CN103425915A - Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device - Google Patents

Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device Download PDF

Info

Publication number
CN103425915A
CN103425915A CN2012101670938A CN201210167093A CN103425915A CN 103425915 A CN103425915 A CN 103425915A CN 2012101670938 A CN2012101670938 A CN 2012101670938A CN 201210167093 A CN201210167093 A CN 201210167093A CN 103425915 A CN103425915 A CN 103425915A
Authority
CN
China
Prior art keywords
user
biological information
users
electronic equipment
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101670938A
Other languages
Chinese (zh)
Other versions
CN103425915B (en
Inventor
郝大成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hanwang Technology Co Ltd
Original Assignee
Hanwang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hanwang Technology Co Ltd filed Critical Hanwang Technology Co Ltd
Priority to CN201210167093.8A priority Critical patent/CN103425915B/en
Publication of CN103425915A publication Critical patent/CN103425915A/en
Application granted granted Critical
Publication of CN103425915B publication Critical patent/CN103425915B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a method and device for identifying whether unauthorized users read display content of an electronic device or not and the electronic device. The method comprises collecting biological characteristic information of all users in the detecting area according to a preset time interval, wherein the display content of the electronic device can be observed in the detecting area; comparing the collected biological characteristic information of the users with pre-stored biological characteristic information of authorized users; determining whether biological characteristic information of the unauthorized users exists in the collected biological characteristic information of the users. According to the method for identifying whether the unauthorized users read the display content of the electronic device or not, the biological characteristic information of the legitimate users of the electronic device is pre-stored and the legitimate users become the authorized users and the biological characteristic information of the users is detected in the operation process of the electronic device periodically and accordingly the unauthorized users can be identified out, corresponding measures are taken according to an identification result to avoid information leakage.

Description

The identification unauthorized user is read method, device and the electronic equipment of display content of electronic equipment
Technical field
The present invention relates to the application software process field, particularly a kind of method and apparatus of identifying unauthorized user reading display content of electronic equipment.
Background technology
Along with developing rapidly of computer technology, various electronic equipment that shows reading content has appearred, as electronic equipments such as computing machine, mobile phone, electronic readers, all can show the content that the user need to read.The content shown on electronic equipment, may relate to secretly, and the user does not wish that these contents are seen by other people.But on the one hand, the user in time away from keyboard, the display screen that may someone will to take advantage of the occasion near electronic equipment is to spy on the content of demonstration it on; On the other hand, even the user does not leave, still, when having the people silently to be peeped near display screen, the user may be negligent of discovering because of too being absorbed in, thereby causes the leakage of information.
In prior art, for fear of this problem, the user can only close electronic reader when away from keyboard usually, reopens afterwards again, but so repeatedly close, opens and can bring inconvenience to the user.In addition, when too being absorbed in, the user can't effectively avoid other people behavior of peeping at all.
As can be seen here, current electronic equipment can't prevent that other people from spying on screen content, easily causes the leakage of demonstration information.
Summary of the invention
The invention provides a kind of method and apparatus that unauthorized user is read display content of electronic equipment of identifying, in order to solve electronic equipment of the prior art, can't prevent that other people from spying on screen content, easily causes the problem of the leakage of demonstration information.
A kind of method of identifying unauthorized user reading display content of electronic equipment comprises:
According to the biological information of all users in acquisition testing zone, Preset Time interval, wherein, described surveyed area is for observing the zone of display content of electronic equipment;
The biological information of all users' of gathering biological information and pre-stored authorized user is compared;
Determine the biological information that whether has unauthorized user in all users' the biological information of described collection.
A kind of device of identifying unauthorized user reading display content of electronic equipment comprises:
Collecting unit, for the biological information according to all users in acquisition testing zone, Preset Time interval, wherein, described surveyed area is for observing the zone of display content of electronic equipment;
Comparing unit, compare for the biological information of the biological information of all users by gathering and pre-stored authorized user;
Whether determining unit, exist the biological information of unauthorized user for all users' of determining described collection biological information.
A kind of electronic equipment, be provided with camera head, and comprise the device that above-mentioned identification unauthorized user is read display content of electronic equipment.
By adopting the method in the present embodiment, pre-stored its biological information of the legal user of electronic equipment, thereby become authorized user, regularly or in real time detect user's biological information in the operational process of electronic equipment, thereby can identify unauthorized user, take corresponding counter-measure according to recognition result, thereby avoid leakage of information.
The accompanying drawing explanation
The identification unauthorized user that Fig. 1 provides for the embodiment of the present invention is read the method flow diagram of display content of electronic equipment;
Fig. 2 detects the schematic diagram of user's face image information in the embodiment of the present invention;
The schematic diagram that Fig. 3 is information in the embodiment of the present invention;
The identification unauthorized user that Fig. 4 provides for the embodiment of the present invention is read the structure drawing of device of display content of electronic equipment.
Embodiment
The embodiment of the present invention provides a kind of method and apparatus that unauthorized user is read display content of electronic equipment of identifying, and can solve electronic equipment of the prior art and can't prevent that other people from spying on screen content, easily causes the problem that shows leakage of information.
The embodiment of the present invention provides a kind of method that unauthorized user is read display content of electronic equipment of identifying, and as shown in Figure 1, comprises the following steps:
S101: according to the biological information of all users in acquisition testing zone, Preset Time interval, wherein, described surveyed area is for observing the zone of display content of electronic equipment.
S102: the biological information of all users' of gathering biological information and pre-stored authorized user is compared.
S103: determine the biological information that whether has unauthorized user in all users' the biological information of described collection.
Wherein, while in the biological information of determining the described all users that obtain, having the biological information of unauthorized user, can further judge the biological information that whether has authorized user in the described all users' that obtain biological information, when having the biological information of authorized user, show the information that has unauthorized user; When not having the biological information of authorized user, close the displaying contents of electronic equipment.
Perhaps, while in the biological information of determining the described all users that obtain, having the biological information of unauthorized user, also can close the displaying contents of electronic equipment, and to the message of user's display requirement input validation information, after the correct authorization information that receives user's input, show the displaying contents of electronic equipment.
In addition, while in the biological information of determining the described all users that obtain, not having the biological information of unauthorized user, can further judge the biological information that whether has authorized user in the described all users' that obtain biological information, when not having the biological information of authorized user, close the displaying contents of electronic equipment, and to the message of user's display requirement input validation information, after the correct authorization information that receives user's input, show the displaying contents of electronic equipment.
Preferably, the method also comprises: opening in display content of electronic equipment, selecting to start the function of the user biological characteristic information in acquisition testing zone.
By adopting the method in the present embodiment, pre-stored its biological information of the legal user of electronic equipment, thereby become authorized user, regularly detect user's biological information in the operational process of electronic equipment, thereby can identify unauthorized user, take corresponding counter-measure according to recognition result, thereby avoid leakage of information.
Below with a preferred embodiment, describe in detail the method that identification unauthorized user provided by the invention is read display content of electronic equipment.In this preferred embodiment, the biological information behaviour face identifying information of take describes as example, but, those skilled in the art should understand that, other biological information, also can be for the identification of authorized user such as iris information etc., in a word, so long as biological information that can unique definite user identity can be used.
The method that this identification unauthorized user is read display content of electronic equipment mainly comprises the following steps:
Step 1, open electronic equipment, and the face image information of pre-stored authorized user.
In this step, the main initial setting up realized for electronic equipment, so that this electronic equipment can be applied the method that identification unauthorized user provided by the invention is read.At first, the legal user of electronic equipment is by selecting the modes such as corresponding drop-down menu to enter the state of " validated user is set ", then, built-in or the external camera head of electronic equipment is aimed to by face, by camera head, legal user's face is taken pictures, gather and store this legal user's face image information, as the face image information of authorized user.Wherein, when this electronic equipment, during only for a user, set authorized user is only one; When this electronic equipment is a plurality of users while jointly using, set authorized user can be a plurality of.
Step 2, in the operational process of electronic equipment, according to the face image information of all users in Preset Time interval acquiring surveyed area.
Set the relevant information of authorized user by step 1 after, when this electronic equipment enters running status, camera head can regularly obtain according to the Preset Time interval all users' that appear in surveyed area face image information.In order effectively to prevent that other people from peeping, can set in advance the shooting angle of camera head, the surveyed area that it is photographed is just consistent with the zone that can observe display content of electronic equipment, once have the people to enter this surveyed area can be taken lower face image information by the shooting device, can adopt any camera technique that comprises infrared photography during shooting.Particularly, if surveyed area arranges too smallly, when having the people to peep aside, can't find; If surveyed area arranges too much, can because at a distance some incoherent people occurring, the operation of execution error cause interference to the user, therefore, the size of surveyed area should rationally arrange.
Preferably, the camera head in this step can open or cut out according to user's needs.For example, when the user reads the document of certain need to be keep secret, can open camera head, make camera head in running status, peep preventing; When the user reads the document of some not needs to be keep secret, can close camera head, thereby save power consumption.
Figure 2 shows that example, when electronic equipment 21 is moving, 22 pairs of surveyed areas 23 of camera head are detected, and all users that appear in surveyed area 23 will be detected and record face image information by shooting device 22.Surveyed area 23 can be observed the zone of the displaying contents of electronic equipment exactly.In the situation shown in Fig. 2, interior authorized user 24 and the unauthorized user 25 of simultaneously having occurred of surveyed area 23, therefore, the face image information of authorized user 24 and unauthorized user 25 all can be recorded by shooting device 22.
In addition, in order to find more in time the person of peeping, can the time interval when obtaining face image information arrange enough littlely, to reach the effect of Real-Time Monitoring.
Step 3, the face image information of the authorized user stored in the face image information of all users in the surveyed area obtained and step 1 is compared.
Particularly, when comparison, can determine that whether face image information is consistent by recognition of face software.While in surveyed area, a plurality of user being detected, a plurality of users' face image information need to be compared with the face image information of authorized user one by one.In addition, while in step 1, having stored a plurality of authorized user, also need the user in surveyed area is compared one by one with a plurality of authorized users respectively, can not occur omitting, in order to avoid cause erroneous judgement.In addition, if after opening camera function, judged and had an authorized user, at this moment, monitored again other people people's face information if follow-up, other people people's face information that also can only will follow-uply monitor is compared with the authorized user face image information of storage, and does not need the authorized user to having judged again to compare, thereby complexity is monitored in reduction.
The situation shown in Fig. 2 of still take describes as example, in this step, by comparison, finds that the face image information of the authorized user 24 that detects is consistent with the face image information of the authorized user of storage, therefore determines that the user is authorized user; The face image information of the face image information of discovery unauthorized user 25 and the authorized user of storage is inconsistent, therefore determines that the user is unauthorized user.
Step 4, there is the face image information of unauthorized user in the face image information of determining the described all users that obtain, or determine in the described all users' that obtain face image information while not having the face image information of authorized user, carry out default operation, to prevent leakage of information.
Wherein, in this step, as long as find that testing result has occurred extremely, just need to carry out the operation that prevents leakage of information., according to different mode classifications, abnormal conditions can be divided into to two kinds of situations here, the first situation is: the face image information that unauthorized user detected in step 3.The second situation is: the face image information that any authorized user do not detected in step 3.During subsequent treatment, can only according to the first situation, be processed separately, also can only be processed separately according to the second situation, or, also both of these case can be combined and processed.In a word, as long as can reach the purpose that prevents leakage of information.
Particularly, when being processed for abnormal conditions, can adopt following two kinds of processing modes:
In the first processing mode, can will either way adopt unified processing mode to be processed.For example, can be when the face image information of unauthorized user being detected, perhaps, when the face image information of any authorized user not detected, the content that the temporary close electronic equipment is shown, for example, during by the ocr software browse displays content on electronic equipment, can temporarily exit the ocr software that this electronic equipment is moving at present as the user, or, displaying contents that also can electronic equipment is set to grey, makes its content invisible etc.Simultaneously, can also on screen, eject prompting frame or the message that requires user's input validation information, only after the correct authorization information that receives user's input, just normally show the displaying contents of electronic equipment, if the authorization information mistake of user input or do not input any information, the shown content of electronic equipment will be always in closed condition, thereby avoids showing the leakage of information.Here, authorization information can be the information that authorized user arranges in advance, as password or prompting problem etc.By such mode, once unusual circumstance, no matter be unauthorized user to have been detected, does not still detect authorized user, all close without exception the displaying contents of electronic equipment, require the user to input correct authorization information, thereby thoroughly prevent the leakage of information.In this processing mode, the situation of take in Fig. 2 is example, can at first close the displaying contents of electronic equipment, and require the active user to input correct authorization information, to prevent unauthorized user, sees displaying contents.At this moment, if unauthorized user 25 is not colleague or the friend of authorized user 24, but peep personnel, can be authorized to user 24 and discover in time; And if unauthorized user 25 is colleague or the friend of authorized user 24, electronic equipment can normally move after the authorization information correct in authorized user 24 inputs.
In the second processing mode, while being processed for abnormal conditions, can according to circumstances be processed respectively.For example, when detecting while unauthorized user occurring, further judge whether to have authorized user simultaneously, if there is authorized user simultaneously, can not require user's input validation information, and show the information of " unauthorized user being detected " to the user.Particularly, information can adopt any demonstration the in three kinds of forms shown in Fig. 3, for example, can on screen, show the icon 31 in Fig. 3, this icon can present beat, concavo-convex or change color texts, thereby cause user's attention; Also can on screen, show the prompting frame 32 in Fig. 3, the prompting user has detected unauthorized user, requires the user to indicate whether to continue operation; Can also on screen, show the warning mark 33 in Fig. 3, this warning mark 33 can be dynamic or static pattern or word, to reach prompting user's effect.
During specific implementation, three kinds of prompting modes in Fig. 3 can be used separately also and can be combined with.When receiving the confirmation information that the user sends, for example the user has selected "Yes" in the prompting frame 32 shown in Fig. 3, and electronic equipment continues normal operation; When receive that the user sends deny information the time, as the user has selected "No", or do not receive any operation of user within the default time, electronic equipment is by temporary close, to prevent leakage of information.In addition, when authorized user not detected, no matter at this moment whether there is unauthorized user, all will directly close electronic equipment, to prevent leakage of information.In this processing mode, the situation shown in Fig. 2 of still take describes as example, owing to both there being unauthorized user in Fig. 2, there is again authorized user, therefore, to eject information, prompting user current detection has arrived unauthorized user, for example, eject the prompting frame 32 in Fig. 3, at this moment, if unauthorized user 25 is colleague or the friend of authorized user 24, be that unauthorized user 25 is that authorized user 24 can directly be selected "Yes", thereby continues the normal running electronic equipment in the situation that authorized user 24 is in the know appears at before computer; If unauthorized user 25 is not colleague or the friend of authorized user 24, be that unauthorized user 25 is peeped in the unwitting situation of authorized user 24, authorized user 24 can be selected "No", thereby close electronic equipment, perhaps require unauthorized user 25 to avoid, reach the purpose that prevents leakage of information.In this mode, when having authorized user and unauthorized user, only to the user, send information simultaneously, whether continue operation by the own decision of user, thereby both can prevent the leakage of information, can avoid again the troublesome operation of user's input validation information; When not having authorized user, directly close displaying contents, prevent leakage of information.
Above-mentioned two kinds of processing modes both can be used separately also and can be combined with.For example, also can exist at the same time in the situation of authorized user and unauthorized user, show the information that has unauthorized user to the user; And in the situation that there is not authorized user, closes displaying contents and require input validation information.
In addition, in the present embodiment, can also when unauthorized user being detected, the biological information of unauthorized user be stored separately, so that determine the identity information of unauthorized user in the future.
In the embodiment of the present invention, when unauthorized user being detected, or away from keyboard when authorized user, while can't detect authorized user, can take measures the leakage of the information that prevents.In addition, the method in the present embodiment can be applied to respectively various electronic, as computing machine, electronic reader, PDA etc.
The embodiment of the present invention also provides a kind of device that unauthorized user is read display content of electronic equipment of identifying, and as shown in Figure 4, comprising:
Collecting unit 41, for obtain the biological information of all users in surveyed area according to the Preset Time collection, wherein, described surveyed area is for observing the zone of display content of electronic equipment;
Comparing unit 42, compare for the biological information of the biological information of all users by gathering and pre-stored authorized user;
Whether determining unit 43, exist the biological information of unauthorized user for all users' of determining described collection biological information.
Wherein, while in described determining unit 43 definite described all users' that obtain biological information, having the biological information of unauthorized user, further judge the biological information that whether has authorized user in the described all users' that obtain biological information, when having the biological information of authorized user, show the information that has unauthorized user; When not having the biological information of authorized user, close the displaying contents of electronic equipment.
Perhaps, while in described determining unit 43 definite described all users' that obtain biological information, having the biological information of unauthorized user, close the displaying contents of electronic equipment, and to the message of user's display requirement input validation information, after the correct authorization information that receives user's input, show the displaying contents of electronic equipment.
Preferably, described authorized user is one or more.
By adopting the device in the present embodiment, pre-stored its biological information of the legal user of electronic equipment, thereby become authorized user, regularly detect user's biological information in the operational process of electronic equipment, thereby can identify unauthorized user, take corresponding counter-measure according to recognition result, thereby avoid leakage of information.
The embodiment of the present invention also provides a kind of electronic equipment, is provided with camera head, and comprises the device that above-mentioned identification unauthorized user is read display content of electronic equipment.
This electronic equipment can be the plurality of devices such as computing machine, electronic reader, PDA.
Although it will be understood by those skilled in the art that in above-mentioned explanation, for ease of understanding, the step of method has been adopted to the succession description, it should be pointed out that for the order of above-mentioned steps and do not do strict restriction.
One of ordinary skill in the art will appreciate that all or part of step realized in above-described embodiment method is to come the hardware that instruction is relevant to complete by program, this program can be stored in a computer read/write memory medium, as: ROM/RAM, magnetic disc, CD etc.
Will also be appreciated that the apparatus structure shown in accompanying drawing or embodiment is only schematically, the presentation logic structure.The module wherein shown as separating component may or may not be physically to separate, and the parts that show as module may be or may not be physical modules.
Obviously, those skilled in the art can carry out various changes and modification and not break away from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention also is intended to comprise these changes and modification interior.

Claims (10)

1. identify the method that unauthorized user is read display content of electronic equipment for one kind, it is characterized in that, comprising:
According to the biological information of all users in acquisition testing zone, Preset Time interval, wherein, described surveyed area is for observing the zone of display content of electronic equipment;
The biological information of all users' of gathering biological information and pre-stored authorized user is compared;
Determine the biological information that whether has unauthorized user in all users' the biological information of described collection.
2. the method for claim 1, it is characterized in that, while in the biological information of determining the described all users that obtain, having the biological information of unauthorized user, further judge the biological information that whether has authorized user in the described all users' that obtain biological information, when having the biological information of authorized user, show the information that has unauthorized user; When not having the biological information of authorized user, close the displaying contents of electronic equipment.
3. the method for claim 1, it is characterized in that, while in the biological information of determining the described all users that obtain, having the biological information of unauthorized user, close the displaying contents of electronic equipment, and to the message of user's display requirement input validation information, after the correct authorization information that receives user's input, show the displaying contents of electronic equipment.
4. the method for claim 1, it is characterized in that, while in the biological information of determining the described all users that obtain, not having the biological information of unauthorized user, further judge the biological information that whether has authorized user in the described all users' that obtain biological information, when not having the biological information of authorized user, close the displaying contents of electronic equipment, and to the message of user's display requirement input validation information, after the correct authorization information that receives user's input, show the displaying contents of electronic equipment.
5. the method for claim 1, is characterized in that, the method also comprises, opening in display content of electronic equipment, selects to start the function of the user biological characteristic information in acquisition testing zone.
6. the method for claim 1, is characterized in that, described authorized user is one or more.
7. identify the device that unauthorized user is read display content of electronic equipment for one kind, it is characterized in that, comprising:
Collecting unit, for the biological information according to all users in acquisition testing zone, Preset Time interval, wherein, described surveyed area is for observing the zone of display content of electronic equipment;
Comparing unit, compare for the biological information of the biological information of all users by gathering and pre-stored authorized user;
Whether determining unit, exist the biological information of unauthorized user for all users' of determining described collection biological information.
8. device as claimed in claim 7, it is characterized in that, described determining unit is determined in the described all users' that obtain biological information while having the biological information of unauthorized user, further judge the biological information that whether has authorized user in the described all users' that obtain biological information, when having the biological information of authorized user, show the information that has unauthorized user; When not having the biological information of authorized user, close the displaying contents of electronic equipment.
9. device as claimed in claim 7, it is characterized in that, described determining unit is determined in the described all users' that obtain biological information while having the biological information of unauthorized user, close the displaying contents of electronic equipment, and to the message of user's display requirement input validation information, after the correct authorization information that receives user's input, show the displaying contents of electronic equipment.
10. an electronic equipment, is characterized in that, is provided with camera head, and comprise the device that the arbitrary described identification unauthorized user of claim 7-10 is read display content of electronic equipment.
CN201210167093.8A 2012-05-25 2012-05-25 Identify the unauthorized user read electronic equipment display method of content, device and electronic equipment Active CN103425915B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210167093.8A CN103425915B (en) 2012-05-25 2012-05-25 Identify the unauthorized user read electronic equipment display method of content, device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210167093.8A CN103425915B (en) 2012-05-25 2012-05-25 Identify the unauthorized user read electronic equipment display method of content, device and electronic equipment

Publications (2)

Publication Number Publication Date
CN103425915A true CN103425915A (en) 2013-12-04
CN103425915B CN103425915B (en) 2016-09-21

Family

ID=49650641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210167093.8A Active CN103425915B (en) 2012-05-25 2012-05-25 Identify the unauthorized user read electronic equipment display method of content, device and electronic equipment

Country Status (1)

Country Link
CN (1) CN103425915B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104992096A (en) * 2015-06-30 2015-10-21 广东欧珀移动通信有限公司 Data protection method and mobile terminal
CN105117663A (en) * 2015-09-23 2015-12-02 广东欧珀移动通信有限公司 Encrypted object display method and device for application
CN105184134A (en) * 2015-08-26 2015-12-23 广东欧珀移动通信有限公司 Smart watch based information display method and smart watch
CN105260642A (en) * 2015-10-30 2016-01-20 宁波萨瑞通讯有限公司 Privacy protecting method and mobile terminal
CN105553718A (en) * 2015-12-15 2016-05-04 腾讯科技(深圳)有限公司 Method and device for displaying guidance information
CN105843570A (en) * 2016-03-15 2016-08-10 广州视源电子科技股份有限公司 Display method and apparatus for privacy protection
CN106156567A (en) * 2015-03-23 2016-11-23 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN106713270A (en) * 2016-11-24 2017-05-24 北京康易联技术有限公司 Information verification method and device
CN106960147A (en) * 2017-04-11 2017-07-18 广东小天才科技有限公司 A kind of method for protecting privacy and device, user equipment
WO2017124804A1 (en) * 2016-01-19 2017-07-27 中兴通讯股份有限公司 Terminal control method and apparatus
CN108197507A (en) * 2017-12-30 2018-06-22 刘智 A kind of privacy real-time protection method and system
CN109766732A (en) * 2018-12-14 2019-05-17 同辉同泰科技(天津)有限公司 Display information time slot scrambling and system
WO2019192609A1 (en) * 2018-04-05 2019-10-10 Ningbo Geely Automobile Research & Development Co., Ltd. Security system
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium
CN117336102A (en) * 2023-11-30 2024-01-02 北京冠程科技有限公司 Identity authentication system with multiple verification and authentication method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1834976A (en) * 2005-03-15 2006-09-20 欧姆龙株式会社 Display device, control method thereof, electronic device including display device
CN101625716A (en) * 2008-07-09 2010-01-13 联想(北京)有限公司 Method for preventing peep on computer and computer with method
CN102332075A (en) * 2010-07-12 2012-01-25 英业达股份有限公司 Anti-peeking system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1834976A (en) * 2005-03-15 2006-09-20 欧姆龙株式会社 Display device, control method thereof, electronic device including display device
CN101625716A (en) * 2008-07-09 2010-01-13 联想(北京)有限公司 Method for preventing peep on computer and computer with method
CN102332075A (en) * 2010-07-12 2012-01-25 英业达股份有限公司 Anti-peeking system and method

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106156567A (en) * 2015-03-23 2016-11-23 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN104992096A (en) * 2015-06-30 2015-10-21 广东欧珀移动通信有限公司 Data protection method and mobile terminal
CN104992096B (en) * 2015-06-30 2019-08-13 Oppo广东移动通信有限公司 A kind of data guard method and mobile terminal
CN105184134A (en) * 2015-08-26 2015-12-23 广东欧珀移动通信有限公司 Smart watch based information display method and smart watch
CN105117663B (en) * 2015-09-23 2018-07-06 广东欧珀移动通信有限公司 The encrypted object display methods and device of a kind of application
CN105117663A (en) * 2015-09-23 2015-12-02 广东欧珀移动通信有限公司 Encrypted object display method and device for application
CN105260642A (en) * 2015-10-30 2016-01-20 宁波萨瑞通讯有限公司 Privacy protecting method and mobile terminal
CN105553718A (en) * 2015-12-15 2016-05-04 腾讯科技(深圳)有限公司 Method and device for displaying guidance information
CN105553718B (en) * 2015-12-15 2019-06-25 腾讯科技(深圳)有限公司 Guidance information display methods and device
WO2017124804A1 (en) * 2016-01-19 2017-07-27 中兴通讯股份有限公司 Terminal control method and apparatus
CN105843570A (en) * 2016-03-15 2016-08-10 广州视源电子科技股份有限公司 Display method and apparatus for privacy protection
WO2017157080A1 (en) * 2016-03-15 2017-09-21 广州视源电子科技股份有限公司 Display method and apparatus for privacy protection
CN106713270A (en) * 2016-11-24 2017-05-24 北京康易联技术有限公司 Information verification method and device
CN106960147A (en) * 2017-04-11 2017-07-18 广东小天才科技有限公司 A kind of method for protecting privacy and device, user equipment
CN108197507A (en) * 2017-12-30 2018-06-22 刘智 A kind of privacy real-time protection method and system
WO2019192609A1 (en) * 2018-04-05 2019-10-10 Ningbo Geely Automobile Research & Development Co., Ltd. Security system
CN111989671A (en) * 2018-04-05 2020-11-24 宁波吉利汽车研究开发有限公司 Security system
US11148642B2 (en) 2018-04-05 2021-10-19 Ningbo Geely Automobile Research & Development Co. Security system
CN109766732A (en) * 2018-12-14 2019-05-17 同辉同泰科技(天津)有限公司 Display information time slot scrambling and system
CN112307452A (en) * 2019-08-01 2021-02-02 银河水滴科技(北京)有限公司 Application program operation control method and device and computer readable storage medium
CN117336102A (en) * 2023-11-30 2024-01-02 北京冠程科技有限公司 Identity authentication system with multiple verification and authentication method thereof
CN117336102B (en) * 2023-11-30 2024-03-01 北京冠程科技有限公司 Identity authentication system with multiple verification and authentication method thereof

Also Published As

Publication number Publication date
CN103425915B (en) 2016-09-21

Similar Documents

Publication Publication Date Title
CN103425915A (en) Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device
US11106768B2 (en) Methods and systems for generating history data of system use and replay mode for identifying security events showing data and user bindings
EP2732579B1 (en) Event driven second factor credential authentication
US7774851B2 (en) Methods, systems, and computer program products for protecting information on a user interface based on a viewability of the information
CN105117631B (en) Information processing method and electronic equipment
CN101641671A (en) Information processing apparatus, information processing program, and information processing method
CN104915012B (en) A kind of screen locking method and device of terminal
US9870700B2 (en) Method and device for avoiding false alarms in monitoring systems
CN104376271A (en) System and method for virtual region based access control operations using bim
JP2013065072A (en) Automated transaction apparatus
JP2008269235A (en) Terminal monitoring device
CN106951757A (en) A kind of method and apparatus for operating application program
CN109754345B (en) System and method for conducting secure computer-based test taker assessment
JP2009156948A (en) Display control device, display control method, and display control program
CN106372472A (en) Application operation method and application operation device
KR101961939B1 (en) Apparatus and method for detecting screen recoding in mobile device
CN111177770A (en) Protection method of sensitive information, mobile equipment and storage device
CN109873747A (en) Electronic device and its unlocking method
KR101633490B1 (en) Apparatus and Method for User Interface to Check Details of Sensitive Data Usage on Mobile Device
JP5524250B2 (en) Abnormal behavior detection device, monitoring system, abnormal behavior detection method and program
KR101993057B1 (en) Safe password input device and method using eye movement recognition
CN105868600A (en) Terminal control method and apparatus
US11100215B2 (en) Management of a display of a view of an application on a screen of an electronic data entry device, corresponding method, device and computer program product
WO2018006336A1 (en) Identity card-based response method and system
WO2018006331A1 (en) Method and system for giving alarm by combining identity card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant