CN105956486A - Remote control method and apparatus - Google Patents

Remote control method and apparatus Download PDF

Info

Publication number
CN105956486A
CN105956486A CN201610282464.5A CN201610282464A CN105956486A CN 105956486 A CN105956486 A CN 105956486A CN 201610282464 A CN201610282464 A CN 201610282464A CN 105956486 A CN105956486 A CN 105956486A
Authority
CN
China
Prior art keywords
application
privacy
display interface
page
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610282464.5A
Other languages
Chinese (zh)
Other versions
CN105956486B (en
Inventor
林形省
毛良瑾
葛旭东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610282464.5A priority Critical patent/CN105956486B/en
Publication of CN105956486A publication Critical patent/CN105956486A/en
Application granted granted Critical
Publication of CN105956486B publication Critical patent/CN105956486B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

The invention relates to a remote control method and apparatus, and belongs to the technical field of internet. The method is applied to a first terminal. The method comprises the steps of starting an application when a starting instruction for the application is detected for each application in the first terminal in a process of remote control by a second terminal, and judging whether the application is a private application or not; when the application is the private application, hiding a display interface of the application after starting the application to obtain a hided image of the display interface; and displaying the hided image of the display interface. According to the method and apparatus, the privacy leakage of the first terminal can be effectively prevented to ensure privacy security of the first terminal.

Description

Long-range control method and device
Technical field
It relates to Internet technical field, particularly relate to a kind of long-range control method and device.
Background technology
Along with the development of Internet technology, in order to meet user's demand for terminal management, often can lead to Cross remote control technology and realize the Screen sharing between two or many station terminals and control, wherein, by remotely The terminal controlled is properly termed as first terminal, and the terminal remotely controlled first terminal is properly termed as second Terminal.Owing to remote control technology has high priority control characteristic, this high priority control characteristic is embodied in Second terminal has all permissions being controlled first terminal, so entering first terminal in the second terminal During row remotely controls, the user of the second terminal is used easily to start in first terminal due to maloperation Comprise the application of privacy information, and after this application is activated, first terminal can show the display interface of this application, Thus cause the privacy leakage of first terminal, therefore, need a kind of privacy leakage that can avoid first terminal badly Long-range control method.
Summary of the invention
For overcoming problem present in correlation technique, the disclosure provides a kind of long-range control method and device.
First aspect according to disclosure embodiment, it is provided that a kind of long-range control method, is applied to first terminal, Described method includes:
During by the second terminal remote control, for each application in described first terminal, work as inspection When measuring the enabled instruction for described application, start described application, and judge whether described application is privacy Application;
When described application is privacy application, after starting described application, the display interface of described application is entered Row shielding, obtains the masked images of described display interface;
Show the masked images of described display interface.
In conjunction with first aspect, in the first possible implementation of above-mentioned first aspect, described judgement institute State whether application is privacy application, including:
Judge the first privacy list of storage has stored the most the application identities of described application, described first hidden Private list is for storing the application identities of privacy application;
When described first privacy list has stored the application identities of described application, determine that described application is hidden Private application.
In conjunction with the first possible implementation of first aspect, possible at the second of above-mentioned first aspect In implementation, described method also includes:
For each application in described first terminal, when the first preset instructions for described application being detected Time, the application identities of described application is stored in described first privacy list.
In conjunction with first aspect, in the third possible implementation of above-mentioned first aspect, described to described The display interface of application shields, and obtains the masked images of described display interface, including:
All regions in the display interface of described application are shielded, obtains the interface of described display interface Image;
Described interface image is defined as the masked images of described display interface.
In conjunction with first aspect, in the 4th kind of possible implementation of above-mentioned first aspect, described to described The display interface of application shields, and obtains the masked images of described display interface, including:
All regions in the display interface of described application are shielded, obtains the interface of described display interface Image;
Determining the open region in described interface image, the information in described open region is not privacy information;
Release the shielding to described open region, obtain the masked images of described display interface.
In conjunction with the 4th kind of possible implementation of first aspect, possible the 5th kind of above-mentioned first aspect In implementation, the described open region determined in described interface image, including:
When the first selection instruction for described interface image being detected, select instruction selected by described first The region selected is defined as open region;Or,
When the second selection instruction for described interface image being detected, appointment region is defined as open district Territory, described appointment region be in described interface image except described second select instruction selected by region in addition to Region.
In conjunction with the third possible implementation or the 4th kind of possible implementation of first aspect, upper State in the 6th kind of possible implementation of first aspect, owning in the described display interface to described application Region shields, and obtains the interface image of described display interface, including:
Specify image to cover in all regions in described display interface, obtain the interface of described display interface Image;Or,
The all information designated characters included by described display interface are replaced, and obtain described display interface Interface image.
In conjunction with arbitrary possible realization side in the 5th kind of possible implementation of first aspect to first aspect Formula, in the 7th kind of possible implementation of described first aspect, described method also includes:
For each application in described first terminal, after starting described application, when detecting for described During the idsplay order of function pages of application, it is judged that whether described function pages is the privacy page;
When described function pages is the privacy page, described function pages is shielded, obtain described function The masked images of the page;
Show the masked images of described function pages.
In conjunction with the 7th kind of possible implementation of first aspect, possible the 8th kind of above-mentioned first aspect In implementation, described judge whether described function pages is the privacy page, including:
Judge the second privacy list of storage has stored the most the page iden-tity of described function pages, described the Two privacy lists are for storing the page iden-tity of the privacy page;
When described second privacy list has stored the page iden-tity of described function pages, determine described function The page is the privacy page.
In conjunction with the 7th kind of possible implementation of first aspect, possible the 9th kind of above-mentioned first aspect In implementation, described judge whether described function pages is the privacy page, including:
Judge whether described function pages comprises privacy information;
When described function pages comprises privacy information, determine that described function pages is the privacy page.
Second aspect according to disclosure embodiment, it is provided that a kind of remote control, described device includes:
First judge module, for during by the second terminal remote control, in first terminal Each application, when the enabled instruction for described application being detected, starts described application, and judges described Whether application is privacy application;
First shroud module, for when described application is privacy application, after starting described application, to institute The display interface stating application shields, and obtains the masked images of described display interface;
First display module, for showing the masked images of described display interface.
In conjunction with second aspect, in the first possible implementation of above-mentioned second aspect, described first sentences Disconnected module includes:
First judging unit, has stored answering of described application in the first privacy list judging storage the most By mark, described first privacy list is for storing the application identities of privacy application;
First determines unit, is used for when having stored the application identities of described application in described first privacy list, Determine that described application is privacy application.
In conjunction with the first possible implementation of second aspect, possible at the second of above-mentioned second aspect In implementation, described device also includes:
Memory module, for for each application in described first terminal, when detecting for described application The first preset instructions time, the application identities of described application is stored in described first privacy list.
In conjunction with second aspect, in the third possible implementation of above-mentioned second aspect, described first screen Cover module to include:
Screen unit, for shielding all regions in the display interface of described application, obtains described The interface image of display interface;
Second determines unit, for described interface image is defined as the masked images of described display interface.
In conjunction with second aspect, in the 4th kind of possible implementation of above-mentioned second aspect, described first screen Cover module to include:
Described screen unit, for shielding all regions in the display interface of described application, obtains The interface image of described display interface;
3rd determines unit, for determining the open region in described interface image, in described open region Information is not privacy information;
Lifting unit, for releasing the shielding to described open region, obtains the shielding figure of described display interface Picture.
In conjunction with the 4th kind of possible implementation of second aspect, possible the 5th kind of above-mentioned second aspect In implementation, the described 3rd determines that unit includes:
First determines subelement, is used for when the first selection instruction for described interface image being detected, will Described first selects the region selected by instruction to be defined as open region;Or,
Second determines subelement, is used for when the second selection instruction for described interface image being detected, will Specifying region to be defined as open region, described appointment region is except described second selects to refer in described interface image The region outside region selected by order.
In conjunction with the third possible implementation or the 4th kind of possible implementation of second aspect, upper Stating in the 6th kind of possible implementation of second aspect, described screen unit includes:
Cover subelement, for specifying image to cover in all regions in described display interface, obtain institute State the interface image of display interface;Or,
Replace subelement, replace for all information designated characters that described display interface is included, Interface image to described display interface.
In conjunction with arbitrary possible realization side in the 5th kind of possible implementation of second aspect to second aspect Formula, in the 7th kind of possible implementation of above-mentioned second aspect, described device also includes:
Second judge module, for for each application in described first terminal, after starting described application, When the idsplay order of the function pages detected for described application, it is judged that whether described function pages is hidden The private page;
Secondary shielding module, for when described function pages is the privacy page, is carried out described function pages Shielding, obtains the masked images of described function pages;
Second display module, for showing the masked images of described function pages.
In conjunction with the 7th kind of possible implementation of second aspect, possible the 8th kind of above-mentioned second aspect In implementation, described second judge module includes:
Second judging unit, has stored described function pages in the second privacy list judging storage the most Page iden-tity, described second privacy list is for storing the page iden-tity of the privacy page;
4th determines unit, for when the page mark having stored described function pages in described second privacy list During knowledge, determine that described function pages is the privacy page.
In conjunction with the 7th kind of possible implementation of second aspect, possible the 9th kind of above-mentioned second aspect In implementation, described second judge module includes:
3rd judging unit, is used for judging whether comprise privacy information in described function pages;
5th determines unit, for when comprising privacy information in described function pages, determines described page function Face is the privacy page.
The third aspect according to disclosure embodiment, it is provided that a kind of remote control, described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
During by the second terminal remote control, for each application in first terminal, when detecting During for the enabled instruction of described application, start described application, and judge whether described application is privacy application;
When described application is privacy application, after starting described application, the display interface of described application is entered Row shielding, obtains the masked images of described display interface;
Show the masked images of described display interface.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: in disclosure embodiment In, during first terminal is by the second terminal remote control, for each application in first terminal, When first terminal detects the enabled instruction for this application, start this application, and whether judge this application Applying for privacy, when this application is privacy application, after starting this application, this can be answered by first terminal Display interface shield, obtain the masked images of this display interface, and show the screen of this display interface Cover image.Obtain after this display interface being shielded due to the masked images of this display interface, therefore, The privacy information that comprises in the application of this privacy can be avoided to be known by the second user, such that it is able to effectively prevent the The privacy leakage of one terminal, it is ensured that the personal secrets of first terminal.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe, The disclosure can not be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the present invention Embodiment, and for explaining the principle of the present invention together with description.
Fig. 1 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment.
Fig. 2 is the flow chart according to the another kind of long-range control method shown in an exemplary embodiment.
Fig. 3 is the schematic diagram according to a kind of first privacy list shown in an exemplary embodiment.
Fig. 4 is the schematic diagram according to a kind of display interface shown in an exemplary embodiment.
Fig. 5 (a) is according to a kind of schematic diagram specifying image shown in an exemplary embodiment.
Fig. 5 (b) is the schematic diagram according to a kind of interface image shown in an exemplary embodiment.
Fig. 6 is the schematic diagram according to the another kind of interface image shown in an exemplary embodiment.
Fig. 7 (a) is the schematic diagram according to another interface image shown in an exemplary embodiment.
Fig. 7 (b) is the schematic diagram of the masked images according to a kind of display interface shown in an exemplary embodiment.
Fig. 8 is the schematic diagram according to a kind of second privacy list shown in an exemplary embodiment.
Fig. 9 is the block diagram according to a kind of remote control shown in an exemplary embodiment.
Figure 10 is the block diagram according to a kind of first judge module shown in an exemplary embodiment.
Figure 11 is the block diagram according to a kind of first shroud module shown in an exemplary embodiment.
Figure 12 is the block diagram according to another kind the first shroud module shown in an exemplary embodiment.
Figure 13 is the block diagram determining unit according to a kind of 3rd shown in an exemplary embodiment.
Figure 14 is the block diagram according to a kind of screen unit shown in an exemplary embodiment.
Figure 15 is the block diagram according to the another kind of remote control shown in an exemplary embodiment.
Figure 16 is the block diagram according to a kind of second judge module shown in an exemplary embodiment.
Figure 17 is the block diagram according to another kind the second judge module shown in an exemplary embodiment.
Figure 18 is the block diagram according to another remote control shown in an exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following retouches Stating when relating to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element. Embodiment described in following exemplary embodiment does not represent all embodiment party consistent with the present invention Formula.On the contrary, they only with describe in detail in appended claims, the present invention some in terms of mutually one The example of the apparatus and method caused.
Before disclosure embodiment is carried out explanation explained in detail, the first applied field to disclosure embodiment Scape is explained.In order to meet user's demand for terminal management, remote control technology often can be passed through Realize the Screen sharing between two or many station terminals and control.And due in the second terminal to first terminal During remotely controlling, the second terminal has all permissions being controlled first terminal, so The user using the second terminal easily starts in first terminal the application comprising privacy information due to maloperation, And after this application is activated, first terminal can show the display interface of this application, thus causes first terminal Privacy leakage, therefore, disclosure embodiment provides a kind of long-range control method, avoids first terminal Privacy leakage.
Fig. 1 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment, and the method is used In first terminal.As it is shown in figure 1, the method comprises the following steps.
In a step 101, during by the second terminal remote control, each in first terminal Application, when the enabled instruction for application being detected, starts application, and judges whether apply is that privacy should With.
In a step 102, when application is applied for privacy, the display interface after starting application, to application Shield, obtain the masked images of display interface.
In step 103, the masked images of display interface is shown.
In the disclosed embodiments, during first terminal is by the second terminal remote control, for first Each application in terminal, when first terminal detects the enabled instruction for this application, starts this application, And judge whether this application is privacy application, when this application is privacy application, after starting this application, the The display interface of this application can be shielded by one terminal, obtains the masked images of this display interface, and shows Show the masked images of this display interface.Owing to the masked images of this display interface is to shield this display interface Obtain after covering, it can thus be avoided the privacy information comprised in the application of this privacy is known by the second user, Such that it is able to effectively prevent the privacy leakage of first terminal, it is ensured that the personal secrets of first terminal.
In another embodiment of the disclosure, it is judged that whether application is privacy application, including:
Judging the most to have stored in the first privacy list of storage the application identities of application, the first privacy list is used Application identities in storage privacy application;
When the first privacy list has stored the application identities of application, determine that application is applied for privacy.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when the first preset instructions for application being detected, should Application identities store in the first privacy list.
In another embodiment of the disclosure, the display interface of application is shielded, obtains display interface Masked images, including:
All regions in the display interface of application are shielded, obtains the interface image of display interface;
Interface image is defined as the masked images of display interface.
In another embodiment of the disclosure, the display interface of application is shielded, obtains display interface Masked images, including:
All regions in the display interface of application are shielded, obtains the interface image of display interface;
Determining the open region in interface image, the information in open region is not privacy information;
Release the shielding to open region, obtain the masked images of display interface.
In another embodiment of the disclosure, determine the open region in interface image, including:
When the first selection instruction for interface image being detected, select the region selected by instruction by first It is defined as open region;Or,
When the second selection instruction for interface image being detected, appointment region is defined as open region, Appointment region is the region in interface image in addition to the region selected by the second selection instruction.
In another embodiment of the disclosure, all regions in the display interface of application are shielded, To the interface image of display interface, including:
Specify image to cover in all regions in display interface, obtain the interface image of display interface;Or Person,
The all information designated characters included by display interface are replaced, and obtain the interface image of display interface.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, after starting application, when the page function for application being detected During the idsplay order in face, it is judged that whether function pages is the privacy page;
When function pages is the privacy page, function pages is shielded, obtain the shielding figure of function pages Picture;
The masked images of display function pages.
In another embodiment of the disclosure, it is judged that whether function pages is the privacy page, including:
Judge the second privacy list of storage has stored the most the page iden-tity of function pages, the second privacy row Table is for storing the page iden-tity of the privacy page;
When the second privacy list has stored the page iden-tity of function pages, determine that function pages is privacy page Face.
In another embodiment of the disclosure, it is judged that whether function pages is the privacy page, including:
Whether the arbitration functions page comprises privacy information;
When function pages comprises privacy information, determine that function pages is the privacy page.
Above-mentioned all optional technical schemes, all can be according to arbitrarily combining the alternative embodiment forming the disclosure, this This is repeated by open embodiment the most one by one.
Fig. 2 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment, and the method is used In first terminal.As in figure 2 it is shown, the method comprises the following steps.
In step 201, during by the second terminal remote control, each in first terminal Application, when the enabled instruction for this application being detected, starts this application, and judges that whether this application is Privacy is applied.
It should be noted that enabled instruction is used for starting application, and this enabled instruction can be touched by first user Send out, first user can be triggered by assigned operation, this assigned operation can be single-click operation, double click operation, Voice operatings etc., this is not specifically limited by disclosure embodiment.Wherein, first user is for using first eventually The user of end.
It addition, privacy application can be the application comprising privacy information, it is also possible to for freely being set by first user Fixed application, this is not specifically limited by disclosure embodiment.In one embodiment, this privacy is applied such as Can be instant messaging application, shopping platform application etc..In another embodiment, the application of this privacy is such as also Can be that first user is set as having the application accessing restriction, such as, shooting application, note be applied, are dialled Number application etc..Wherein, privacy information can include ID (identity number) card No., phone number, Bank Account Number, client Title, account balance, birthdate etc., this is not specifically limited by disclosure embodiment.
Wherein, when the enabled instruction for this application being detected, the operation starting this application is referred to phase Pass technology, this is not described in detail by disclosure embodiment.
Wherein, it is judged that when whether this application is privacy application, it can be determined that the first privacy list of storage is The no application identities having stored this application, this first privacy list is for storing the application identities of privacy application; When this first privacy list has stored the application identities of this application, determine that this application is privacy application;When When this first privacy list does not stores the application identities of this application, determine that this application is not applied for privacy.By In directly judging whether this application is privacy application quickly and easily according to this first privacy list, and It is made without other complex operations, it is thus possible to improve judging efficiency.
It should be noted that the first privacy list is for determining the privacy application in first terminal.Such as, when When in this first privacy list, the application identities of storage is application identities 1, application identities 3 and application identities 4, This first privacy list can be to show as form as shown in Figure 3, and certainly, in actual application, this is first hidden Private list can also show as other form, and this is not specifically limited by disclosure embodiment.
It addition, application identities is for uniquely identifying application, and this application identities can be apply Apply Names, Application icons etc., this is not specifically limited by disclosure embodiment.
Such as, the application identities of this application is application identities 1, the application identities of storage in this first privacy list For application identities 1, application identities 3 and application identities 4, then may determine that in this first privacy list and store The application identities of this application, determines that this application is privacy application.
The most such as, the application identities of this application is application identities 2, the application mark of storage in this first privacy list Knowing is application identities 1, application identities 3 and application identities 4, then may determine that in this first privacy list and do not deposit Store up the application identities of this application, determine that this application is not applied for privacy.
Further, it is also possible to for each application in first terminal, when detecting for this application During one preset instructions, the application identities of this application is stored in this first privacy list.
It should be noted that the application identities of application is stored the first privacy for instruction by the first preset instructions In list, this first preset instructions can be triggered by first user, and first user can be touched by assigned operation Sending out, this is not specifically limited by disclosure embodiment.
Owing to this first preset instructions can be triggered by first user, therefore, this application is answered by first terminal The mistake that this first privacy list is operated by the process the most namely first user carrying out storing by mark Journey.And owing to the first privacy list is for determining the privacy application in first terminal, therefore, first user pair The mistake of the privacy application that the process that this first privacy list carries out operating the most namely determines in first terminal Journey, this determines process simple and flexible, is possible not only to save privacy application and really fixes time, it is also possible to meet the The privacy requirements of one user, thus ensure that the personal secrets of first terminal, and improve the behaviour of first user Experience.
It should be noted that before this first privacy list is operated by first user, first terminal is also Can be prestored to specifying application identities in this first privacy list, to reduce privacy application further Determine the time.Wherein, it is intended that application identities can pre-set, can be instant such as this appointment application identities The application identities etc. of the application identities of communication applications, shopping platform application, this is not done by disclosure embodiment has Body limits.
Wherein, the application identities of this application is stored in the operation in this first privacy list and correlation technique The operation that a certain information stores in certain list being similar to, this is not described in detail by disclosure embodiment.
In step 202., when this application is privacy application, after starting this application, this application is shown Show that interface shields, obtain the masked images of this display interface.
It is activated rear shown interface it should be noted that the display interface of application is this application.
Owing to first user may exist different shielding demands to the display interface of this application, as first uses Family may wish to shield all regions in the display interface of this application, or wants this application Subregion in display interface shields, and therefore, it can the shielding demand different according to first user, The display interface of this application is shielded, obtains the masked images of this display interface.And according to first user Different shielding demands, shields the display interface of this application, obtains the masked images of this display interface Operation can be realized by the following two kinds mode:
First kind of way: all regions in the display interface of this application are shielded, obtains this display circle The interface image in face, is defined as the masked images of this display interface by this interface image.
Show it should be noted that the masked images of this display interface obtained by above-mentioned first kind of way is this Showing the full-shield image at interface, all regions in this full-shield image are all shielded, and this full-shield image can To meet the first user full-shield demand to this display interface, all letters that now this display interface includes Breath all will not be compromised, thereby may be ensured that the personal secrets of first terminal.
Wherein, all regions in the display interface of this application are shielded, obtains the boundary of this display interface During the image of face, image can be specified to cover all regions in this display interface, obtain this display interface Interface image;Or, all information designated characters included by this display interface are replaced, and are somebody's turn to do The interface image of display interface, certainly, in actual application, it is also possible to otherwise to this display interface In all regions shield, obtain the interface image of this display interface, this is not done by disclosure embodiment Concrete restriction.
It should be noted that specify image can pre-set, as this appointment image can be mosaic image, Solid block of color image or other image, this is not specifically limited by disclosure embodiment.
It addition, designated character can pre-set, if this designated character can be symbol *, #, % etc., number Words 1,2,3 etc., this is not specifically limited by disclosure embodiment.
Such as, this display interface is interface as shown in Figure 4, it is intended that image is the figure as shown in Fig. 5 (a) Picture, then can cover all regions in this display interface with this appointment image, obtain such as Fig. 5 (b) institute The interface image of this display interface shown.
The most such as, this display interface is interface as shown in Figure 4, it is intended that character is symbol *, then can will be somebody's turn to do All information that display interface includes are replaced with this designated character, obtain this display interface as shown in Figure 6 Interface image.
The second way: all regions in the display interface of this application are shielded, obtains this display circle The interface image in face;Determining the open region in this interface image, the information in the disclosure region is not privacy Information;Release the shielding to the disclosure region, obtain the masked images of this display interface.
Show it should be noted that the masked images of this display interface obtained by the above-mentioned second way is this Showing the partly shielding effect image at interface, in this partly shielding effect image, the region in addition to open region is all shielded, This partly shielding effect image can meet the first user partly shielding effect demand to this display interface, now this display In interface, all information in region in addition to open region all will not be compromised, thereby may be ensured that first The personal secrets of terminal.
Such as, all regions in the display interface of this application are shielded by first terminal, obtain such as Fig. 7 Interface image shown in (a), it is assumed that first terminal determines that the open region in this interface image is Fig. 7 (a) Region 1 in shown interface image, then can release the shielding to open region 1, obtain such as Fig. 7 (b) The masked images of this shown display interface.
Wherein, all regions in the display interface of this application are shielded, obtains the boundary of this display interface The operation of face image is identical with the operation in above-mentioned first kind of way, and disclosure embodiment does not repeats them here.
Wherein it is determined that during open region in this display interface, can work as and detect for this interface image During the first selection instruction, the region selected by this first selection instruction is defined as open region;Or, when When the second selection instruction for this interface image being detected, appointment region being defined as open region, this refers to Determine region be in this interface image except this second select instruction selected by region in addition to region.
It should be noted that first selects instruction for selecting open region from this interface image, this is first years old Selecting instruction can be triggered by first user, first user can be triggered by assigned operation, and the disclosure is implemented This is not specifically limited by example.
It addition, second selects instruction for selection privacy area from this interface image, this privacy area is should Region in addition to viewing area in interface image, this second selects instruction can be triggered by first user, the One user can be triggered by assigned operation, and this is not specifically limited by disclosure embodiment.
Furthermore, owing to first selects instruction and second to select instruction all can be triggered by first user, therefore, Selecting to instruct the process selecting region by the first selection instruction or second in disclosure embodiment should in reality In with, first user can be shown as to some region of frame selection operation, first user by virtual painting dauber Tool is to some region of slide etc., and this is not specifically limited by disclosure embodiment.
Such as, the interface image of this display interface is the image as shown in Fig. 7 (a), and first selects instruction institute The region selected is the region 1 in the interface image shown in Fig. 7 (a), then region 1 can be defined as public affairs Open region.
The most such as, the interface image of this display interface is the image as shown in Fig. 7 (a), and second selects instruction Selected region is the region 2 in the interface image shown in Fig. 7 (a), then can be by this interface image Region 1 in addition to region 2 is defined as specifying region, and this appointment region 1 is defined as open region.
Wherein, when releasing the shielding to the disclosure region, can be according to the first terminal institute to this display interface There is region to carry out the operation shielded, the disclosure region is carried out correspondingly inverse operation, to release the disclosure district The shielding in territory, the information in display the disclosure region.
Such as, all regions in this display interface specify image to cover, the most now can be to these public affairs The appointment image covered on open region eliminates, and to release the shielding to the disclosure region, shows the disclosure Information in region.
The most such as, all information designated characters included in this display interface are replaced, then this Time all designated characters that can include the disclosure region are counter replaces, to release the disclosure region Shielding, display the disclosure region in information.
In step 203, the masked images of this display interface is shown.
It should be noted that show a certain in showing the operation of the masked images of this display interface and correlation technique The operation of image is similar to, and this is not described in detail by disclosure embodiment.
It should be noted that when the full-shield image that masked images is this display interface of this display interface, All regions in the masked images of this display interface are all shielded, thus when the second user is due to maloperation When opening the privacy application in first terminal, the privacy information comprised in the application of this privacy can be avoided by second User is known, it is to avoid the privacy leakage of first terminal, and is possible to prevent the second user to continue this display circle Face operates, it is ensured that the personal secrets of first terminal.
It addition, when the partly shielding effect image that masked images is this display interface of this display interface, this display In the masked images at interface, the region in addition to open region is all shielded, due to the information in the disclosure region It is not privacy information, therefore, when the second user opens the privacy application in first terminal due to maloperation, The privacy information that comprises in the application of this privacy is equally avoided to be known by the second user, it is to avoid first terminal Privacy leakage, it is ensured that the personal secrets of first terminal.And due to aobvious in the masked images of this display interface It is shown with the information in the disclosure region, such that it is able to be easy to first user or the second user knows these public affairs in time Information in open region, and be easy to first user or the second user to the information in the disclosure region at Reason, improves Consumer's Experience.
Further, it is also possible to for each application in first terminal, after starting this application, work as detection To during for the idsplay order of the function pages of this application, it is judged that whether this function pages is the privacy page;When When this function pages is the privacy page, this function pages is shielded, obtain the shielding figure of this function pages Picture;Show the masked images of this function pages.
It should be noted that the function pages of application is shown after the functional module in this application is opened The page.
It addition, idsplay order is used for showing this function pages, and this idsplay order can be triggered by first user, First user can be triggered by assigned operation, and this is not specifically limited by disclosure embodiment.
Furthermore, the privacy page can be the page comprising privacy information, it is also possible to for freely being set by first user The fixed page, this is not specifically limited by disclosure embodiment.In one embodiment, this privacy page is such as Can be the address list page, the page etc. is set.In another embodiment, this privacy page can also be such as First user is set as having the page accessing restriction, such as, collects the page, the historical record page etc..
Wherein, it is judged that whether this function pages is that the operation of the privacy page can be realized by the following two kinds mode.
First kind of way: judge the most to have stored in the second privacy list of storage the page mark of this function pages Knowing, this second privacy list is for storing the page iden-tity of the privacy page;When this second privacy list is deposited When storing up the page iden-tity of this function pages, determine that this function pages is the privacy page;When this second privacy list In when not storing the page iden-tity of this function pages, determine that this function pages is for the privacy page.
It should be noted that above-mentioned first kind of way can directly be come simple fast according to this second privacy list Judge whether this function pages is the privacy page fastly, without carrying out other complex operations, such that it is able to Improve judging efficiency.
It should be noted that the second privacy list is for determining the privacy page in application.Such as, when this In two privacy lists, the page iden-tity of storage is when being page iden-tity 1, page iden-tity 3 and page iden-tity 4, and this is the years old Two privacy lists can be to show as form as shown in Figure 8, and certainly, in actual application, this second privacy arranges Table can also show as other form, and this is not specifically limited by disclosure embodiment.
It addition, page iden-tity is for unique identified page, and this page iden-tity can be the page name of this page Claiming, this is not specifically limited by disclosure embodiment.
Such as, the page iden-tity of this function pages is page iden-tity 1, the page of storage in this second privacy list It is designated page iden-tity 1, page iden-tity 3 and page iden-tity 4, then may determine that in this second privacy list Store the page iden-tity of this function pages, determine that this function pages is the privacy page.
The most such as, the page iden-tity of this function pages is page iden-tity 2, the page of storage in this second privacy list Face is designated page iden-tity 1, page iden-tity 3 and page iden-tity 4, then may determine that in this second privacy list Do not store the page iden-tity of this function pages, determine that this function pages is not for the privacy page.
Further, it is also possible to for each function pages in this application, when detecting for this page function During second preset instructions in face, the page iden-tity of this function pages is stored in this second privacy list.
It should be noted that the page iden-tity of this function pages is stored for instruction by the second preset instructions In two privacy lists, this second preset instructions can be triggered by first user, and first user can be by specifying Operation triggers, and this is not specifically limited by disclosure embodiment.
Owing to this second preset instructions can be triggered by first user, therefore, first terminal is to this function pages The page iden-tity process the most namely first user that carries out storing this second privacy list is operated Process.And owing to the second privacy list is for determining the privacy page in application, therefore, first user pair The process that this second privacy list carries out operating the most namely determines the process of the privacy page in application, This determines process simple and flexible, is possible not only to save the privacy page and really fixes time, it is also possible to meets the first use The privacy requirements at family, thus ensure that the personal secrets of first terminal, and improve the operating body of first user Test.
It should be noted that before this second privacy list is operated by first user, first terminal is also Specified page mark can be prestored in this second privacy list, to reduce the privacy page further Determine the time.Wherein, it is intended that page iden-tity can pre-set, as this specified page mark can be communication Recording the page iden-tity of the page, arrange the page iden-tity etc. of the page, this is not specifically limited by disclosure embodiment.
Wherein, the page iden-tity of this function pages is stored the operation in this second privacy list and relevant skill The operation that a certain information stores in certain list being similar in art, this is not carried out in detail by disclosure embodiment Illustrate.
The second way: judge whether comprise privacy information in this function pages;When this function pages comprises During privacy information, determine that this function pages is the privacy page;When this function pages does not comprises privacy information, Determine that this function pages is not for the privacy page.
It should be noted that whether the above-mentioned second way comprises privacy information according only in this function pages It may determine that whether this function pages is the privacy page, this judge process simple and flexible, it is judged that efficiency is higher, As long as and which information predetermined is privacy information, it is possible to all of function pages in application is carried out standard Really judge, it is judged that accuracy rate is the highest.
Wherein, it is judged that the operation whether comprising privacy information in this function pages is referred to correlation technique, originally This is not specifically limited by open embodiment.
Such as, whether privacy information is ID (identity number) card No., then wrap during first terminal may determine that this function pages Containing ID (identity number) card No., when this function pages comprises ID (identity number) card No., it may be determined that this function pages is hidden The private page, when not comprising ID (identity number) card No. in this function pages, it may be determined that this function pages is not privacy The page.
Wherein, when this function pages is the privacy page, this function pages is shielded, obtain this function The operation of the masked images of the page is similar with the operation in above-mentioned steps 202, and disclosure embodiment is to this no longer Repeat.
Wherein, show this function pages masked images operation and correlation technique in show the behaviour of a certain image Being similar to, this is not described in detail by disclosure embodiment.
It should be noted that in disclosure embodiment, when this function pages is the privacy page, can be to this Function pages shields, and obtains the masked images of this function pages, and shows the shielding figure of this function pages Picture, thus when the second user opens the privacy page in application due to maloperation, this privacy can be avoided The privacy information comprised in the page is known by the second user, it is to avoid the privacy leakage of first terminal, it is ensured that The personal secrets of first terminal.
In the disclosed embodiments, during first terminal is by the second terminal remote control, for first Each application in terminal, when first terminal detects the enabled instruction for this application, starts this application, And judge whether this application is privacy application, when this application is privacy application, after starting this application, the The display interface of this application can be shielded by one terminal, obtains the masked images of this display interface, and shows Show the masked images of this display interface.Owing to the masked images of this display interface is to shield this display interface Obtain after covering, it can thus be avoided the privacy information comprised in the application of this privacy is known by the second user, Such that it is able to effectively prevent the privacy leakage of first terminal, it is ensured that the personal secrets of first terminal.
Fig. 9 is the block diagram according to a kind of remote control shown in an exemplary embodiment.With reference to Fig. 9, should Device includes the first judge module 901, the first shroud module 902 and the first display module 903.
First judge module 901, for during by the second terminal remote control, in first terminal Each application, when the enabled instruction for application being detected, start application, and judge to apply and be whether Privacy is applied;
First shroud module 902, for when application is applied for privacy, after starting application, showing application Show that interface shields, obtain the masked images of display interface;
First display module 903, for showing the masked images of display interface.
In another embodiment of the disclosure, with reference to Figure 10, this first judge module 901 includes the first judgement Unit 9011 and first determines unit 9012.
First judging unit 9011, has stored answering of application in the first privacy list judging storage the most By mark, the first privacy list is for storing the application identities of privacy application;
First determines unit 9012, is used for when having stored the application identities of application in the first privacy list, really Fixed application is applied for privacy.
In another embodiment of the disclosure, this device also includes memory module.
Memory module, for for each application in first terminal, when detecting that for application first is pre- If during instruction, the application identities of application being stored in the first privacy list.
In another embodiment of the disclosure, with reference to Figure 11, this first shroud module 902 includes screen unit 9021 and the 3rd determine unit 9022.
Screen unit 9021, for shielding all regions in the display interface of application, is shown The interface image at interface;
Second determines unit 9022, for interface image is defined as the masked images of display interface.
In another embodiment of the disclosure, with reference to Figure 12, this first shroud module 902 includes screen unit 9021, the 3rd determines unit 9023 and lifting unit 9024.
Screen unit 9021, for shielding all regions in the display interface of application, is shown The interface image at interface;
4th determines unit 9023, the information for determining the open region in interface image, in open region It it is not privacy information;
Lifting unit 9024, for releasing the shielding to open region, obtains the masked images of display interface.
In another embodiment of the disclosure, with reference to Figure 13, the 3rd determines that unit 9023 includes that first determines Subelement 90231 and second determines subelement 90232.
First determines subelement 90231, is used for when the first selection instruction for interface image being detected, will First selects the region selected by instruction to be defined as open region;Or,
Second determines subelement 90232, is used for when the second selection instruction for interface image being detected, will Region is specified to be defined as open region, it is intended that region is except the district selected by the second selection instruction in interface image Region outside territory.
In another embodiment of the disclosure, with reference to Figure 14, this screen unit 9021 includes covering subelement 90211 and replace subelement 90212.
Cover subelement 90211, for specifying image to cover in all regions in display interface, shown Show the interface image at interface;Or,
Replace subelement 90212, replace for all information designated characters that display interface is included, Interface image to display interface.
In another embodiment of the disclosure, with reference to Figure 15, this device also includes the second judge module 904, Secondary shielding module 905 and the second display module 906.
Second judge module 904, for for each application in first terminal, after starting application, working as inspection When measuring the idsplay order for the function pages applied, it is judged that whether function pages is the privacy page;
Secondary shielding module 905, for when function pages is the privacy page, shields function pages, Obtain the masked images of function pages;
Second display module 906, for showing the masked images of function pages.
In another embodiment of the disclosure, with reference to Figure 16, this second judge module 904 includes the second judgement Unit 9041 and the 4th determines unit 9042.
Second judging unit 9041, has stored function pages in the second privacy list judging storage the most Page iden-tity, the second privacy list is for storing the page iden-tity of the privacy page;
4th determines unit 9042, is used for when having stored the page iden-tity of function pages in the second privacy list, Determine that function pages is the privacy page.
In another embodiment of the disclosure, with reference to Figure 17, this second judge module 904 includes the 3rd judgement Unit 9043 and the 5th determines unit 9044.
Whether the 3rd judging unit 9043, comprise privacy information in the arbitration functions page;
5th determines unit 9044, for when comprising privacy information in function pages, determines that function pages is The privacy page.
In the disclosed embodiments, during first terminal is by the second terminal remote control, for first Each application in terminal, when first terminal detects the enabled instruction for this application, starts this application, And judge whether this application is privacy application, when this application is privacy application, after starting this application, the The display interface of this application can be shielded by one terminal, obtains the masked images of this display interface, and shows Show the masked images of this display interface.Owing to the masked images of this display interface is to shield this display interface Obtain after covering, it can thus be avoided the privacy information comprised in the application of this privacy is known by the second user, Such that it is able to effectively prevent the privacy leakage of first terminal, it is ensured that the personal secrets of first terminal.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation relevant The embodiment of the method is described in detail, explanation will be not set forth in detail herein.
Figure 18 is the block diagram according to a kind of device 1800 for image transmitting shown in an exemplary embodiment. Such as, device 1800 can be mobile phone, computer, digital broadcast terminal, messaging devices, trip Play control station, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Figure 18, device 1800 can include following one or more assembly: processes assembly 1802, deposits Reservoir 1804, power supply module 1806, multimedia groupware 1808, audio-frequency assembly 1810, input/output (I/O) Interface 1812, sensor cluster 1814, and communications component 1816.
Process assembly 1802 and generally control the integrated operation of device 1800, such as with display, call, The operation that data communication, camera operation and record operation are associated.Process assembly 1802 can include one or Multiple processors 1820 perform instruction, to complete all or part of step of above-mentioned method.Additionally, place Reason assembly 1802 can include one or more module, it is simple to processes between assembly 1802 and other assemblies Alternately.Such as, process assembly 1802 and can include multi-media module, to facilitate multimedia groupware 1808 He Process between assembly 1802 is mutual.
Memorizer 1804 is configured to store various types of data to support the operation at device 1800.This The example of a little data includes any application program for operation on device 1800 or the instruction of method, contact Personal data, telephone book data, message, picture, video etc..Memorizer 1804 can by any kind of easily The property lost or non-volatile memory device or combinations thereof realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, Flash memory, disk or CD.
The various assemblies that power supply module 1806 is device 1800 provide power supply.Power supply module 1806 can include Power-supply management system, one or more power supplys, and other with generate for device 1800, manage and distribute power supply The assembly being associated.
One output of offer that multimedia groupware 1808 is included between described device 1800 and controlled user connects The screen of mouth.In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP). If screen includes that touch panel, screen may be implemented as touch screen, to receive defeated from controlled user Enter signal.Touch panel includes that one or more touch sensor touches with sensing, slides and on touch panel Gesture.Described touch sensor can not only sense touch or the border of sliding action, but also detection with Persistent period that described touch or slide are relevant and pressure.In certain embodiments, multimedia groupware 1808 Including a front-facing camera and/or post-positioned pick-up head.When device 1800 is in operator scheme, such as screening-mode Or during video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each Front-facing camera and post-positioned pick-up head can be a fixing optical lens system or have focal length and optics change Burnt ability.
Audio-frequency assembly 1810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 1810 wraps Include a mike (MIC), when device 1800 is in operator scheme, such as call model, logging mode and language During sound recognition mode, mike is configured to receive external audio signal.The audio signal received can be by It is further stored in memorizer 1804 or sends via communications component 1816.In certain embodiments, audio frequency Assembly 1810 also includes a speaker, is used for exporting audio signal.
I/O interface 1812 provides interface for processing between assembly 1802 and peripheral interface module, above-mentioned periphery connects Mouth die block can be keyboard, puts striking wheel, button etc..These buttons may include but be not limited to: home button, Volume button, start button and locking press button.
Sensor cluster 1814 includes one or more sensor, for providing various aspects for device 1800 State estimation.Such as, what sensor cluster 1814 can detect device 1800 opens/closed mode, The relative localization of assembly, the most described assembly is display and the keypad of device 1800, sensor cluster 1814 Device 1800 or the position change of 1,800 1 assemblies of device, controlled user and device 1800 can also be detected The presence or absence of contact, device 1800 orientation or acceleration/deceleration and the variations in temperature of device 1800.Pass Sensor assembly 1814 can include proximity transducer, is configured to when not having any physical contact detect The existence of neighbouring object.Sensor cluster 1814 can also include optical sensor, as CMOS or CCD schemes As sensor, for using in imaging applications.In certain embodiments, this sensor cluster 1814 also may be used To include acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 1816 is configured to facilitate wired or wireless mode between device 1800 and other equipment Communication.Device 1800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or it Combination.In one exemplary embodiment, communication component 1816 receives from outside via broadcast channel The broadcast singal of broadcasting management systems or broadcast related information.In one exemplary embodiment, described communication Assembly 1816 also includes near-field communication (NFC) module, to promote junction service.Such as, in NFC module Can be based on RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB) Technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1800 can be by one or more application specific integrated circuits (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), FPGA Device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or its He realizes by electronic component, is used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable storage medium including instruction is additionally provided Matter, such as, include the memorizer 1804 of instruction, and above-mentioned instruction can be performed by the processor 1820 of device 1800 To complete said method.Such as, described non-transitory computer-readable recording medium can be ROM, random Access memorizer (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is by mobile terminal Processor when performing so that mobile terminal is able to carry out a kind of long-range control method, and described method includes:
During by the second terminal remote control, for each application in first terminal, when detecting During for the enabled instruction applied, start application, and judge whether apply is privacy application;
When application is applied for privacy, after starting application, the display interface of application is shielded, obtains The masked images of display interface;
The masked images of display display interface.
In another embodiment of the disclosure, it is judged that whether application is privacy application, including:
Judging the most to have stored in the first privacy list of storage the application identities of application, the first privacy list is used Application identities in storage privacy application;
When the first privacy list has stored the application identities of application, determine that application is applied for privacy.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when the first preset instructions for application being detected, should Application identities store in the first privacy list.
In another embodiment of the disclosure, the display interface of application is shielded, obtains display interface Masked images, including:
All regions in the display interface of application are shielded, obtains the interface image of display interface;
Interface image is defined as the masked images of display interface.
In another embodiment of the disclosure, the display interface of application is shielded, obtains display interface Masked images, including:
All regions in the display interface of application are shielded, obtains the interface image of display interface;
Determining the open region in interface image, the information in open region is not privacy information;
Release the shielding to open region, obtain the masked images of display interface.
In another embodiment of the disclosure, determine the open region in interface image, including:
When the first selection instruction for interface image being detected, select the region selected by instruction by first It is defined as open region;Or,
When the second selection instruction for interface image being detected, appointment region is defined as open region, Appointment region is the region in interface image in addition to the region selected by the second selection instruction.
In another embodiment of the disclosure, all regions in the display interface of application are shielded, To the interface image of display interface, including:
Specify image to cover in all regions in display interface, obtain the interface image of display interface;Or Person,
The all information designated characters included by display interface are replaced, and obtain the interface image of display interface.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, after starting application, when the page function for application being detected During the idsplay order in face, it is judged that whether function pages is the privacy page;
When function pages is the privacy page, function pages is shielded, obtain the shielding figure of function pages Picture;
The masked images of display function pages.
In another embodiment of the disclosure, it is judged that whether function pages is the privacy page, including:
Judge the second privacy list of storage has stored the most the page iden-tity of function pages, the second privacy row Table is for storing the page iden-tity of the privacy page;
When the second privacy list has stored the page iden-tity of function pages, determine that function pages is privacy page Face.
In another embodiment of the disclosure, it is judged that whether function pages is the privacy page, including:
Whether the arbitration functions page comprises privacy information;
When function pages comprises privacy information, determine that function pages is the privacy page.
In the disclosed embodiments, during first terminal is by the second terminal remote control, for first Each application in terminal, when first terminal detects the enabled instruction for this application, starts this application, And judge whether this application is privacy application, when this application is privacy application, after starting this application, the The display interface of this application can be shielded by one terminal, obtains the masked images of this display interface, and shows Show the masked images of this display interface.Owing to the masked images of this display interface is to shield this display interface Obtain after covering, it can thus be avoided the privacy information comprised in the application of this privacy is known by the second user, Such that it is able to effectively prevent the privacy leakage of first terminal, it is ensured that the personal secrets of first terminal.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to this Other bright embodiment.The application is intended to any modification, purposes or the adaptations of the present invention, These modification, purposes or adaptations are followed the general principle of the present invention and include that the disclosure is not disclosed Common knowledge in the art or conventional techniques means.Description and embodiments is considered only as exemplary , true scope and spirit of the invention are pointed out by claim below.
It should be appreciated that the invention is not limited in accurate knot described above and illustrated in the accompanying drawings Structure, and various modifications and changes can carried out without departing from the scope.The scope of the present invention is only by appended Claim limits.

Claims (21)

1. a long-range control method, it is characterised in that be applied to first terminal, described method includes:
During by the second terminal remote control, for each application in described first terminal, work as inspection When measuring the enabled instruction for described application, start described application, and judge whether described application is privacy Application;
When described application is privacy application, after starting described application, the display interface of described application is entered Row shielding, obtains the masked images of described display interface;
Show the masked images of described display interface.
2. the method for claim 1, it is characterised in that described judge whether described application is privacy Application, including:
Judge the first privacy list of storage has stored the most the application identities of described application, described first hidden Private list is for storing the application identities of privacy application;
When described first privacy list has stored the application identities of described application, determine that described application is hidden Private application.
3. method as claimed in claim 2, it is characterised in that described method also includes:
For each application in described first terminal, when the first preset instructions for described application being detected Time, the application identities of described application is stored in described first privacy list.
4. the method for claim 1, it is characterised in that the described display interface to described application enters Row shielding, obtains the masked images of described display interface, including:
All regions in the display interface of described application are shielded, obtains the interface of described display interface Image;
Described interface image is defined as the masked images of described display interface.
5. the method for claim 1, it is characterised in that the described display interface to described application Shield, obtain the masked images of described display interface, including:
All regions in the display interface of described application are shielded, obtains the interface of described display interface Image;
Determining the open region in described interface image, the information in described open region is not privacy information;
Release the shielding to described open region, obtain the masked images of described display interface.
6. method as claimed in claim 5, it is characterised in that the described public affairs determined in described interface image Open region, including:
When the first selection instruction for described interface image being detected, select instruction selected by described first The region selected is defined as open region;Or,
When the second selection instruction for described interface image being detected, appointment region is defined as open district Territory, described appointment region be in described interface image except described second select instruction selected by region in addition to Region.
7. the method as described in claim 4 or 5, it is characterised in that described display circle to described application All regions in face shield, and obtain the interface image of described display interface, including:
Specify image to cover in all regions in described display interface, obtain the interface of described display interface Image;Or,
The all information designated characters included by described display interface are replaced, and obtain described display interface Interface image.
8. the method as described in claim 1-6 any claim, it is characterised in that described method is also wrapped Include:
For each application in described first terminal, after starting described application, when detecting for described During the idsplay order of function pages of application, it is judged that whether described function pages is the privacy page;
When described function pages is the privacy page, described function pages is shielded, obtain described function The masked images of the page;
Show the masked images of described function pages.
9. method as claimed in claim 8, it is characterised in that described judge that whether described function pages is The privacy page, including:
Judge the second privacy list of storage has stored the most the page iden-tity of described function pages, described the Two privacy lists are for storing the page iden-tity of the privacy page;
When described second privacy list has stored the page iden-tity of described function pages, determine described function The page is the privacy page.
10. method as claimed in claim 8, it is characterised in that described whether judge described function pages For the privacy page, including:
Judge whether described function pages comprises privacy information;
When described function pages comprises privacy information, determine that described function pages is the privacy page.
11. 1 kinds of remote controls, it is characterised in that described device includes:
First judge module, for during by the second terminal remote control, in first terminal Each application, when the enabled instruction for described application being detected, starts described application, and judges described Whether application is privacy application;
First shroud module, for when described application is privacy application, after starting described application, to institute The display interface stating application shields, and obtains the masked images of described display interface;
First display module, for showing the masked images of described display interface.
12. devices as claimed in claim 11, it is characterised in that described first judge module includes:
First judging unit, has stored answering of described application in the first privacy list judging storage the most By mark, described first privacy list is for storing the application identities of privacy application;
First determines unit, is used for when having stored the application identities of described application in described first privacy list, Determine that described application is privacy application.
13. devices as claimed in claim 12, it is characterised in that described device also includes:
Memory module, for for each application in described first terminal, when detecting for described application The first preset instructions time, the application identities of described application is stored in described first privacy list.
14. devices as claimed in claim 11, it is characterised in that described first shroud module includes:
Screen unit, for shielding all regions in the display interface of described application, obtains described The interface image of display interface;
Second determines unit, for described interface image is defined as the masked images of described display interface.
15. devices as claimed in claim 11, it is characterised in that described first shroud module includes:
Described screen unit, for shielding all regions in the display interface of described application, obtains The interface image of described display interface;
3rd determines unit, for determining the open region in described interface image, in described open region Information is not privacy information;
Lifting unit, for releasing the shielding to described open region, obtains the shielding figure of described display interface Picture.
16. devices as claimed in claim 15, it is characterised in that the described 3rd determines that unit includes:
First determines subelement, is used for when the first selection instruction for described interface image being detected, will Described first selects the region selected by instruction to be defined as open region;Or,
Second determines subelement, is used for when the second selection instruction for described interface image being detected, will Specifying region to be defined as open region, described appointment region is except described second selects to refer in described interface image The region outside region selected by order.
17. devices as described in claims 14 or 15, it is characterised in that described screen unit includes:
Cover subelement, for specifying image to cover in all regions in described display interface, obtain institute State the interface image of display interface;Or,
Replace subelement, replace for all information designated characters that described display interface is included, Interface image to described display interface.
18. devices as described in claim 11-16 any claim, it is characterised in that described device is also Including:
Second judge module, for for each application in described first terminal, after starting described application, When the idsplay order of the function pages detected for described application, it is judged that whether described function pages is hidden The private page;
Secondary shielding module, for when described function pages is the privacy page, is carried out described function pages Shielding, obtains the masked images of described function pages;
Second display module, for showing the masked images of described function pages.
19. devices as claimed in claim 18, it is characterised in that described second judge module includes:
Second judging unit, has stored described function pages in the second privacy list judging storage the most Page iden-tity, described second privacy list is for storing the page iden-tity of the privacy page;
4th determines unit, for when the page mark having stored described function pages in described second privacy list During knowledge, determine that described function pages is the privacy page.
20. devices as claimed in claim 18, it is characterised in that described second judge module includes:
3rd judging unit, is used for judging whether comprise privacy information in described function pages;
5th determines unit, for when comprising privacy information in described function pages, determines described page function Face is the privacy page.
21. 1 kinds of remote controls, it is characterised in that described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
During by the second terminal remote control, for each application in first terminal, when detecting During for the enabled instruction of described application, start described application, and judge whether described application is privacy application;
When described application is privacy application, after starting described application, the display interface of described application is entered Row shielding, obtains the masked images of described display interface;
Show the masked images of described display interface.
CN201610282464.5A 2016-04-29 2016-04-29 Long-range control method and device Active CN105956486B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610282464.5A CN105956486B (en) 2016-04-29 2016-04-29 Long-range control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610282464.5A CN105956486B (en) 2016-04-29 2016-04-29 Long-range control method and device

Publications (2)

Publication Number Publication Date
CN105956486A true CN105956486A (en) 2016-09-21
CN105956486B CN105956486B (en) 2019-03-08

Family

ID=56914371

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610282464.5A Active CN105956486B (en) 2016-04-29 2016-04-29 Long-range control method and device

Country Status (1)

Country Link
CN (1) CN105956486B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778331A (en) * 2016-11-29 2017-05-31 广东电网有限责任公司信息中心 A kind of monitoring method of application program, apparatus and system
CN107220538A (en) * 2017-06-27 2017-09-29 广东欧珀移动通信有限公司 Pay class application management method, device and mobile terminal
CN107358111A (en) * 2017-08-28 2017-11-17 维沃移动通信有限公司 A kind of method for secret protection and mobile terminal
CN107682538A (en) * 2017-09-27 2018-02-09 北京小米移动软件有限公司 The display methods and device of application interface
CN109451141A (en) * 2018-09-26 2019-03-08 维沃移动通信有限公司 A kind of method of controlling operation thereof and associated terminal
CN111277807A (en) * 2020-01-14 2020-06-12 广东小天才科技有限公司 Projection implementation method, wearable device, display device and storage medium
WO2020155444A1 (en) * 2019-01-30 2020-08-06 上海传英信息技术有限公司 Application permission control method, lower-level terminal, and upper-level terminal
CN114286178A (en) * 2021-12-31 2022-04-05 神思电子技术股份有限公司 Privacy data protection method, device and medium based on remote control

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201203870Y (en) * 2007-12-28 2009-03-04 北京帮助在线信息技术有限公司 Apparatus for protecting on-line help transparent window privacy
CN101470787A (en) * 2007-12-28 2009-07-01 北京帮助在线信息技术有限公司 Apparatus and method used for transparent window intimacy protection of on-line help
CN101470786A (en) * 2007-12-28 2009-07-01 北京帮助在线信息技术有限公司 Apparatus and method used for transparent window intimacy protection of on-line help
CN103077361A (en) * 2012-12-28 2013-05-01 东莞宇龙通信科技有限公司 Mobile terminal and anti-spy method thereof
CN103237047A (en) * 2013-03-11 2013-08-07 广东欧珀移动通信有限公司 Remote controlled and control method
CN104298484A (en) * 2014-10-17 2015-01-21 深圳市中兴移动通信有限公司 Multi-screen interaction method and device
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN104680090A (en) * 2015-02-06 2015-06-03 西安酷派软件科技有限公司 Application hiding control method, device and mobile terminal
CN105069374A (en) * 2015-08-06 2015-11-18 上海斐讯数据通信技术有限公司 Private data intercepting protection method and system
CN105095770A (en) * 2014-04-18 2015-11-25 海信集团有限公司 Method and device for multi-screen interaction of multimedia resource

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201203870Y (en) * 2007-12-28 2009-03-04 北京帮助在线信息技术有限公司 Apparatus for protecting on-line help transparent window privacy
CN101470787A (en) * 2007-12-28 2009-07-01 北京帮助在线信息技术有限公司 Apparatus and method used for transparent window intimacy protection of on-line help
CN101470786A (en) * 2007-12-28 2009-07-01 北京帮助在线信息技术有限公司 Apparatus and method used for transparent window intimacy protection of on-line help
CN103077361A (en) * 2012-12-28 2013-05-01 东莞宇龙通信科技有限公司 Mobile terminal and anti-spy method thereof
CN103237047A (en) * 2013-03-11 2013-08-07 广东欧珀移动通信有限公司 Remote controlled and control method
CN105095770A (en) * 2014-04-18 2015-11-25 海信集团有限公司 Method and device for multi-screen interaction of multimedia resource
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN104298484A (en) * 2014-10-17 2015-01-21 深圳市中兴移动通信有限公司 Multi-screen interaction method and device
CN104680090A (en) * 2015-02-06 2015-06-03 西安酷派软件科技有限公司 Application hiding control method, device and mobile terminal
CN105069374A (en) * 2015-08-06 2015-11-18 上海斐讯数据通信技术有限公司 Private data intercepting protection method and system

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778331A (en) * 2016-11-29 2017-05-31 广东电网有限责任公司信息中心 A kind of monitoring method of application program, apparatus and system
CN107220538A (en) * 2017-06-27 2017-09-29 广东欧珀移动通信有限公司 Pay class application management method, device and mobile terminal
CN107358111B (en) * 2017-08-28 2019-11-22 维沃移动通信有限公司 A kind of method for secret protection and mobile terminal
CN107358111A (en) * 2017-08-28 2017-11-17 维沃移动通信有限公司 A kind of method for secret protection and mobile terminal
US10922444B2 (en) 2017-09-27 2021-02-16 Beijing Xiaomi Mobile Software Co., Ltd. Method and apparatus for displaying application interface
WO2019062115A1 (en) * 2017-09-27 2019-04-04 北京小米移动软件有限公司 Method and apparatus for displaying application interface
KR20190042612A (en) * 2017-09-27 2019-04-24 베이징 시아오미 모바일 소프트웨어 컴퍼니 리미티드 Method and apparatus for displaying an application interface
RU2710662C1 (en) * 2017-09-27 2019-12-30 Бейджин Сяоми Мобайл Софтвеа Ко., Лтд. Method and device for displaying an application interface
JP2020501207A (en) * 2017-09-27 2020-01-16 ペキン シャオミ モバイル ソフトウェア カンパニー, リミテッドBeijing Xiaomi Mobile Software Co.,Ltd. Application interface display method and device
CN107682538A (en) * 2017-09-27 2018-02-09 北京小米移动软件有限公司 The display methods and device of application interface
KR102244436B1 (en) * 2017-09-27 2021-04-27 베이징 시아오미 모바일 소프트웨어 컴퍼니 리미티드 Application interface display method, apparatus and computer-readable storage medium
CN109451141A (en) * 2018-09-26 2019-03-08 维沃移动通信有限公司 A kind of method of controlling operation thereof and associated terminal
CN109451141B (en) * 2018-09-26 2021-06-04 维沃移动通信有限公司 Operation control method and related terminal
WO2020155444A1 (en) * 2019-01-30 2020-08-06 上海传英信息技术有限公司 Application permission control method, lower-level terminal, and upper-level terminal
CN111277807A (en) * 2020-01-14 2020-06-12 广东小天才科技有限公司 Projection implementation method, wearable device, display device and storage medium
CN114286178A (en) * 2021-12-31 2022-04-05 神思电子技术股份有限公司 Privacy data protection method, device and medium based on remote control
CN114286178B (en) * 2021-12-31 2023-08-11 神思电子技术股份有限公司 Privacy data protection method, device and medium based on remote control

Also Published As

Publication number Publication date
CN105956486B (en) 2019-03-08

Similar Documents

Publication Publication Date Title
CN105956486A (en) Remote control method and apparatus
CN106489126A (en) The method and device that a kind of content is shared
CN106527883B (en) Content sharing method and device and terminal
CN106020784A (en) Method and device for displaying application message, and terminal
CN105138259A (en) Operation execution method and operation execution device
CN105100432B (en) Call interface display methods and device
CN105472303A (en) Privacy protection method and apparatus for video chatting
CN105975156A (en) Application interface display method and device
CN106126685A (en) Page loading method and device
CN106020634A (en) Screen capture method and device
CN105912951A (en) Data migration method and device
CN105487805A (en) Object operating method and device
CN107992257A (en) Split screen method and device
CN106203650A (en) Call a taxi and ask sending method and device
CN106033397A (en) Method and device for adjusting memory buffer, and terminal
CN109117229A (en) Screen partition domain display methods and device
CN107491681A (en) Finger print information processing method and processing device
CN107168543A (en) Control method of keyboard and device
CN105955684A (en) Image display method and apparatus
CN105187671A (en) Recording method and device
CN105245705A (en) Telephone prompting method and device
CN107423378A (en) Image display method and device
CN104184888A (en) Call transfer method, device and terminal
CN106453774A (en) Method and apparatus for displaying contact information
CN104063423B (en) A kind of method and device for determining position

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant