CN105956486A - Remote control method and apparatus - Google Patents
Remote control method and apparatus Download PDFInfo
- Publication number
- CN105956486A CN105956486A CN201610282464.5A CN201610282464A CN105956486A CN 105956486 A CN105956486 A CN 105956486A CN 201610282464 A CN201610282464 A CN 201610282464A CN 105956486 A CN105956486 A CN 105956486A
- Authority
- CN
- China
- Prior art keywords
- application
- privacy
- display interface
- page
- interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- User Interface Of Digital Computer (AREA)
- Controls And Circuits For Display Device (AREA)
Abstract
The invention relates to a remote control method and apparatus, and belongs to the technical field of internet. The method is applied to a first terminal. The method comprises the steps of starting an application when a starting instruction for the application is detected for each application in the first terminal in a process of remote control by a second terminal, and judging whether the application is a private application or not; when the application is the private application, hiding a display interface of the application after starting the application to obtain a hided image of the display interface; and displaying the hided image of the display interface. According to the method and apparatus, the privacy leakage of the first terminal can be effectively prevented to ensure privacy security of the first terminal.
Description
Technical field
It relates to Internet technical field, particularly relate to a kind of long-range control method and device.
Background technology
Along with the development of Internet technology, in order to meet user's demand for terminal management, often can lead to
Cross remote control technology and realize the Screen sharing between two or many station terminals and control, wherein, by remotely
The terminal controlled is properly termed as first terminal, and the terminal remotely controlled first terminal is properly termed as second
Terminal.Owing to remote control technology has high priority control characteristic, this high priority control characteristic is embodied in
Second terminal has all permissions being controlled first terminal, so entering first terminal in the second terminal
During row remotely controls, the user of the second terminal is used easily to start in first terminal due to maloperation
Comprise the application of privacy information, and after this application is activated, first terminal can show the display interface of this application,
Thus cause the privacy leakage of first terminal, therefore, need a kind of privacy leakage that can avoid first terminal badly
Long-range control method.
Summary of the invention
For overcoming problem present in correlation technique, the disclosure provides a kind of long-range control method and device.
First aspect according to disclosure embodiment, it is provided that a kind of long-range control method, is applied to first terminal,
Described method includes:
During by the second terminal remote control, for each application in described first terminal, work as inspection
When measuring the enabled instruction for described application, start described application, and judge whether described application is privacy
Application;
When described application is privacy application, after starting described application, the display interface of described application is entered
Row shielding, obtains the masked images of described display interface;
Show the masked images of described display interface.
In conjunction with first aspect, in the first possible implementation of above-mentioned first aspect, described judgement institute
State whether application is privacy application, including:
Judge the first privacy list of storage has stored the most the application identities of described application, described first hidden
Private list is for storing the application identities of privacy application;
When described first privacy list has stored the application identities of described application, determine that described application is hidden
Private application.
In conjunction with the first possible implementation of first aspect, possible at the second of above-mentioned first aspect
In implementation, described method also includes:
For each application in described first terminal, when the first preset instructions for described application being detected
Time, the application identities of described application is stored in described first privacy list.
In conjunction with first aspect, in the third possible implementation of above-mentioned first aspect, described to described
The display interface of application shields, and obtains the masked images of described display interface, including:
All regions in the display interface of described application are shielded, obtains the interface of described display interface
Image;
Described interface image is defined as the masked images of described display interface.
In conjunction with first aspect, in the 4th kind of possible implementation of above-mentioned first aspect, described to described
The display interface of application shields, and obtains the masked images of described display interface, including:
All regions in the display interface of described application are shielded, obtains the interface of described display interface
Image;
Determining the open region in described interface image, the information in described open region is not privacy information;
Release the shielding to described open region, obtain the masked images of described display interface.
In conjunction with the 4th kind of possible implementation of first aspect, possible the 5th kind of above-mentioned first aspect
In implementation, the described open region determined in described interface image, including:
When the first selection instruction for described interface image being detected, select instruction selected by described first
The region selected is defined as open region;Or,
When the second selection instruction for described interface image being detected, appointment region is defined as open district
Territory, described appointment region be in described interface image except described second select instruction selected by region in addition to
Region.
In conjunction with the third possible implementation or the 4th kind of possible implementation of first aspect, upper
State in the 6th kind of possible implementation of first aspect, owning in the described display interface to described application
Region shields, and obtains the interface image of described display interface, including:
Specify image to cover in all regions in described display interface, obtain the interface of described display interface
Image;Or,
The all information designated characters included by described display interface are replaced, and obtain described display interface
Interface image.
In conjunction with arbitrary possible realization side in the 5th kind of possible implementation of first aspect to first aspect
Formula, in the 7th kind of possible implementation of described first aspect, described method also includes:
For each application in described first terminal, after starting described application, when detecting for described
During the idsplay order of function pages of application, it is judged that whether described function pages is the privacy page;
When described function pages is the privacy page, described function pages is shielded, obtain described function
The masked images of the page;
Show the masked images of described function pages.
In conjunction with the 7th kind of possible implementation of first aspect, possible the 8th kind of above-mentioned first aspect
In implementation, described judge whether described function pages is the privacy page, including:
Judge the second privacy list of storage has stored the most the page iden-tity of described function pages, described the
Two privacy lists are for storing the page iden-tity of the privacy page;
When described second privacy list has stored the page iden-tity of described function pages, determine described function
The page is the privacy page.
In conjunction with the 7th kind of possible implementation of first aspect, possible the 9th kind of above-mentioned first aspect
In implementation, described judge whether described function pages is the privacy page, including:
Judge whether described function pages comprises privacy information;
When described function pages comprises privacy information, determine that described function pages is the privacy page.
Second aspect according to disclosure embodiment, it is provided that a kind of remote control, described device includes:
First judge module, for during by the second terminal remote control, in first terminal
Each application, when the enabled instruction for described application being detected, starts described application, and judges described
Whether application is privacy application;
First shroud module, for when described application is privacy application, after starting described application, to institute
The display interface stating application shields, and obtains the masked images of described display interface;
First display module, for showing the masked images of described display interface.
In conjunction with second aspect, in the first possible implementation of above-mentioned second aspect, described first sentences
Disconnected module includes:
First judging unit, has stored answering of described application in the first privacy list judging storage the most
By mark, described first privacy list is for storing the application identities of privacy application;
First determines unit, is used for when having stored the application identities of described application in described first privacy list,
Determine that described application is privacy application.
In conjunction with the first possible implementation of second aspect, possible at the second of above-mentioned second aspect
In implementation, described device also includes:
Memory module, for for each application in described first terminal, when detecting for described application
The first preset instructions time, the application identities of described application is stored in described first privacy list.
In conjunction with second aspect, in the third possible implementation of above-mentioned second aspect, described first screen
Cover module to include:
Screen unit, for shielding all regions in the display interface of described application, obtains described
The interface image of display interface;
Second determines unit, for described interface image is defined as the masked images of described display interface.
In conjunction with second aspect, in the 4th kind of possible implementation of above-mentioned second aspect, described first screen
Cover module to include:
Described screen unit, for shielding all regions in the display interface of described application, obtains
The interface image of described display interface;
3rd determines unit, for determining the open region in described interface image, in described open region
Information is not privacy information;
Lifting unit, for releasing the shielding to described open region, obtains the shielding figure of described display interface
Picture.
In conjunction with the 4th kind of possible implementation of second aspect, possible the 5th kind of above-mentioned second aspect
In implementation, the described 3rd determines that unit includes:
First determines subelement, is used for when the first selection instruction for described interface image being detected, will
Described first selects the region selected by instruction to be defined as open region;Or,
Second determines subelement, is used for when the second selection instruction for described interface image being detected, will
Specifying region to be defined as open region, described appointment region is except described second selects to refer in described interface image
The region outside region selected by order.
