in a predetermined way.
 7. The method of claim 6, characterized in that the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
 8. The method of any of claim 5, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
 9. A security device comprising a photographing module and a display module, characterized in that the security device further comprises: a determining module configured to determine whether an image captured via the photographing module is a specific image, and if so, to have the display module display a password input interface; and a judging module configured to judge whether an input password is matched, and if so, to have the display module display a predetermined object.
 10. The security device of claim 9, characterized in that the specific image contains any of a predetermined color, luminance, and pattern, or any combination thereof.
 11. The security device of claim 9, characterized in that the password comprises either of text and pattern, or a combination thereof.
 12. The security device of claim 9, characterized in that the predetermined object comprises any of text, image, video, app, and interface, or any combination thereof.
 13. The security device of claim 9, characterized in that the security device further comprises: a recording module configured to record the number of failures when the password matching is failed, and to record the current information of the security device when the number exceeds a predetermined value.
 14. The security device of claim 13, characterized in that the security device further comprises: a transmission module configured to transmit the current information to a predetermined address in a predetermined way.
 15. The security device of claim 14, characterized in that the predetermined way comprises any of a phone call, a voice message, a Short Messaging Service (SMS) message, a Multimedia Messaging Service (MMS) message, an email, an instant messenger, and a social network, or any combination thereof.
 16. The security device of claim 15, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
 17. The method of claim 6, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
 18. The method of claim 7, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
 19. The security device of claim 14, characterized in that the current information comprises any of time, location, and background, or any combination thereof.
 20. The security device of claim 15, characterized in that the current information comprises any of time, location, and background, or any combination thereof. 