Sign in/Sign upUser centerRemaining:0Recent taskInviteLog outLanguage简体中文English日本语EspañolFrancésAPIPriceundefinedHili PhotoEnhance is a photo repair and retouching tool, that uses AI algorithms to automatically colorize black& white photos, repair old photos, and optimize blurred out-of-focus photos.
Privacy policy

 

 

 

"Hili PhotoEnhance" Privacy Policy

 

 

Update date: July 19, 2021

 

 

Beijing Hanliang Technology Co., Ltd. and its affiliates ("us"), as operators of "Hili PhotoEnhance" (referred to as the "Service"), are well aware of the importance of personal information to you, and we will comply with laws and regulations. Provisions to protect your personal information and privacy. We have formulated this "Privacy Policy" with a special reminder: We hope you read and understand this privacy policy carefully before using this service and related services in order to make an appropriate choice.

 

This privacy policy will help you understand:

 

We will collect and use your information in accordance with the privacy policy, but we will not collect personal information in a mandatory bundle just because you agree to this privacy policy.

When you use or turn on related functions or use services, we will collect and use relevant information in order to realize the functions and services necessary. Unless it is necessary for the realization of basic business functions or in accordance with the requirements of laws and regulations, you can refuse to provide without affecting other functions or services. We will explain what is necessary information item by item in the privacy policy.

If you are not logged in to your account, we will use the identifier information corresponding to the device to ensure the basic functions of information push. If you log in to your account, we will push information based on your account information.

Camera and photo album permissions will not be turned on by default. They will only be used for specific functions or services with your express authorization. You can also withdraw authorization. In particular, we need to point out that even if we have obtained these sensitive permissions with your authorization, we will not collect your information when the relevant functions or services are not needed. Explanation of the permission application and use of this service

This privacy policy applies to your application through the service (including different versions such as the speed version), the official website of the service, the software development kit (SDK) and application programming interface of the service for third-party websites and applications ( API) to access and use our products and services.

 

 

The following will help you understand in detail how we collect, use, store, transfer, share, transfer (if applicable) and protect personal information; help you understand the ways to query, access, delete, correct, and withdraw authorized personal information. Among them, the important content of the clauses related to your personal information rights and interests has been reminded in bold form, please pay special attention.

 

1. How we collect and use personal information

2. How do we use similar technologies such as cookies

3. How do we share, transfer, and publicly disclose personal information

4. How do we store personal information

5. How do we protect the security of personal information

6. Manage your personal information

7. Minor Clause

8. Revision and notice of privacy policy

9. Contact us

 

 

1. How we collect and use personal information

 

We will collect information that you proactively provide when you use the service in the following ways, and collect information generated during your use of the function or the process of receiving the service through automated means:

 

1.1 Registration, login, authentication

 

1.1.1 Register and log in to your account

 

a. When you register and log in to this service and related services, you can create an account through your mobile phone number, and you can complete the relevant network identification information (avatar, nickname, password). This information is collected to help you complete the registration.

 

b. You can also use a third-party account to log in and use this service. You will authorize us to obtain your public information (avatar, nickname, and other information authorized by you) registered on the third-party platform for binding to this service account. Allows you to log in directly and use this product and related services. When using a third-party account to log in, you may need to write and read the information necessary for the login in the clipboard. This information is only used for login-related purposes and will not collect your private information.

 

c. Log in to a third-party account: When you use this service account to log in to a third-party account, with your consent, we may share your nickname, avatar, and other information authorized by you.

 

d. Based on our cooperation with communication operators, when you use the "one-click login" function of this service, with your express consent, the operator will send us your mobile phone number so that we can provide you with fast login service . The mobile phone number is personal sensitive information. If you refuse to provide it, you will not be able to use the "one-click login" method to register and log in to this service, but it will not affect your registration and login through other methods, nor will it affect the normal use of other functions.

 

1.1.2 Certification

 

When you use the identity authentication function or related services, according to relevant laws and regulations, you may need to provide your real identity information (real name, ID number, phone number, etc.) to complete the real name verification. Some of the information is personally sensitive and you can refuse to provide it. If you refuse to provide it, you may not be able to obtain related services, but it will not affect the normal use of other functions and services.

 

1.2 Picture upload

 

a. When you upload audio and pictures, we will collect the information you posted.

 

b. When you use the function of uploading pictures, we will ask you to authorize the camera and photo permissions. If you refuse to provide authorization, you will not be able to use this function, but it will not affect your normal use of other functions of the service.

 

c. In order to provide you with the face sticker function, we may also use part of the facial feature value information only for this function on the client side to provide better visual effects. In this process, unless otherwise clearly stated and signed With your consent, we will not return, store or share any of your facial feature value information.

 

 

1.3 Operation and safe operation

 

1.3.1 Operation and safety assurance

We are committed to providing you with a safe and reliable product and use environment, and providing high-quality and reliable services and information is our core goal.

 

1.3.2 Device information and log information

a. In order to ensure the safe operation of software and services, the quality and efficiency of operations, we will collect your hardware model, operating system version number, international mobile device identification code, unique device identifier, network device hardware address, IP address, WLAN Access point, Bluetooth, base station, software version number, network access method, type, status, network quality data, operation, usage, service log.

 

b. In order to prevent malicious programs and ensure operational quality and efficiency, we will collect installed application information or running process information, the overall operation of the application, usage and frequency, application crashes, overall installation usage, performance data, Application source.

 

c. We may use your account information, device information, service log information, and information that our affiliates and partners can share with your authorization or legally to determine account security, perform identity verification, detect and prevent security incidents.

 

 

1.4 Statistical analysis

In order to analyze statistical indicators such as application addition, activation, retention, performance, etc., we may call the clipboard to perform attribution analysis on relevant statistical information. Please rest assured that we will not collect your private information.

 

1.5 Changes to the purpose of collecting and using personal information

Please understand that with the development of our business, the functions of this service and the services provided may be adjusted and changed. In principle, when a new function or service is related to the function or service we currently provide, the personal information collected and used will be directly or reasonably related to the original processing purpose. In scenarios that are not directly or reasonably related to the original processing purpose, we will collect and use your personal information, and we will notify you again and obtain your consent.

 

1.6 The collection and use of personal information exempted from consent in accordance with the law

Please understand that in the following situations, in accordance with laws, regulations and relevant national standards, we do not need your authorization to collect and use your personal information:

 

a. Directly related to national security and national defense security;

b. Directly related to public safety, public health, and major public interests;

c. Directly related to criminal investigation, prosecution, trial and execution of judgments;

d. In order to protect the life, property and other major legal rights of the personal information subject or other individuals, but it is difficult to obtain the consent of the person;

e. Your personal information collected is disclosed to the public by yourself;

f. Collect your personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels;

g. Necessary for signing or performing a contract according to your requirements;

h. Necessary for maintaining the safe and stable operation of software and related services, such as discovering and handling faults in software and related services;

i. Necessary for legal news reports;

j. When academic research institutions conduct statistical or academic research based on public interest, and when they provide academic research or description results to the outside, they de-identify the personal information contained in the results;

k. Other circumstances stipulated by laws and regulations.

 

You are especially reminded that if the information cannot identify your personal identity alone or in combination with other information, it does not belong to your personal information in the legal sense; when your information can identify your personal identity alone or in combination with other information, or we When data that cannot be linked with any specific personal information is used in combination with other personal information of you, this information will be treated and protected as your personal information in accordance with this privacy policy during the combined use period.

 

2. How do we use similar technologies such as cookies

 

Similar technologies such as cookies and device information identification are commonly used technologies on the Internet. When you use this service and related services, we may use related technologies to send one or more cookies or anonymous identifiers to your device to collect and identify information when you visit and use this product. We promise that we will not use cookies for any purpose other than those described in this privacy policy. We use cookies and similar technologies to achieve the following functions or services:

 

2.1 Ensure the safe and efficient operation of products and services

 

We may set cookies or anonymous identifiers for authentication and security, so that we can confirm whether you log in to the service safely, or whether you have encountered embezzlement, fraud, or other illegal acts. These technologies will also help us improve the efficiency of our services and increase the speed of login and response.

 

2.2 Help you get a more relaxed access experience

 

Using this type of technology can help you avoid repeating the steps and processes of filling in your personal information and entering search content (examples: record search, form filling).

 

2.3 Recommend, display, and push content or accounts that may be of interest to you

 

a. We may use this type of technology to understand your preferences and usage habits, conduct data analysis to improve products and services, recommend information or features that users are interested in, and optimize your advertising choices.

 

b. On the sharing page of this service, we may use cookies to record browsing activities for recommending information to you, troubleshooting related exceptions related to crashes and delays, and exploring better service methods.

 

 

 

2.4 Clearing of Cookies

 

Most browsers provide users with the function of clearing the browser cache data. You can perform the corresponding data clearing operation in the browser settings function. If you clear it, you may not be able to use the services or corresponding functions provided by us that rely on cookies.

 

 

3. How do we share, transfer, and publicly disclose personal information

 

3.1 Sharing

 

3.1.1 Sharing principle

 

a. Authorization and consent principle: Without your consent, we will not share your personal information, unless the shared personal information is de-identified information, and the shared third party cannot re-identify the natural person subject of such information. If the third party uses the information for a purpose beyond the scope of the original authorization and consent, they need to obtain your consent again.

 

b. The principle of legality and minimum necessity: The shared data must have a legitimate and legitimate purpose, and the shared data is limited to the extent necessary to achieve the purpose.

 

c. The principle of security prudence: We will carefully evaluate the purpose of the third party's use of shared information, conduct a comprehensive assessment of the security capabilities of these partners, and require them to abide by the cooperation legal agreement. We will conduct strict security monitoring on the software tool development kit (SDK) and application program interface (API) used by the partners to obtain information to protect data security.

 

d. Mini Programs: When you use Mini Programs, we will not share your personal information with these developers and operators without your consent. When you use the Mini Program, the Mini Program may use the relevant system permissions authorized by you, and you can withdraw the authorization in the Mini Program.

 

e. Payment function: The payment function is provided to you by a third-party payment institution that cooperates with us. Third-party payment institutions may need to collect your name, bank card type and card number, expiration date and mobile phone number. Bank card number, expiration date and mobile phone number are sensitive personal information. These information are necessary for the payment function. Refusal to provide this information will cause you to be unable to use this function, but will not affect the normal use of other functions.

 

f. Order function: When you use the order center function of this service, after your authorization, we may share your order information with the relevant service provider who placed the order to facilitate your unified query of order information.

 

 

3.1.2 Realize the shared information related to advertising

 

a. Advertising push and delivery: We may share information with partners for promotion and advertising, but we will not share the information (name, ID number) used to identify your personal identity, and will only provide these partners with Indirect portrait tags that identify your personal identity and de-identified device information or anonymized device, network, channel and other information to help them increase the effective reach of ads without identifying your personal identity.

 

b. Advertising statistics: We may share and analyze de-identified device information or statistical information with service providers, suppliers and other partners of the business, which are difficult or impossible to associate with your true identity. This information will help us analyze and measure the effectiveness of advertising and related services.

 

3.1.3 Realization of shared information for security and analysis and statistics

 

a. Safe use: We attach great importance to account, service and content security. In order to protect your and other users’ account and property security, and to protect your and our legitimate rights and interests from illegal infringement, we and our affiliates or service providers may The necessary equipment, account and log information will be shared.

 

b. Analyze product usage: In order to analyze the usage of our services and improve user experience, we may share statistical data on product usage (crash, flashback) with related parties or third parties, which are difficult to compare with other information Combined to identify your personal identity.

 

c. Academic research and scientific research: In order to improve scientific research capabilities in related fields and promote the level of scientific and technological development, we may share de-identification or anonymization with scientific research institutes, universities and other institutions under the premise of ensuring data security and proper purpose. data.

 

3.1.4 Help you participate in marketing promotion activities

 

When you choose to participate in relevant marketing activities organized by us and our affiliates or third parties, you may be required to provide your name, mailing address, contact information, bank account number and other information. Some of the information is personal sensitive information. Refusal to provide may affect your participation in related activities, but will not affect other functions. Only with your consent, we will share this information with related parties or third parties to ensure that you receive a consistent service experience in joint activities, or entrust a third party to cash out rewards to you in a timely manner.

 

 

3.2 Assignment

 

a. We will not transfer your personal information to any other third parties unless you have your explicit consent.

 

b. With the continuous development of our business, we may carry out mergers, acquisitions, and asset transfers, and your personal information may be transferred as a result. In the event of the aforementioned changes, we will require the successor to protect your personal information in accordance with laws and regulations and the security standards not lower than this privacy policy, otherwise we will require the successor to obtain your authorization and consent again.

 

 

3.3 Public display

 

a. We will not publicly disclose your information unless you follow national laws and regulations or obtain your consent. When we publicly disclose your personal information, we will adopt security protection measures that comply with industry standards.

 

b. We will disclose the relevant account information when we make announcements on penalties for illegal accounts and fraudulent acts.

 

c. After you authorize the game or mini program, the avatars and nicknames of you and your friends will be displayed in the ranking and related functions.

 

 

3.4 Personal information that is legally exempt from consent to share, transfer, and publicly disclose personal information

 

Please understand that in the following situations, in accordance with laws, regulations and national standards, we do not need your authorization to share, transfer, and publicly disclose your personal information:

 

a. Directly related to national security and national defense security;

b. Directly related to public safety, public health, and major public interests;

c. Directly related to criminal investigation, prosecution, trial and execution of judgments;

d. In order to protect your or other individuals' life, property and other major legal rights and interests, but it is difficult to obtain the consent of the person;

e. Your personal information disclosed to the public on your own;

f. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

 

 

4. How do we store personal information

 

4.1 Storage location

 

In accordance with the provisions of laws and regulations, we store your personal information collected and generated in the course of domestic operations in the territory of the People's Republic of China. At present, we will not transfer the above-mentioned information overseas. If we transfer overseas, we will follow relevant national regulations or seek your consent.

 

4.2 Storage period

 

We only retain your personal information for the period necessary to provide this service and the purpose of the service. We will retain relevant information during the period when you have not withdrawn, deleted, or cancelled your account. After the necessary period, we will delete your personal information, except as otherwise provided by laws and regulations.

 

 

5. How do we protect the security of personal information

 

a. We attach great importance to the security of your personal information and will strive to take reasonable security measures (including technical and management aspects) to protect your personal information and prevent the personal information you provide from being used improperly or under unauthorized circumstances Be accessed, publicly disclosed, used, modified, damaged, lost or leaked.

 

b. We will use encryption technology, anonymization processing and related reasonable and feasible means that are no less than that of industry peers to protect your personal information, and use security protection mechanisms to prevent your personal information from being maliciously attacked.

 

c. We will establish a special security department, security management system, and data security process to ensure the security of your personal information. We adopt a strict data use and access system to ensure that only authorized personnel can access your personal information, and conduct security audits on data and technology in a timely manner.

 

d. Although the above reasonable and effective measures have been taken and the standards required by relevant laws and regulations have been complied with, please understand that due to technical limitations and various malicious methods that may exist, in the Internet industry, even if you do your best to strengthen security Measures, it is impossible to always guarantee the 100% security of the information. We will try our best to ensure the security of the personal information you provide to us.

 

e. You know and understand that the system and communication network used by you to access our services may have problems due to factors beyond our control. Therefore, we strongly recommend that you take active measures to protect the security of personal information, including but not limited to using complex passwords, regularly changing passwords, and not disclosing your account password and related personal information to others.

 

f. We will formulate emergency response plans, and immediately activate emergency plans when user information security incidents occur, and strive to prevent the impact and consequences of these security incidents from expanding. Once a user information security incident (leakage, loss) occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and you can take precautions on your own And suggestions to reduce risks, and remedial measures for you. We will promptly inform you of the relevant situation of the event through push notifications, emails, letters, short messages and related forms. When it is difficult to inform you one by one, we will adopt a reasonable and effective way to issue an announcement. At the same time, we will also report the handling of user information security incidents in accordance with the requirements of relevant regulatory authorities.

 

g. Once you leave this service and related services, browse or use other websites, services and content resources, we will not have the ability and direct obligation to protect any personal information you submit in software and websites other than this service and related services, regardless of Whether you log in, browse or use the above software or website is based on the link or guidance of this service.

 

 

6. Manage your personal information

 

We attach great importance to the management of your personal information, and do our best to protect your personal information inquiries, access, modification, deletion, withdrawal of consent and authorization, account cancellation, complaints and reports, and related rights to set privacy functions, so as to enable you Protect your privacy and information security.

 

 

7. Minor Clause

 

a. If you are a minor under the age of 18, before using this service and related services, you should read and agree to this privacy policy under the supervision and guidance of your parents or other guardians.

 

b. We protect the personal information of minors in accordance with relevant national laws and regulations, and will only collect, use, share or disclose minors when permitted by law, parents or other guardians expressly consent, or necessary to protect minors If we find that we have collected personal information of minors without the prior consent of verifiable parents or other guardians, we will try to delete the relevant information as soon as possible.

 

c. If you are the guardian of a minor, when you have any questions about the personal information of the minor you are guarding, please contact us through the contact information published on the official website of this service.

 

 

 

8. Revision and notice of privacy policy

 

a. In order to provide you with better services, this service and related services will be updated and changed from time to time. We will revise this privacy policy in due course. These revisions form part of this privacy policy and have the same effect as this privacy policy. With your explicit consent, we will not reduce your rights under this privacy policy currently in effect.

 

b. After this privacy policy is updated, we will remind you of the updated content through the official website (http://hiliphoto.com and http://aiphoto.fun) announcement or other appropriate means, so that you can keep abreast of the latest version of this privacy policy.

 

 

9. Contact us

 

If you have complaints, suggestions, or questions about the protection of personal information, you can send the problem to the email address provided on the official website of this service.

 

We will review the issue as soon as possible and reply within fifteen working days after verifying your user identity.

 

PriceAPI
3 photo = ¥49.8Expiry:one yearPrioritize:YESSize:6000pxOld repair:YESBatch:NOWechatRebate
10 photos = ¥150Expiry:one yearPrioritize:YESSize:6000pxOld repair:YESBatch:YESWechatRebate
50 photos = ¥400Expiry:one yearPrioritize:YESSize:6000pxOld repair:YESBatch:YESWechatRebate
200 photos = ¥1000Expiry:one yearPrioritize:YESSize:6000pxOld repair:YESBatch:YESWechatRebate
For lower prices, please join the QQ group (623946846) for consultation
准备
1、线下付款,获取可上传图片次数
2、申请请求接口所需的third_code和secret_key
3、根据接口文档,接入服务
说明
1、按照图片上传次数扣费,上传失败不扣费
2、获取到的secret_key请妥善保管,不可外传
3、所有修复成功的图片本站将保留1小时后自动删除,如需持久化存储请下载至自有系统
接口说明
1、请求地址: http://sdkphoto.fangtangtv.com
2、code=200固定为成功,code=9000固定为失败
3、code=9000时,如需进一步业务判断,可根据errno参数
1、图片上传接口
URL /api/third/uploads
Method POST
Header token: 加密生成的token,加密规则见附1
Params
field	type	required	commit
third_code	string	Y	线下申请的第三方标识third_code
seq	string	Y	任务参数, 多值以英文逗号连接, 可选参数: repair, colour, sr, bg, scratch, defogging
type	string	N	图像类型, 默认 people, 可选参数: people, cortoon, landscape, portrait, text
file	file	Y	图像文件, 可传多次
rate	int	N	超分倍数, 默认 0, 可选参数: 2, 4, 8
rgb	string	N	底色值, bg in seq 时必传, 可选参数: -1, 1, 235,51,35(红), 85,142,213(蓝), 255,255,255(白)
dpi	int	N	分辨率, 300DPI则传300
platform	string	Y	平台, 可选参数: pc, h5, mp, ios, baidu, zijie, douyin, alipay
clientip	string	N	客户端IP
mdf	string	N	再次处理, 必传, 可传多次
Curl
curl --location --request POST 'http://sdkphoto.fangtangtv.com/api/third/uploads' --header 'token: xxx' --form 'third_code="test"' --form 'seq="bg"' --form 'file=@"/VSCode/image/3c6b4b786c1159441a94e3508c36508b.png"' --form 'rgb="1"' --form 'platform="pc"'
Response
field	commit
img_url	上传图片的url
mdf	图片的唯一标识
{
    "code": 200,
    "data": {
        "mdf": [
	"40b37f58db153e5149f008421797714e"
	]
	}
}
失败时(errno说明)
errno	commit
9999	请求参数token不合法
9101	剩余下载次数为0
9001	传入参数错误
9005	文件上传类型不支持
9006	上传失败
9009	图片异常,处理失败
{
    "code": 9000,
    "errno": 9005,
    "msg": "文件上传类型不支持"
}
2、图片修复状态查询
URL /api/third/status
Method POST
Header token: 加密生成的token,加密规则见附1
Params
field	type	required	commit
third_code	string	Y	线下申请的第三方标识third_code
mdf	string	Y	文件唯一标识
platform	string	Y	平台, 可选参数: pc, h5, mp, ios, baidu, zijie, douyin, alipay
Curl
curl --location --request POST 'http://sdkphoto.fangtangtv.com/api/third/status' --header 'token: xxx' --form 'third_code="test"' --form 'mdf="9804b4cb5b4740fb26afde5f2831c0f5"' --form 'platform="pc"'
Response(正常时)
{
	"code": 200,
	"data": {
	"msg": "获取任务状态成功",
	"status": 200
	"mdfs": [
	{
		"mdf":"9804b4cb5b4740fb26afde5f2831c0f5",
		"state": "任务处理完成",
		"src_url": "",
		"wmk_url":"",
		"icon_url": "",
		"res_size": "1080x1366px 146KB"
	}
	]
}
	}
Response(失败时)errno说明
errno	commit
9002	图片不存在
500	其他错误
{
    "code": 9000,
    "errno": 9002,
    "msg": "图片不存在,请确认图片是否上传成功"
}
3、图片下载
URL /api/third/download
Method POST
Header token: 加密生成的token,加密规则见附1
Params
field	type	required	commit
third_code	string	Y	线下申请的第三方标识third_code
mdf	string	Y	文件唯一标识
Curl
curl --location --request POST 'http://sdkphoto.fangtangtv.com/api/third/download' --header 'token: xxx' --form 'third_code="test"' --form 'mdf="9804b4cb5b4740fb26afde5f2831c0f5"'
Response(正常时)
field	commit
url	图片下载地址
{
	"code": 200,
	"data": {
	"url": "https://sdkphoto.fangtangtv.com/api/third/download/40b37f58db153e5149f008421797714e01100.jpg"
	}
}
Response(失败时)errno说明
errno	commit
9002	图片不存在
500	其他错误
{
    "code": 9000,
    "errno": 9002,
    "msg": "数据已失效,请重新上传"
}
4、剩余上传次数查询
URL /api/third/company/nums
Method POST
Header token: 加密生成的token,加密规则见附1
Params
field	type	required	commit
third_code	string	Y	线下申请的第三方标识third_code
Curl
curl --location --request POST 'XXXXX/api/third/company/nums' \
--header 'token: XXXXX' \
--form 'third_code="XXXXX"'
Response(正常时)
field	commit
code	第三方标识third_code
nums	剩余上传次数
{
    "code": 200,
    "data": {
        "code": "hiliad",
        "nums": 98
    }
}
Response(失败时)errno说明
errno	commit
9002	数据未找到
500	其他错误
{
    "code": 9000,
    "errno": 9002,
    "msg": "数据未找到"
}
附1、token生成规则
1、拿到服务方提供的secret_key,再生成一个当前时间戳time
    secret_key = 'hiliad'
    time = '1629962357'
2、secret_key + time,两字符串拼接,再md5,得到参数mds
    mds = hashlib.md5((secret_key + time).encode("utf8")).hexdigest()
    mds = '5484490c8e797dabe52af90ab8bd1e50'
3、最终的token等于 mds + ',' + time
    token = '5484490c8e797dabe52af90ab8bd1e50,1629962357'

注:生成的时间戳会在2分钟后失效,请每次请求接口都重新生成时间戳
Scan the QR code on WeChat to download HD images without watermarkPackage purchase