In conjunction with the third possible implementation or the 4th kind of possible implementation of second aspect, upper
Stating in the 6th kind of possible implementation of second aspect, described screen unit includes:
Cover subelement, for specifying image to cover in all regions in described display interface, obtain institute
State the interface image of display interface;Or,
Replace subelement, replace for all information designated characters that described display interface is included,
Interface image to described display interface.
In conjunction with arbitrary possible realization side in the 5th kind of possible implementation of second aspect to second aspect
Formula, in the 7th kind of possible implementation of above-mentioned second aspect, described device also includes:
Second judge module, for for each application in described first terminal, after starting described application,
When the idsplay order of the function pages detected for described application, it is judged that whether described function pages is hidden
The private page;
Secondary shielding module, for when described function pages is the privacy page, is carried out described function pages
Shielding, obtains the masked images of described function pages;
Second display module, for showing the masked images of described function pages.
In conjunction with the 7th kind of possible implementation of second aspect, possible the 8th kind of above-mentioned second aspect
In implementation, described second judge module includes:
Second judging unit, has stored described function pages in the second privacy list judging storage the most
Page iden-tity, described second privacy list is for storing the page iden-tity of the privacy page;
4th determines unit, for when the page mark having stored described function pages in described second privacy list
During knowledge, determine that described function pages is the privacy page.
In conjunction with the 7th kind of possible implementation of second aspect, possible the 9th kind of above-mentioned second aspect
In implementation, described second judge module includes:
3rd judging unit, is used for judging whether comprise privacy information in described function pages;
5th determines unit, for when comprising privacy information in described function pages, determines described page function
Face is the privacy page.
The third aspect according to disclosure embodiment, it is provided that a kind of remote control, described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
During by the second terminal remote control, for each application in first terminal, when detecting
During for the enabled instruction of described application, start described application, and judge whether described application is privacy application;
When described application is privacy application, after starting described application, the display interface of described application is entered
Row shielding, obtains the masked images of described display interface;
Show the masked images of described display interface.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: in disclosure embodiment
In, during first terminal is by the second terminal remote control, for each application in first terminal,
When first terminal detects the enabled instruction for this application, start this application, and whether judge this application
Applying for privacy, when this application is privacy application, after starting this application, this can be answered by first terminal
Display interface shield, obtain the masked images of this display interface, and show the screen of this display interface
Cover image.Obtain after this display interface being shielded due to the masked images of this display interface, therefore,
The privacy information that comprises in the application of this privacy can be avoided to be known by the second user, such that it is able to effectively prevent the
The privacy leakage of one terminal, it is ensured that the personal secrets of first terminal.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe,
The disclosure can not be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the present invention
Embodiment, and for explaining the principle of the present invention together with description.
Fig. 1 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment.
Fig. 2 is the flow chart according to the another kind of long-range control method shown in an exemplary embodiment.
Fig. 3 is the schematic diagram according to a kind of first privacy list shown in an exemplary embodiment.
Fig. 4 is the schematic diagram according to a kind of display interface shown in an exemplary embodiment.
Fig. 5 (a) is according to a kind of schematic diagram specifying image shown in an exemplary embodiment.
Fig. 5 (b) is the schematic diagram according to a kind of interface image shown in an exemplary embodiment.
Fig. 6 is the schematic diagram according to the another kind of interface image shown in an exemplary embodiment.
Fig. 7 (a) is the schematic diagram according to another interface image shown in an exemplary embodiment.
Fig. 7 (b) is the schematic diagram of the masked images according to a kind of display interface shown in an exemplary embodiment.
Fig. 8 is the schematic diagram according to a kind of second privacy list shown in an exemplary embodiment.
Fig. 9 is the block diagram according to a kind of remote control shown in an exemplary embodiment.
Figure 10 is the block diagram according to a kind of first judge module shown in an exemplary embodiment.
Figure 11 is the block diagram according to a kind of first shroud module shown in an exemplary embodiment.
Figure 12 is the block diagram according to another kind the first shroud module shown in an exemplary embodiment.
Figure 13 is the block diagram determining unit according to a kind of 3rd shown in an exemplary embodiment.
Figure 14 is the block diagram according to a kind of screen unit shown in an exemplary embodiment.
Figure 15 is the block diagram according to the another kind of remote control shown in an exemplary embodiment.
Figure 16 is the block diagram according to a kind of second judge module shown in an exemplary embodiment.
Figure 17 is the block diagram according to another kind the second judge module shown in an exemplary embodiment.
Figure 18 is the block diagram according to another remote control shown in an exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following retouches
Stating when relating to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.
Embodiment described in following exemplary embodiment does not represent all embodiment party consistent with the present invention
Formula.On the contrary, they only with describe in detail in appended claims, the present invention some in terms of mutually one
The example of the apparatus and method caused.
Before disclosure embodiment is carried out explanation explained in detail, the first applied field to disclosure embodiment
Scape is explained.In order to meet user's demand for terminal management, remote control technology often can be passed through
Realize the Screen sharing between two or many station terminals and control.And due in the second terminal to first terminal
During remotely controlling, the second terminal has all permissions being controlled first terminal, so
The user using the second terminal easily starts in first terminal the application comprising privacy information due to maloperation,
And after this application is activated, first terminal can show the display interface of this application, thus causes first terminal
Privacy leakage, therefore, disclosure embodiment provides a kind of long-range control method, avoids first terminal
Privacy leakage.
Fig. 1 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment, and the method is used
In first terminal.As it is shown in figure 1, the method comprises the following steps.
In a step 101, during by the second terminal remote control, each in first terminal
Application, when the enabled instruction for application being detected, starts application, and judges whether apply is that privacy should
With.
In a step 102, when application is applied for privacy, the display interface after starting application, to application
Shield, obtain the masked images of display interface.
In step 103, the masked images of display interface is shown.
In the disclosed embodiments, during first terminal is by the second terminal remote control, for first
Each application in terminal, when first terminal detects the enabled instruction for this application, starts this application,
And judge whether this application is privacy application, when this application is privacy application, after starting this application, the
The display interface of this application can be shielded by one terminal, obtains the masked images of this display interface, and shows
Show the masked images of this display interface.Owing to the masked images of this display interface is to shield this display interface
Obtain after covering, it can thus be avoided the privacy information comprised in the application of this privacy is known by the second user,
Such that it is able to effectively prevent the privacy leakage of first terminal, it is ensured that the personal secrets of first terminal.
In another embodiment of the disclosure, it is judged that whether application is privacy application, including:
Judging the most to have stored in the first privacy list of storage the application identities of application, the first privacy list is used
Application identities in storage privacy application;
When the first privacy list has stored the application identities of application, determine that application is applied for privacy.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when the first preset instructions for application being detected, should
Application identities store in the first privacy list.
In another embodiment of the disclosure, the display interface of application is shielded, obtains display interface
Masked images, including:
All regions in the display interface of application are shielded, obtains the interface image of display interface;
Interface image is defined as the masked images of display interface.
In another embodiment of the disclosure, the display interface of application is shielded, obtains display interface
Masked images, including:
All regions in the display interface of application are shielded, obtains the interface image of display interface;
Determining the open region in interface image, the information in open region is not privacy information;
Release the shielding to open region, obtain the masked images of display interface.
In another embodiment of the disclosure, determine the open region in interface image, including:
When the first selection instruction for interface image being detected, select the region selected by instruction by first
It is defined as open region;Or,
When the second selection instruction for interface image being detected, appointment region is defined as open region,
Appointment region is the region in interface image in addition to the region selected by the second selection instruction.
In another embodiment of the disclosure, all regions in the display interface of application are shielded,
To the interface image of display interface, including:
Specify image to cover in all regions in display interface, obtain the interface image of display interface;Or
Person,
The all information designated characters included by display interface are replaced, and obtain the interface image of display interface.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, after starting application, when the page function for application being detected
During the idsplay order in face, it is judged that whether function pages is the privacy page;
When function pages is the privacy page, function pages is shielded, obtain the shielding figure of function pages
Picture;
The masked images of display function pages.
In another embodiment of the disclosure, it is judged that whether function pages is the privacy page, including:
Judge the second privacy list of storage has stored the most the page iden-tity of function pages, the second privacy row
Table is for storing the page iden-tity of the privacy page;
When the second privacy list has stored the page iden-tity of function pages, determine that function pages is privacy page
Face.
In another embodiment of the disclosure, it is judged that whether function pages is the privacy page, including:
Whether the arbitration functions page comprises privacy information;
When function pages comprises privacy information, determine that function pages is the privacy page.
Above-mentioned all optional technical schemes, all can be according to arbitrarily combining the alternative embodiment forming the disclosure, this
This is repeated by open embodiment the most one by one.
Fig. 2 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment, and the method is used
In first terminal.As in figure 2 it is shown, the method comprises the following steps.
In step 201, during by the second terminal remote control, each in first terminal
Application, when the enabled instruction for this application being detected, starts this application, and judges that whether this application is
Privacy is applied.
It should be noted that enabled instruction is used for starting application, and this enabled instruction can be touched by first user
Send out, first user can be triggered by assigned operation, this assigned operation can be single-click operation, double click operation,
Voice operatings etc., this is not specifically limited by disclosure embodiment.Wherein, first user is for using first eventually
The user of end.
It addition, privacy application can be the application comprising privacy information, it is also possible to for freely being set by first user
Fixed application, this is not specifically limited by disclosure embodiment.In one embodiment, this privacy is applied such as
Can be instant messaging application, shopping platform application etc..In another embodiment, the application of this privacy is such as also
Can be that first user is set as having the application accessing restriction, such as, shooting application, note be applied, are dialled
Number application etc..Wherein, privacy information can include ID (identity number) card No., phone number, Bank Account Number, client
Title, account balance, birthdate etc., this is not specifically limited by disclosure embodiment.
Wherein, when the enabled instruction for this application being detected, the operation starting this application is referred to phase
Pass technology, this is not described in detail by disclosure embodiment.
Wherein, it is judged that when whether this application is privacy application, it can be determined that the first privacy list of storage is
The no application identities having stored this application, this first privacy list is for storing the application identities of privacy application;
When this first privacy list has stored the application identities of this application, determine that this application is privacy application;When
When this first privacy list does not stores the application identities of this application, determine that this application is not applied for privacy.By
In directly judging whether this application is privacy application quickly and easily according to this first privacy list, and
It is made without other complex operations, it is thus possible to improve judging efficiency.
It should be noted that the first privacy list is for determining the privacy application in first terminal.Such as, when
When in this first privacy list, the application identities of storage is application identities 1, application identities 3 and application identities 4,
This first privacy list can be to show as form as shown in Figure 3, and certainly, in actual application, this is first hidden
Private list can also show as other form, and this is not specifically limited by disclosure embodiment.
It addition, application identities is for uniquely identifying application, and this application identities can be apply Apply Names,
Application icons etc., this is not specifically limited by disclosure embodiment.
Such as, the application identities of this application is application identities 1, the application identities of storage in this first privacy list
For application identities 1, application identities 3 and application identities 4, then may determine that in this first privacy list and store
The application identities of this application, determines that this application is privacy application.
The most such as, the application identities of this application is application identities 2, the application mark of storage in this first privacy list
Knowing is application identities 1, application identities 3 and application identities 4, then may determine that in this first privacy list and do not deposit
Store up the application identities of this application, determine that this application is not applied for privacy.
Further, it is also possible to for each application in first terminal, when detecting for this application
During one preset instructions, the application identities of this application is stored in this first privacy list.
It should be noted that the application identities of application is stored the first privacy for instruction by the first preset instructions
In list, this first preset instructions can be triggered by first user, and first user can be touched by assigned operation
Sending out, this is not specifically limited by disclosure embodiment.
Owing to this first preset instructions can be triggered by first user, therefore, this application is answered by first terminal
The mistake that this first privacy list is operated by the process the most namely first user carrying out storing by mark
Journey.And owing to the first privacy list is for determining the privacy application in first terminal, therefore, first user pair
The mistake of the privacy application that the process that this first privacy list carries out operating the most namely determines in first terminal
Journey, this determines process simple and flexible, is possible not only to save privacy application and really fixes time, it is also possible to meet the
The privacy requirements of one user, thus ensure that the personal secrets of first terminal, and improve the behaviour of first user
Experience.
It should be noted that before this first privacy list is operated by first user, first terminal is also
Can be prestored to specifying application identities in this first privacy list, to reduce privacy application further
Determine the time.Wherein, it is intended that application identities can pre-set, can be instant such as this appointment application identities
The application identities etc. of the application identities of communication applications, shopping platform application, this is not done by disclosure embodiment has
Body limits.
Wherein, the application identities of this application is stored in the operation in this first privacy list and correlation technique
The operation that a certain information stores in certain list being similar to, this is not described in detail by disclosure embodiment.
In step 202., when this application is privacy application, after starting this application, this application is shown
Show that interface shields, obtain the masked images of this display interface.
It is activated rear shown interface it should be noted that the display interface of application is this application.
Owing to first user may exist different shielding demands to the display interface of this application, as first uses
Family may wish to shield all regions in the display interface of this application, or wants this application
Subregion in display interface shields, and therefore, it can the shielding demand different according to first user,
The display interface of this application is shielded, obtains the masked images of this display interface.And according to first user
Different shielding demands, shields the display interface of this application, obtains the masked images of this display interface
Operation can be realized by the following two kinds mode:
First kind of way: all regions in the display interface of this application are shielded, obtains this display circle
The interface image in face, is defined as the masked images of this display interface by this interface image.
Show it should be noted that the masked images of this display interface obtained by above-mentioned first kind of way is this
Showing the full-shield image at interface, all regions in this full-shield image are all shielded, and this full-shield image can
To meet the first user full-shield demand to this display interface, all letters that now this display interface includes
Breath all will not be compromised, thereby may be ensured that the personal secrets of first terminal.
Wherein, all regions in the display interface of this application are shielded, obtains the boundary of this display interface
During the image of face, image can be specified to cover all regions in this display interface, obtain this display interface
Interface image;Or, all information designated characters included by this display interface are replaced, and are somebody's turn to do
The interface image of display interface, certainly, in actual application, it is also possible to otherwise to this display interface
In all regions shield, obtain the interface image of this display interface, this is not done by disclosure embodiment
Concrete restriction.
It should be noted that specify image can pre-set, as this appointment image can be mosaic image,
Solid block of color image or other image, this is not specifically limited by disclosure embodiment.
It addition, designated character can pre-set, if this designated character can be symbol *, #, % etc., number
Words 1,2,3 etc., this is not specifically limited by disclosure embodiment.
Such as, this display interface is interface as shown in Figure 4, it is intended that image is the figure as shown in Fig. 5 (a)
Picture, then can cover all regions in this display interface with this appointment image, obtain such as Fig. 5 (b) institute
The interface image of this display interface shown.
The most such as, this display interface is interface as shown in Figure 4, it is intended that character is symbol *, then can will be somebody's turn to do
All information that display interface includes are replaced with this designated character, obtain this display interface as shown in Figure 6
Interface image.
The second way: all regions in the display interface of this application are shielded, obtains this display circle
The interface image in face;Determining the open region in this interface image, the information in the disclosure region is not privacy
Information;Release the shielding to the disclosure region, obtain the masked images of this display interface.
Show it should be noted that the masked images of this display interface obtained by the above-mentioned second way is this
Showing the partly shielding effect image at interface, in this partly shielding effect image, the region in addition to open region is all shielded,
This partly shielding effect image can meet the first user partly shielding effect demand to this display interface, now this display
In interface, all information in region in addition to open region all will not be compromised, thereby may be ensured that first
The personal secrets of terminal.
Such as, all regions in the display interface of this application are shielded by first terminal, obtain such as Fig. 7
Interface image shown in (a), it is assumed that first terminal determines that the open region in this interface image is Fig. 7 (a)
Region 1 in shown interface image, then can release the shielding to open region 1, obtain such as Fig. 7 (b)
The masked images of this shown display interface.
Wherein, all regions in the display interface of this application are shielded, obtains the boundary of this display interface
The operation of face image is identical with the operation in above-mentioned first kind of way, and disclosure embodiment does not repeats them here.
Wherein it is determined that during open region in this display interface, can work as and detect for this interface image
During the first selection instruction, the region selected by this first selection instruction is defined as open region;Or, when
When the second selection instruction for this interface image being detected, appointment region being defined as open region, this refers to
Determine region be in this interface image except this second select instruction selected by region in addition to region.
It should be noted that first selects instruction for selecting open region from this interface image, this is first years old
Selecting instruction can be triggered by first user, first user can be triggered by assigned operation, and the disclosure is implemented
This is not specifically limited by example.
It addition, second selects instruction for selection privacy area from this interface image, this privacy area is should
Region in addition to viewing area in interface image, this second selects instruction can be triggered by first user, the
One user can be triggered by assigned operation, and this is not specifically limited by disclosure embodiment.
Furthermore, owing to first selects instruction and second to select instruction all can be triggered by first user, therefore,
Selecting to instruct the process selecting region by the first selection instruction or second in disclosure embodiment should in reality
In with, first user can be shown as to some region of frame selection operation, first user by virtual painting dauber
Tool is to some region of slide etc., and this is not specifically limited by disclosure embodiment.
Such as, the interface image of this display interface is the image as shown in Fig. 7 (a), and first selects instruction institute
The region selected is the region 1 in the interface image shown in Fig. 7 (a), then region 1 can be defined as public affairs
Open region.
The most such as, the interface image of this display interface is the image as shown in Fig. 7 (a), and second selects instruction
Selected region is the region 2 in the interface image shown in Fig. 7 (a), then can be by this interface image
Region 1 in addition to region 2 is defined as specifying region, and this appointment region 1 is defined as open region.
Wherein, when releasing the shielding to the disclosure region, can be according to the first terminal institute to this display interface
There is region to carry out the operation shielded, the disclosure region is carried out correspondingly inverse operation, to release the disclosure district
The shielding in territory, the information in display the disclosure region.
Such as, all regions in this display interface specify image to cover, the most now can be to these public affairs
The appointment image covered on open region eliminates, and to release the shielding to the disclosure region, shows the disclosure
Information in region.
The most such as, all information designated characters included in this display interface are replaced, then this
Time all designated characters that can include the disclosure region are counter replaces, to release the disclosure region
Shielding, display the disclosure region in information.
In step 203, the masked images of this display interface is shown.
It should be noted that show a certain in showing the operation of the masked images of this display interface and correlation technique
The operation of image is similar to, and this is not described in detail by disclosure embodiment.
It should be noted that when the full-shield image that masked images is this display interface of this display interface,
All regions in the masked images of this display interface are all shielded, thus when the second user is due to maloperation
When opening the privacy application in first terminal, the privacy information comprised in the application of this privacy can be avoided by second
User is known, it is to avoid the privacy leakage of first terminal, and is possible to prevent the second user to continue this display circle
Face operates, it is ensured that the personal secrets of first terminal.
It addition, when the partly shielding effect image that masked images is this display interface of this display interface, this display
In the masked images at interface, the region in addition to open region is all shielded, due to the information in the disclosure region
It is not privacy information, therefore, when the second user opens the privacy application in first terminal due to maloperation,
The privacy information that comprises in the application of this privacy is equally avoided to be known by the second user, it is to avoid first terminal
Privacy leakage, it is ensured that the personal secrets of first terminal.And due to aobvious in the masked images of this display interface
It is shown with the information in the disclosure region, such that it is able to be easy to first user or the second user knows these public affairs in time
Information in open region, and be easy to first user or the second user to the information in the disclosure region at
Reason, improves Consumer's Experience.
Further, it is also possible to for each application in first terminal, after starting this application, work as detection
To during for the idsplay order of the function pages of this application, it is judged that whether this function pages is the privacy page;When
When this function pages is the privacy page, this function pages is shielded, obtain the shielding figure of this function pages
Picture;Show the masked images of this function pages.
It should be noted that the function pages of application is shown after the functional module in this application is opened
The page.
It addition, idsplay order is used for showing this function pages, and this idsplay order can be triggered by first user,
First user can be triggered by assigned operation, and this is not specifically limited by disclosure embodiment.
Furthermore, the privacy page can be the page comprising privacy information, it is also possible to for freely being set by first user
The fixed page, this is not specifically limited by disclosure embodiment.In one embodiment, this privacy page is such as
Can be the address list page, the page etc. is set.In another embodiment, this privacy page can also be such as
First user is set as having the page accessing restriction, such as, collects the page, the historical record page etc..
Wherein, it is judged that whether this function pages is that the operation of the privacy page can be realized by the following two kinds mode.
First kind of way: judge the most to have stored in the second privacy list of storage the page mark of this function pages
Knowing, this second privacy list is for storing the page iden-tity of the privacy page;When this second privacy list is deposited
When storing up the page iden-tity of this function pages, determine that this function pages is the privacy page;When this second privacy list
In when not storing the page iden-tity of this function pages, determine that this function pages is for the privacy page.
It should be noted that above-mentioned first kind of way can directly be come simple fast according to this second privacy list
Judge whether this function pages is the privacy page fastly, without carrying out other complex operations, such that it is able to
Improve judging efficiency.
It should be noted that the second privacy list is for determining the privacy page in application.Such as, when this
In two privacy lists, the page iden-tity of storage is when being page iden-tity 1, page iden-tity 3 and page iden-tity 4, and this is the years old
Two privacy lists can be to show as form as shown in Figure 8, and certainly, in actual application, this second privacy arranges
Table can also show as other form, and this is not specifically limited by disclosure embodiment.
It addition, page iden-tity is for unique identified page, and this page iden-tity can be the page name of this page
Claiming, this is not specifically limited by disclosure embodiment.
Such as, the page iden-tity of this function pages is page iden-tity 1, the page of storage in this second privacy list
It is designated page iden-tity 1, page iden-tity 3 and page iden-tity 4, then may determine that in this second privacy list
Store the page iden-tity of this function pages, determine that this function pages is the privacy page.
The most such as, the page iden-tity of this function pages is page iden-tity 2, the page of storage in this second privacy list
Face is designated page iden-tity 1, page iden-tity 3 and page iden-tity 4, then may determine that in this second privacy list
Do not store the page iden-tity of this function pages, determine that this function pages is not for the privacy page.
Further, it is also possible to for each function pages in this application, when detecting for this page function
During second preset instructions in face, the page iden-tity of this function pages is stored in this second privacy list.
It should be noted that the page iden-tity of this function pages is stored for instruction by the second preset instructions
In two privacy lists, this second preset instructions can be triggered by first user, and first user can be by specifying
Operation triggers, and this is not specifically limited by disclosure embodiment.
Owing to this second preset instructions can be triggered by first user, therefore, first terminal is to this function pages
The page iden-tity process the most namely first user that carries out storing this second privacy list is operated
Process.And owing to the second privacy list is for determining the privacy page in application, therefore, first user pair
The process that this second privacy list carries out operating the most namely determines the process of the privacy page in application,
This determines process simple and flexible, is possible not only to save the privacy page and really fixes time, it is also possible to meets the first use
The privacy requirements at family, thus ensure that the personal secrets of first terminal, and improve the operating body of first user
Test.
It should be noted that before this second privacy list is operated by first user, first terminal is also
Specified page mark can be prestored in this second privacy list, to reduce the privacy page further
Determine the time.Wherein, it is intended that page iden-tity can pre-set, as this specified page mark can be communication
Recording the page iden-tity of the page, arrange the page iden-tity etc. of the page, this is not specifically limited by disclosure embodiment.
Wherein, the page iden-tity of this function pages is stored the operation in this second privacy list and relevant skill
The operation that a certain information stores in certain list being similar in art, this is not carried out in detail by disclosure embodiment
Illustrate.
The second way: judge whether comprise privacy information in this function pages;When this function pages comprises
During privacy information, determine that this function pages is the privacy page;When this function pages does not comprises privacy information,
Determine that this function pages is not for the privacy page.
It should be noted that whether the above-mentioned second way comprises privacy information according only in this function pages
It may determine that whether this function pages is the privacy page, this judge process simple and flexible, it is judged that efficiency is higher,
As long as and which information predetermined is privacy information, it is possible to all of function pages in application is carried out standard
Really judge, it is judged that accuracy rate is the highest.
Wherein, it is judged that the operation whether comprising privacy information in this function pages is referred to correlation technique, originally
This is not specifically limited by open embodiment.
Such as, whether privacy information is ID (identity number) card No., then wrap during first terminal may determine that this function pages
Containing ID (identity number) card No., when this function pages comprises ID (identity number) card No., it may be determined that this function pages is hidden
The private page, when not comprising ID (identity number) card No. in this function pages, it may be determined that this function pages is not privacy
The page.
Wherein, when this function pages is the privacy page, this function pages is shielded, obtain this function
The operation of the masked images of the page is similar with the operation in above-mentioned steps 202, and disclosure embodiment is to this no longer
Repeat.
Wherein, show this function pages masked images operation and correlation technique in show the behaviour of a certain image
Being similar to, this is not described in detail by disclosure embodiment.
It should be noted that in disclosure embodiment, when this function pages is the privacy page, can be to this
Function pages shields, and obtains the masked images of this function pages, and shows the shielding figure of this function pages
Picture, thus when the second user opens the privacy page in application due to maloperation, this privacy can be avoided
The privacy information comprised in the page is known by the second user, it is to avoid the privacy leakage of first terminal, it is ensured that
The personal secrets of first terminal.
In the disclosed embodiments, during first terminal is by the second terminal remote control, for first
Each application in terminal, when first terminal detects the enabled instruction for this application, starts this application,
And judge whether this application is privacy application, when this application is privacy application, after starting this application, the
The display interface of this application can be shielded by one terminal, obtains the masked images of this display interface, and shows
Show the masked images of this display interface.Owing to the masked images of this display interface is to shield this display interface
Obtain after covering, it can thus be avoided the privacy information comprised in the application of this privacy is known by the second user,
Such that it is able to effectively prevent the privacy leakage of first terminal, it is ensured that the personal secrets of first terminal.
Fig. 9 is the block diagram according to a kind of remote control shown in an exemplary embodiment.With reference to Fig. 9, should
Device includes the first judge module 901, the first shroud module 902 and the first display module 903.
First judge module 901, for during by the second terminal remote control, in first terminal
Each application, when the enabled instruction for application being detected, start application, and judge to apply and be whether
Privacy is applied;
First shroud module 902, for when application is applied for privacy, after starting application, showing application
Show that interface shields, obtain the masked images of display interface;
First display module 903, for showing the masked images of display interface.
In another embodiment of the disclosure, with reference to Figure 10, this first judge module 901 includes the first judgement
Unit 9011 and first determines unit 9012.
First judging unit 9011, has stored answering of application in the first privacy list judging storage the most
By mark, the first privacy list is for storing the application identities of privacy application;
First determines unit 9012, is used for when having stored the application identities of application in the first privacy list, really
Fixed application is applied for privacy.
In another embodiment of the disclosure, this device also includes memory module.
Memory module, for for each application in first terminal, when detecting that for application first is pre-
If during instruction, the application identities of application being stored in the first privacy list.
In another embodiment of the disclosure, with reference to Figure 11, this first shroud module 902 includes screen unit
9021 and the 3rd determine unit 9022.
Screen unit 9021, for shielding all regions in the display interface of application, is shown
The interface image at interface;
Second determines unit 9022, for interface image is defined as the masked images of display interface.
In another embodiment of the disclosure, with reference to Figure 12, this first shroud module 902 includes screen unit
9021, the 3rd determines unit 9023 and lifting unit 9024.
Screen unit 9021, for shielding all regions in the display interface of application, is shown
The interface image at interface;
4th determines unit 9023, the information for determining the open region in interface image, in open region
It it is not privacy information;
Lifting unit 9024, for releasing the shielding to open region, obtains the masked images of display interface.
In another embodiment of the disclosure, with reference to Figure 13, the 3rd determines that unit 9023 includes that first determines
Subelement 90231 and second determines subelement 90232.
First determines subelement 90231, is used for when the first selection instruction for interface image being detected, will
First selects the region selected by instruction to be defined as open region;Or,
Second determines subelement 90232, is used for when the second selection instruction for interface image being detected, will
Region is specified to be defined as open region, it is intended that region is except the district selected by the second selection instruction in interface image
Region outside territory.
In another embodiment of the disclosure, with reference to Figure 14, this screen unit 9021 includes covering subelement
90211 and replace subelement 90212.
Cover subelement 90211, for specifying image to cover in all regions in display interface, shown
Show the interface image at interface;Or,
Replace subelement 90212, replace for all information designated characters that display interface is included,
Interface image to display interface.
In another embodiment of the disclosure, with reference to Figure 15, this device also includes the second judge module 904,
Secondary shielding module 905 and the second display module 906.
Second judge module 904, for for each application in first terminal, after starting application, working as inspection
When measuring the idsplay order for the function pages applied, it is judged that whether function pages is the privacy page;
Secondary shielding module 905, for when function pages is the privacy page, shields function pages,
Obtain the masked images of function pages;
Second display module 906, for showing the masked images of function pages.
In another embodiment of the disclosure, with reference to Figure 16, this second judge module 904 includes the second judgement
Unit 9041 and the 4th determines unit 9042.
Second judging unit 9041, has stored function pages in the second privacy list judging storage the most
Page iden-tity, the second privacy list is for storing the page iden-tity of the privacy page;
4th determines unit 9042, is used for when having stored the page iden-tity of function pages in the second privacy list,
Determine that function pages is the privacy page.
In another embodiment of the disclosure, with reference to Figure 17, this second judge module 904 includes the 3rd judgement
Unit 9043 and the 5th determines unit 9044.
Whether the 3rd judging unit 9043, comprise privacy information in the arbitration functions page;
5th determines unit 9044, for when comprising privacy information in function pages, determines that function pages is
The privacy page.
In the disclosed embodiments, during first terminal is by the second terminal remote control, for first
Each application in terminal, when first terminal detects the enabled instruction for this application, starts this application,
And judge whether this application is privacy application, when this application is privacy application, after starting this application, the
The display interface of this application can be shielded by one terminal, obtains the masked images of this display interface, and shows
Show the masked images of this display interface.Owing to the masked images of this display interface is to shield this display interface
Obtain after covering, it can thus be avoided the privacy information comprised in the application of this privacy is known by the second user,
Such that it is able to effectively prevent the privacy leakage of first terminal, it is ensured that the personal secrets of first terminal.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation relevant
The embodiment of the method is described in detail, explanation will be not set forth in detail herein.
Figure 18 is the block diagram according to a kind of device 1800 for image transmitting shown in an exemplary embodiment.
Such as, device 1800 can be mobile phone, computer, digital broadcast terminal, messaging devices, trip
Play control station, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Figure 18, device 1800 can include following one or more assembly: processes assembly 1802, deposits
Reservoir 1804, power supply module 1806, multimedia groupware 1808, audio-frequency assembly 1810, input/output (I/O)
Interface 1812, sensor cluster 1814, and communications component 1816.
Process assembly 1802 and generally control the integrated operation of device 1800, such as with display, call,
The operation that data communication, camera operation and record operation are associated.Process assembly 1802 can include one or
Multiple processors 1820 perform instruction, to complete all or part of step of above-mentioned method.Additionally, place
Reason assembly 1802 can include one or more module, it is simple to processes between assembly 1802 and other assemblies
Alternately.Such as, process assembly 1802 and can include multi-media module, to facilitate multimedia groupware 1808 He
Process between assembly 1802 is mutual.
Memorizer 1804 is configured to store various types of data to support the operation at device 1800.This
The example of a little data includes any application program for operation on device 1800 or the instruction of method, contact
Personal data, telephone book data, message, picture, video etc..Memorizer 1804 can by any kind of easily
The property lost or non-volatile memory device or combinations thereof realize, such as static RAM
(SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM
(EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory,
Flash memory, disk or CD.
The various assemblies that power supply module 1806 is device 1800 provide power supply.Power supply module 1806 can include
Power-supply management system, one or more power supplys, and other with generate for device 1800, manage and distribute power supply
The assembly being associated.
One output of offer that multimedia groupware 1808 is included between described device 1800 and controlled user connects
The screen of mouth.In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).
If screen includes that touch panel, screen may be implemented as touch screen, to receive defeated from controlled user
Enter signal.Touch panel includes that one or more touch sensor touches with sensing, slides and on touch panel
Gesture.Described touch sensor can not only sense touch or the border of sliding action, but also detection with
Persistent period that described touch or slide are relevant and pressure.In certain embodiments, multimedia groupware 1808
Including a front-facing camera and/or post-positioned pick-up head.When device 1800 is in operator scheme, such as screening-mode
Or during video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each
Front-facing camera and post-positioned pick-up head can be a fixing optical lens system or have focal length and optics change
Burnt ability.
Audio-frequency assembly 1810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 1810 wraps
Include a mike (MIC), when device 1800 is in operator scheme, such as call model, logging mode and language
During sound recognition mode, mike is configured to receive external audio signal.The audio signal received can be by
It is further stored in memorizer 1804 or sends via communications component 1816.In certain embodiments, audio frequency
Assembly 1810 also includes a speaker, is used for exporting audio signal.
I/O interface 1812 provides interface for processing between assembly 1802 and peripheral interface module, above-mentioned periphery connects
Mouth die block can be keyboard, puts striking wheel, button etc..These buttons may include but be not limited to: home button,
Volume button, start button and locking press button.
Sensor cluster 1814 includes one or more sensor, for providing various aspects for device 1800
State estimation.Such as, what sensor cluster 1814 can detect device 1800 opens/closed mode,
The relative localization of assembly, the most described assembly is display and the keypad of device 1800, sensor cluster 1814
Device 1800 or the position change of 1,800 1 assemblies of device, controlled user and device 1800 can also be detected
The presence or absence of contact, device 1800 orientation or acceleration/deceleration and the variations in temperature of device 1800.Pass
Sensor assembly 1814 can include proximity transducer, is configured to when not having any physical contact detect
The existence of neighbouring object.Sensor cluster 1814 can also include optical sensor, as CMOS or CCD schemes
As sensor, for using in imaging applications.In certain embodiments, this sensor cluster 1814 also may be used
To include acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 1816 is configured to facilitate wired or wireless mode between device 1800 and other equipment
Communication.Device 1800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or it
Combination.In one exemplary embodiment, communication component 1816 receives from outside via broadcast channel
The broadcast singal of broadcasting management systems or broadcast related information.In one exemplary embodiment, described communication
Assembly 1816 also includes near-field communication (NFC) module, to promote junction service.Such as, in NFC module
Can be based on RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB)
Technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1800 can be by one or more application specific integrated circuits
(ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), FPGA
Device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or its
He realizes by electronic component, is used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable storage medium including instruction is additionally provided
Matter, such as, include the memorizer 1804 of instruction, and above-mentioned instruction can be performed by the processor 1820 of device 1800
To complete said method.Such as, described non-transitory computer-readable recording medium can be ROM, random
Access memorizer (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is by mobile terminal
Processor when performing so that mobile terminal is able to carry out a kind of long-range control method, and described method includes:
During by the second terminal remote control, for each application in first terminal, when detecting
During for the enabled instruction applied, start application, and judge whether apply is privacy application;
When application is applied for privacy, after starting application, the display interface of application is shielded, obtains
The masked images of display interface;
The masked images of display display interface.
In another embodiment of the disclosure, it is judged that whether application is privacy application, including:
Judging the most to have stored in the first privacy list of storage the application identities of application, the first privacy list is used
Application identities in storage privacy application;
When the first privacy list has stored the application identities of application, determine that application is applied for privacy.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when the first preset instructions for application being detected, should
Application identities store in the first privacy list.
In another embodiment of the disclosure, the display interface of application is shielded, obtains display interface
Masked images, including:
All regions in the display interface of application are shielded, obtains the interface image of display interface;
Interface image is defined as the masked images of display interface.
In another embodiment of the disclosure, the display interface of application is shielded, obtains display interface
Masked images, including:
All regions in the display interface of application are shielded, obtains the interface image of display interface;
Determining the open region in interface image, the information in open region is not privacy information;
Release the shielding to open region, obtain the masked images of display interface.
In another embodiment of the disclosure, determine the open region in interface image, including:
When the first selection instruction for interface image being detected, select the region selected by instruction by first
It is defined as open region;Or,
When the second selection instruction for interface image being detected, appointment region is defined as open region,
Appointment region is the region in interface image in addition to the region selected by the second selection instruction.
In another embodiment of the disclosure, all regions in the display interface of application are shielded,
To the interface image of display interface, including:
Specify image to cover in all regions in display interface, obtain the interface image of display interface;Or
Person,
The all information designated characters included by display interface are replaced, and obtain the interface image of display interface.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, after starting application, when the page function for application being detected
During the idsplay order in face, it is judged that whether function pages is the privacy page;
When function pages is the privacy page, function pages is shielded, obtain the shielding figure of function pages
Picture;
The masked images of display function pages.
In another embodiment of the disclosure, it is judged that whether function pages is the privacy page, including:
Judge the second privacy list of storage has stored the most the page iden-tity of function pages, the second privacy row
Table is for storing the page iden-tity of the privacy page;
When the second privacy list has stored the page iden-tity of function pages, determine that function pages is privacy page
Face.
In another embodiment of the disclosure, it is judged that whether function pages is the privacy page, including:
Whether the arbitration functions page comprises privacy information;
When function pages comprises privacy information, determine that function pages is the privacy page.
In the disclosed embodiments, during first terminal is by the second terminal remote control, for first
Each application in terminal, when first terminal detects the enabled instruction for this application, starts this application,
And judge whether this application is privacy application, when this application is privacy application, after starting this application, the
The display interface of this application can be shielded by one terminal, obtains the masked images of this display interface, and shows
Show the masked images of this display interface.Owing to the masked images of this display interface is to shield this display interface
Obtain after covering, it can thus be avoided the privacy information comprised in the application of this privacy is known by the second user,
Such that it is able to effectively prevent the privacy leakage of first terminal, it is ensured that the personal secrets of first terminal.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to this
Other bright embodiment.The application is intended to any modification, purposes or the adaptations of the present invention,
These modification, purposes or adaptations are followed the general principle of the present invention and include that the disclosure is not disclosed
Common knowledge in the art or conventional techniques means.Description and embodiments is considered only as exemplary
, true scope and spirit of the invention are pointed out by claim below.
It should be appreciated that the invention is not limited in accurate knot described above and illustrated in the accompanying drawings
Structure, and various modifications and changes can carried out without departing from the scope.The scope of the present invention is only by appended
Claim limits.
Claims (21)
1. a long-range control method, it is characterised in that be applied to first terminal, described method includes:
During by the second terminal remote control, for each application in described first terminal, work as inspection
When measuring the enabled instruction for described application, start described application, and judge whether described application is privacy
Application;
When described application is privacy application, after starting described application, the display interface of described application is entered
Row shielding, obtains the masked images of described display interface;
Show the masked images of described display interface.
2. the method for claim 1, it is characterised in that described judge whether described application is privacy
Application, including:
Judge the first privacy list of storage has stored the most the application identities of described application, described first hidden
Private list is for storing the application identities of privacy application;
When described first privacy list has stored the application identities of described application, determine that described application is hidden
Private application.
3. method as claimed in claim 2, it is characterised in that described method also includes:
For each application in described first terminal, when the first preset instructions for described application being detected
Time, the application identities of described application is stored in described first privacy list.
4. the method for claim 1, it is characterised in that the described display interface to described application enters
Row shielding, obtains the masked images of described display interface, including:
All regions in the display interface of described application are shielded, obtains the interface of described display interface
Image;
Described interface image is defined as the masked images of described display interface.
5. the method for claim 1, it is characterised in that the described display interface to described application
Shield, obtain the masked images of described display interface, including:
All regions in the display interface of described application are shielded, obtains the interface of described display interface
Image;
Determining the open region in described interface image, the information in described open region is not privacy information;
Release the shielding to described open region, obtain the masked images of described display interface.
6. method as claimed in claim 5, it is characterised in that the described public affairs determined in described interface image
Open region, including:
When the first selection instruction for described interface image being detected, select instruction selected by described first
The region selected is defined as open region;Or,
When the second selection instruction for described interface image being detected, appointment region is defined as open district
Territory, described appointment region be in described interface image except described second select instruction selected by region in addition to
Region.
7. the method as described in claim 4 or 5, it is characterised in that described display circle to described application
All regions in face shield, and obtain the interface image of described display interface, including:
Specify image to cover in all regions in described display interface, obtain the interface of described display interface
Image;Or,
The all information designated characters included by described display interface are replaced, and obtain described display interface
Interface image.
8. the method as described in claim 1-6 any claim, it is characterised in that described method is also wrapped
Include:
For each application in described first terminal, after starting described application, when detecting for described
During the idsplay order of function pages of application, it is judged that whether described function pages is the privacy page;
When described function pages is the privacy page, described function pages is shielded, obtain described function
The masked images of the page;
Show the masked images of described function pages.
9. method as claimed in claim 8, it is characterised in that described judge that whether described function pages is
The privacy page, including:
Judge the second privacy list of storage has stored the most the page iden-tity of described function pages, described the
Two privacy lists are for storing the page iden-tity of the privacy page;
When described second privacy list has stored the page iden-tity of described function pages, determine described function
The page is the privacy page.
10. method as claimed in claim 8, it is characterised in that described whether judge described function pages
For the privacy page, including:
Judge whether described function pages comprises privacy information;
When described function pages comprises privacy information, determine that described function pages is the privacy page.
11. 1 kinds of remote controls, it is characterised in that described device includes:
First judge module, for during by the second terminal remote control, in first terminal
Each application, when the enabled instruction for described application being detected, starts described application, and judges described
Whether application is privacy application;
First shroud module, for when described application is privacy application, after starting described application, to institute
The display interface stating application shields, and obtains the masked images of described display interface;
First display module, for showing the masked images of described display interface.
12. devices as claimed in claim 11, it is characterised in that described first judge module includes:
First judging unit, has stored answering of described application in the first privacy list judging storage the most
By mark, described first privacy list is for storing the application identities of privacy application;
First determines unit, is used for when having stored the application identities of described application in described first privacy list,
Determine that described application is privacy application.
13. devices as claimed in claim 12, it is characterised in that described device also includes:
Memory module, for for each application in described first terminal, when detecting for described application
The first preset instructions time, the application identities of described application is stored in described first privacy list.
14. devices as claimed in claim 11, it is characterised in that described first shroud module includes:
Screen unit, for shielding all regions in the display interface of described application, obtains described
The interface image of display interface;
Second determines unit, for described interface image is defined as the masked images of described display interface.
15. devices as claimed in claim 11, it is characterised in that described first shroud module includes:
Described screen unit, for shielding all regions in the display interface of described application, obtains
The interface image of described display interface;
3rd determines unit, for determining the open region in described interface image, in described open region
Information is not privacy information;
Lifting unit, for releasing the shielding to described open region, obtains the shielding figure of described display interface
Picture.
16. devices as claimed in claim 15, it is characterised in that the described 3rd determines that unit includes:
First determines subelement, is used for when the first selection instruction for described interface image being detected, will
Described first selects the region selected by instruction to be defined as open region;Or,
Second determines subelement, is used for when the second selection instruction for described interface image being detected, will
Specifying region to be defined as open region, described appointment region is except described second selects to refer in described interface image
The region outside region selected by order.
17. devices as described in claims 14 or 15, it is characterised in that described screen unit includes:
Cover subelement, for specifying image to cover in all regions in described display interface, obtain institute
State the interface image of display interface;Or,
Replace subelement, replace for all information designated characters that described display interface is included,
Interface image to described display interface.
18. devices as described in claim 11-16 any claim, it is characterised in that described device is also
Including:
Second judge module, for for each application in described first terminal, after starting described application,
When the idsplay order of the function pages detected for described application, it is judged that whether described function pages is hidden
The private page;
Secondary shielding module, for when described function pages is the privacy page, is carried out described function pages
Shielding, obtains the masked images of described function pages;
Second display module, for showing the masked images of described function pages.
19. devices as claimed in claim 18, it is characterised in that described second judge module includes:
Second judging unit, has stored described function pages in the second privacy list judging storage the most
Page iden-tity, described second privacy list is for storing the page iden-tity of the privacy page;
4th determines unit, for when the page mark having stored described function pages in described second privacy list
During knowledge, determine that described function pages is the privacy page.
20. devices as claimed in claim 18, it is characterised in that described second judge module includes:
3rd judging unit, is used for judging whether comprise privacy information in described function pages;
5th determines unit, for when comprising privacy information in described function pages, determines described page function
Face is the privacy page.
21. 1 kinds of remote controls, it is characterised in that described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
During by the second terminal remote control, for each application in first terminal, when detecting
During for the enabled instruction of described application, start described application, and judge whether described application is privacy application;
When described application is privacy application, after starting described application, the display interface of described application is entered
Row shielding, obtains the masked images of described display interface;
Show the masked images of described display interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610282464.5A CN105956486B (en) | 2016-04-29 | 2016-04-29 | Long-range control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610282464.5A CN105956486B (en) | 2016-04-29 | 2016-04-29 | Long-range control method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105956486A true CN105956486A (en) | 2016-09-21 |
CN105956486B CN105956486B (en) | 2019-03-08 |
Family
ID=56914371
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610282464.5A Active CN105956486B (en) | 2016-04-29 | 2016-04-29 | Long-range control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105956486B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778331A (en) * | 2016-11-29 | 2017-05-31 | 广东电网有限责任公司信息中心 | A kind of monitoring method of application program, apparatus and system |
CN107220538A (en) * | 2017-06-27 | 2017-09-29 | 广东欧珀移动通信有限公司 | Pay class application management method, device and mobile terminal |
CN107358111A (en) * | 2017-08-28 | 2017-11-17 | 维沃移动通信有限公司 | A kind of method for secret protection and mobile terminal |
CN107682538A (en) * | 2017-09-27 | 2018-02-09 | 北京小米移动软件有限公司 | The display methods and device of application interface |
CN109451141A (en) * | 2018-09-26 | 2019-03-08 | 维沃移动通信有限公司 | A kind of method of controlling operation thereof and associated terminal |
CN111277807A (en) * | 2020-01-14 | 2020-06-12 | 广东小天才科技有限公司 | Projection implementation method, wearable device, display device and storage medium |
WO2020155444A1 (en) * | 2019-01-30 | 2020-08-06 | 上海传英信息技术有限公司 | Application permission control method, lower-level terminal, and upper-level terminal |
CN114286178A (en) * | 2021-12-31 | 2022-04-05 | 神思电子技术股份有限公司 | Privacy data protection method, device and medium based on remote control |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201203870Y (en) * | 2007-12-28 | 2009-03-04 | 北京帮助在线信息技术有限公司 | Apparatus for protecting on-line help transparent window privacy |
CN101470787A (en) * | 2007-12-28 | 2009-07-01 | 北京帮助在线信息技术有限公司 | Apparatus and method used for transparent window intimacy protection of on-line help |
CN101470786A (en) * | 2007-12-28 | 2009-07-01 | 北京帮助在线信息技术有限公司 | Apparatus and method used for transparent window intimacy protection of on-line help |
CN103077361A (en) * | 2012-12-28 | 2013-05-01 | 东莞宇龙通信科技有限公司 | Mobile terminal and anti-spy method thereof |
CN103237047A (en) * | 2013-03-11 | 2013-08-07 | 广东欧珀移动通信有限公司 | Remote controlled and control method |
CN104298484A (en) * | 2014-10-17 | 2015-01-21 | 深圳市中兴移动通信有限公司 | Multi-screen interaction method and device |
CN104318145A (en) * | 2014-09-26 | 2015-01-28 | 来安县新元机电设备设计有限公司 | Method and system for privacy protection |
CN104680090A (en) * | 2015-02-06 | 2015-06-03 | 西安酷派软件科技有限公司 | Application hiding control method, device and mobile terminal |
CN105069374A (en) * | 2015-08-06 | 2015-11-18 | 上海斐讯数据通信技术有限公司 | Private data intercepting protection method and system |
CN105095770A (en) * | 2014-04-18 | 2015-11-25 | 海信集团有限公司 | Method and device for multi-screen interaction of multimedia resource |
-
2016
- 2016-04-29 CN CN201610282464.5A patent/CN105956486B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201203870Y (en) * | 2007-12-28 | 2009-03-04 | 北京帮助在线信息技术有限公司 | Apparatus for protecting on-line help transparent window privacy |
CN101470787A (en) * | 2007-12-28 | 2009-07-01 | 北京帮助在线信息技术有限公司 | Apparatus and method used for transparent window intimacy protection of on-line help |
CN101470786A (en) * | 2007-12-28 | 2009-07-01 | 北京帮助在线信息技术有限公司 | Apparatus and method used for transparent window intimacy protection of on-line help |
CN103077361A (en) * | 2012-12-28 | 2013-05-01 | 东莞宇龙通信科技有限公司 | Mobile terminal and anti-spy method thereof |
CN103237047A (en) * | 2013-03-11 | 2013-08-07 | 广东欧珀移动通信有限公司 | Remote controlled and control method |
CN105095770A (en) * | 2014-04-18 | 2015-11-25 | 海信集团有限公司 | Method and device for multi-screen interaction of multimedia resource |
CN104318145A (en) * | 2014-09-26 | 2015-01-28 | 来安县新元机电设备设计有限公司 | Method and system for privacy protection |
CN104298484A (en) * | 2014-10-17 | 2015-01-21 | 深圳市中兴移动通信有限公司 | Multi-screen interaction method and device |
CN104680090A (en) * | 2015-02-06 | 2015-06-03 | 西安酷派软件科技有限公司 | Application hiding control method, device and mobile terminal |
CN105069374A (en) * | 2015-08-06 | 2015-11-18 | 上海斐讯数据通信技术有限公司 | Private data intercepting protection method and system |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778331A (en) * | 2016-11-29 | 2017-05-31 | 广东电网有限责任公司信息中心 | A kind of monitoring method of application program, apparatus and system |
CN107220538A (en) * | 2017-06-27 | 2017-09-29 | 广东欧珀移动通信有限公司 | Pay class application management method, device and mobile terminal |
CN107358111B (en) * | 2017-08-28 | 2019-11-22 | 维沃移动通信有限公司 | A kind of method for secret protection and mobile terminal |
CN107358111A (en) * | 2017-08-28 | 2017-11-17 | 维沃移动通信有限公司 | A kind of method for secret protection and mobile terminal |
US10922444B2 (en) | 2017-09-27 | 2021-02-16 | Beijing Xiaomi Mobile Software Co., Ltd. | Method and apparatus for displaying application interface |
WO2019062115A1 (en) * | 2017-09-27 | 2019-04-04 | 北京小米移动软件有限公司 | Method and apparatus for displaying application interface |
KR20190042612A (en) * | 2017-09-27 | 2019-04-24 | 베이징 시아오미 모바일 소프트웨어 컴퍼니 리미티드 | Method and apparatus for displaying an application interface |
RU2710662C1 (en) * | 2017-09-27 | 2019-12-30 | Бейджин Сяоми Мобайл Софтвеа Ко., Лтд. | Method and device for displaying an application interface |
JP2020501207A (en) * | 2017-09-27 | 2020-01-16 | ペキン シャオミ モバイル ソフトウェア カンパニー, リミテッドBeijing Xiaomi Mobile Software Co.,Ltd. | Application interface display method and device |
CN107682538A (en) * | 2017-09-27 | 2018-02-09 | 北京小米移动软件有限公司 | The display methods and device of application interface |
KR102244436B1 (en) * | 2017-09-27 | 2021-04-27 | 베이징 시아오미 모바일 소프트웨어 컴퍼니 리미티드 | Application interface display method, apparatus and computer-readable storage medium |
CN109451141A (en) * | 2018-09-26 | 2019-03-08 | 维沃移动通信有限公司 | A kind of method of controlling operation thereof and associated terminal |
CN109451141B (en) * | 2018-09-26 | 2021-06-04 | 维沃移动通信有限公司 | Operation control method and related terminal |
WO2020155444A1 (en) * | 2019-01-30 | 2020-08-06 | 上海传英信息技术有限公司 | Application permission control method, lower-level terminal, and upper-level terminal |
CN111277807A (en) * | 2020-01-14 | 2020-06-12 | 广东小天才科技有限公司 | Projection implementation method, wearable device, display device and storage medium |
CN114286178A (en) * | 2021-12-31 | 2022-04-05 | 神思电子技术股份有限公司 | Privacy data protection method, device and medium based on remote control |
CN114286178B (en) * | 2021-12-31 | 2023-08-11 | 神思电子技术股份有限公司 | Privacy data protection method, device and medium based on remote control |
Also Published As
Publication number | Publication date |
---|---|
CN105956486B (en) | 2019-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105956486A (en) | Remote control method and apparatus | |
CN106489126A (en) | The method and device that a kind of content is shared | |
CN106527883B (en) | Content sharing method and device and terminal | |
CN106020784A (en) | Method and device for displaying application message, and terminal | |
CN105138259A (en) | Operation execution method and operation execution device | |
CN105100432B (en) | Call interface display methods and device | |
CN105472303A (en) | Privacy protection method and apparatus for video chatting | |
CN105975156A (en) | Application interface display method and device | |
CN106126685A (en) | Page loading method and device | |
CN106020634A (en) | Screen capture method and device | |
CN105912951A (en) | Data migration method and device | |
CN105487805A (en) | Object operating method and device | |
CN107992257A (en) | Split screen method and device | |
CN106203650A (en) | Call a taxi and ask sending method and device | |
CN106033397A (en) | Method and device for adjusting memory buffer, and terminal | |
CN109117229A (en) | Screen partition domain display methods and device | |
CN107491681A (en) | Finger print information processing method and processing device | |
CN107168543A (en) | Control method of keyboard and device | |
CN105955684A (en) | Image display method and apparatus | |
CN105187671A (en) | Recording method and device | |
CN105245705A (en) | Telephone prompting method and device | |
CN107423378A (en) | Image display method and device | |
CN104184888A (en) | Call transfer method, device and terminal | |
CN106453774A (en) | Method and apparatus for displaying contact information | |
CN104063423B (en) | A kind of method and device for determining position |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |