CN105956486B - Long-range control method and device - Google Patents

Long-range control method and device Download PDF

Info

Publication number
CN105956486B
CN105956486B CN201610282464.5A CN201610282464A CN105956486B CN 105956486 B CN105956486 B CN 105956486B CN 201610282464 A CN201610282464 A CN 201610282464A CN 105956486 B CN105956486 B CN 105956486B
Authority
CN
China
Prior art keywords
application
privacy
display interface
page
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610282464.5A
Other languages
Chinese (zh)
Other versions
CN105956486A (en
Inventor
林形省
毛良瑾
葛旭东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610282464.5A priority Critical patent/CN105956486B/en
Publication of CN105956486A publication Critical patent/CN105956486A/en
Application granted granted Critical
Publication of CN105956486B publication Critical patent/CN105956486B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

The disclosure is directed to a kind of long-range control method and devices, belong to Internet technical field.The method is applied to first terminal, the described method includes: during remotely being controlled by second terminal, for each application in the first terminal, when detecting the enabled instruction for the application, start the application, and judges whether the application is privacy application;When the application be privacy in application, after starting the application, the display interface of the application is shielded, the masked images of the display interface are obtained;Show the masked images of the display interface.The privacy leakage of first terminal can be effectively prevented in the disclosure, guarantees the personal secrets of first terminal.

Description

Long-range control method and device
Technical field
This disclosure relates to Internet technical field more particularly to a kind of long-range control method and device.
Background technique
It with the development of internet technology, often can be by long-range in order to meet the needs of user is for terminal management Control technology realizes the Screen sharing and control between two or more terminals, wherein the terminal being remotely controlled can claim For first terminal, the terminal remotely controlled first terminal is properly termed as second terminal.Since remote control technology has High priority control characteristic, the high priority control characteristic be embodied in second terminal possess first terminal is controlled it is all Permission, thus second terminal to first terminal carry out remotely control during, using second terminal user easily due to Maloperation and start include in first terminal privacy information application, and after the application is activated, first terminal can show that this is answered Display interface, so as to cause the privacy leakage of first terminal, therefore, needing one kind can let out to avoid the privacy of first terminal The long-range control method of dew.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of long-range control method and device.
According to the first aspect of the embodiments of the present disclosure, a kind of long-range control method is provided, first terminal, the side are applied to Method includes:
During remotely being controlled by second terminal, for each application in the first terminal, when detecting needle When to the enabled instruction of the application, start the application, and judges whether the application is privacy application;
When the application be privacy in application, after starting the application, the display interface of the application is shielded, Obtain the masked images of the display interface;
Show the masked images of the display interface.
With reference to first aspect, in the first possible implementation of above-mentioned first aspect, the judgement application It whether is privacy application, comprising:
Judge the application identities that the application whether has been stored in the first privacy list of storage, the first privacy list For storing the application identities of privacy application;
When having stored the application identities of the application in the first privacy list, determine that the application is answered for privacy With.
The possible implementation of with reference to first aspect the first, in second of possible realization side of above-mentioned first aspect In formula, the method also includes:
It, will when detecting the first preset instructions for the application for each application in the first terminal The application identities of the application are stored into the first privacy list.
With reference to first aspect, described to the application in the third possible implementation of above-mentioned first aspect Display interface is shielded, and the masked images of the display interface are obtained, comprising:
All areas in the display interface of the application are shielded, the interface image of the display interface is obtained;
The interface image is determined as to the masked images of the display interface.
With reference to first aspect, described to the application in the 4th kind of possible implementation of above-mentioned first aspect Display interface is shielded, and the masked images of the display interface are obtained, comprising:
All areas in the display interface of the application are shielded, the interface image of the display interface is obtained;
Determine the open region in the interface image, the information in the open region is not privacy information;
The shielding to the open region is released, the masked images of the display interface are obtained.
The 4th kind of possible implementation with reference to first aspect, in the 5th kind of possible realization side of above-mentioned first aspect Open region in formula, in the determination interface image, comprising:
When detecting the first choice instruction for the interface image, the first choice is instructed into selected area Domain is determined as open region;Alternatively,
When detecting the second selection instruction for the interface image, specified region is determined as open region, institute Stating specified region is the region in the interface image in addition to the selected region of the second selection instruction.
The third possible implementation or the 4th kind of possible implementation with reference to first aspect, above-mentioned first In 6th kind of possible implementation of aspect, all areas in the display interface to the application are shielded, and obtain To the interface image of the display interface, comprising:
By the specified image covering of all areas in the display interface, the interface image of the display interface is obtained; Alternatively,
All information for including in the display interface are replaced with designated character, obtain the surface chart of the display interface Picture.
Any possible implementation into the 5th kind of possible implementation of first aspect with reference to first aspect, in institute It states in the 7th kind of possible implementation of first aspect, the method also includes:
For each application in the first terminal, after starting the application, the application is directed to when detecting When the idsplay order of function pages, judge whether the function pages are the privacy page;
When the function pages are the privacy page, the function pages are shielded, the function pages are obtained Masked images;
Show the masked images of the function pages.
The 7th kind of possible implementation with reference to first aspect, in the 8th kind of possible realization side of above-mentioned first aspect It is described to judge whether the function pages are the privacy page in formula, comprising:
Judge the page iden-tity that the function pages whether have been stored in the second privacy list of storage, second privacy List is used to store the page iden-tity of the privacy page;
When having stored the page iden-tity of the function pages in the second privacy list, determine that the function pages are The privacy page.
The 7th kind of possible implementation with reference to first aspect, in the 9th kind of possible realization side of above-mentioned first aspect It is described to judge whether the function pages are the privacy page in formula, comprising:
Whether judge in the function pages comprising privacy information;
When in the function pages including privacy information, determine that the function pages are the privacy page.
According to the second aspect of an embodiment of the present disclosure, a kind of remote control apparatus is provided, described device includes:
First judgment module, for being answered for each of first terminal during remotely being controlled by second terminal With when detecting the enabled instruction for the application, starting the application, and judge whether the application is that privacy is answered With;
First shroud module, for being privacy in application, after starting the application when the application, to the application Display interface is shielded, and the masked images of the display interface are obtained;
First display module, for showing the masked images of the display interface.
In conjunction with second aspect, in the first possible implementation of above-mentioned second aspect, the first judgment module Include:
First judging unit, for whether having stored the application mark of the application in judging the first privacy list of storage Know, the first privacy list is used to store the application identities of privacy application;
First determination unit, for determining when having stored the application identities of the application in the first privacy list The application is privacy application.
In conjunction with the first possible implementation of second aspect, in second of possible realization side of above-mentioned second aspect In formula, described device further include:
Memory module, for being directed to the first of the application when detecting for each application in the first terminal When preset instructions, the application identities of the application are stored into the first privacy list.
In conjunction with second aspect, in the third possible implementation of above-mentioned second aspect, first shroud module Include:
Screen unit is shielded for all areas in the display interface to the application, obtains display circle The interface image in face;
Second determination unit, for the interface image to be determined as to the masked images of the display interface.
In conjunction with second aspect, in the 4th kind of possible implementation of above-mentioned second aspect, first shroud module Include:
The screen unit is shielded for all areas in the display interface to the application, is obtained described aobvious Show the interface image at interface;
Third determination unit, for determining the open region in the interface image, the information in the open region is not For privacy information;
Lifting unit obtains the masked images of the display interface for releasing the shielding to the open region.
In conjunction with the 4th kind of possible implementation of second aspect, in the 5th kind of possible realization side of above-mentioned second aspect In formula, the third determination unit includes:
First determines subelement, for when detecting the first choice instruction for the interface image, by described the The selected region of one selection instruction is determined as open region;Alternatively,
Second determines subelement, for when detecting the second selection instruction for the interface image, by specified area Domain is determined as open region, the specified region be in the interface image except the selected region of the second selection instruction it Outer region.
In conjunction with the third possible implementation of second aspect or the 4th kind of possible implementation, above-mentioned second In 6th kind of possible implementation of aspect, the screen unit includes:
Subelement is covered, for obtaining the display for the specified image covering of all areas in the display interface The interface image at interface;Alternatively,
Subelement is replaced, for replacing all information for including in the display interface with designated character, is obtained described The interface image of display interface.
In conjunction with second aspect to second aspect the 5th kind of possible implementation in any possible implementation, upper It states in the 7th kind of possible implementation of second aspect, described device further include:
Second judgment module, for working as detection after starting the application for each application in the first terminal To for the application function pages idsplay order when, judge whether the function pages are the privacy page;
Secondary shielding module, for shielding, obtaining to the function pages when the function pages are the privacy page To the masked images of the function pages;
Second display module, for showing the masked images of the function pages.
In conjunction with the 7th kind of possible implementation of second aspect, in the 8th kind of possible realization side of above-mentioned second aspect In formula, second judgment module includes:
Second judgment unit, for whether having stored the page of the function pages in judging the second privacy list of storage Mark, the second privacy list are used to store the page iden-tity of the privacy page;
4th determination unit, for when having stored the page iden-tity of the function pages in the second privacy list, Determine that the function pages are the privacy page.
In conjunction with the 7th kind of possible implementation of second aspect, in the 9th kind of possible realization side of above-mentioned second aspect In formula, second judgment module includes:
Third judging unit, for whether judging in the function pages comprising privacy information;
5th determination unit, for when in the function pages including privacy information, determining that the function pages are hidden The private page.
According to the third aspect of an embodiment of the present disclosure, a kind of remote control apparatus is provided, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
During remotely being controlled by second terminal, for each application in first terminal, institute is directed to when detecting When stating the enabled instruction of application, start the application, and judges whether the application is privacy application;
When the application be privacy in application, after starting the application, the display interface of the application is shielded, Obtain the masked images of the display interface;
Show the masked images of the display interface.
The technical scheme provided by this disclosed embodiment can include the following benefits: in the embodiments of the present disclosure, During first terminal is remotely controlled by second terminal, for each application in first terminal, when first terminal detects For the application enabled instruction when, start the application, and judge whether the application is privacy application, when the application is answered for privacy Used time, after starting the application, first terminal can be shielded the display interface of the application, obtain the screen of the display interface Image is covered, and shows the masked images of the display interface.Since the masked images of the display interface are carried out to the display interface It is obtained after shielding, it can thus be avoided the privacy information for including in privacy application is known by second user, so as to have Effect prevents the privacy leakage of first terminal, guarantees the personal secrets of first terminal.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of long-range control method shown according to an exemplary embodiment.
Fig. 2 is the flow chart of another long-range control method shown according to an exemplary embodiment.
Fig. 3 is a kind of schematic diagram of first privacy list shown according to an exemplary embodiment.
Fig. 4 is a kind of schematic diagram of display interface shown according to an exemplary embodiment.
Fig. 5 (a) is a kind of schematic diagram of specified image shown according to an exemplary embodiment.
Fig. 5 (b) is a kind of schematic diagram of interface image shown according to an exemplary embodiment.
Fig. 6 is the schematic diagram of another interface image shown according to an exemplary embodiment.
Fig. 7 (a) is the schematic diagram of another interface image shown according to an exemplary embodiment.
Fig. 7 (b) is a kind of schematic diagram of the masked images of display interface shown according to an exemplary embodiment.
Fig. 8 is a kind of schematic diagram of second privacy list shown according to an exemplary embodiment.
Fig. 9 is a kind of block diagram of remote control apparatus shown according to an exemplary embodiment.
Figure 10 is a kind of block diagram of first judgment module shown according to an exemplary embodiment.
Figure 11 is a kind of block diagram of first shroud module shown according to an exemplary embodiment.
Figure 12 is the block diagram of another first shroud module shown according to an exemplary embodiment.
Figure 13 is a kind of block diagram of third determination unit shown according to an exemplary embodiment.
Figure 14 is a kind of block diagram of screen unit shown according to an exemplary embodiment.
Figure 15 is the block diagram of another remote control apparatus shown according to an exemplary embodiment.
Figure 16 is a kind of block diagram of second judgment module shown according to an exemplary embodiment.
Figure 17 is the block diagram of another second judgment module shown according to an exemplary embodiment.
Figure 18 is the block diagram of another remote control apparatus shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Before to the embodiment of the present disclosure carrying out that explanation is explained in detail, first the application scenarios of the embodiment of the present disclosure are given Explanation.In order to meet the needs of user is for terminal management, often two or more can be realized by remote control technology Screen sharing and control between terminal.And due to second terminal to first terminal carry out remotely control during, second Terminal possesses all permissions controlled first terminal, so the user using second terminal is easily opened due to maloperation It include the application of privacy information in dynamic first terminal, and after the application is activated, first terminal can show display circle of the application Face, so as to cause the privacy leakage of first terminal, therefore, the embodiment of the present disclosure provides a kind of long-range control method, to avoid The privacy leakage of first terminal.
Fig. 1 is a kind of flow chart of long-range control method shown according to an exemplary embodiment, and this method is used for first In terminal.As shown in Figure 1, this approach includes the following steps.
In a step 101, during remotely being controlled by second terminal, for each application in first terminal, when When detecting the enabled instruction for application, starting application, and judge whether apply is privacy application.
In a step 102, it is privacy in application, after starting application when applying, the display interface of application is shielded, Obtain the masked images of display interface.
In step 103, the masked images of display interface are shown.
In the embodiments of the present disclosure, during first terminal is remotely controlled by second terminal, in first terminal Each application start the application when first terminal detects the enabled instruction for the application, and whether judge the application For privacy application, when the application is privacy in application, after starting the application, first terminal can be to the display interface of the application It is shielded, obtains the masked images of the display interface, and show the masked images of the display interface.Due to the display interface Masked images are obtained after shielding to the display interface, it can thus be avoided the privacy letter for including in privacy application Breath is known by second user, so as to effectively prevent the privacy leakage of first terminal, guarantees the personal secrets of first terminal.
In another embodiment of the present disclosure, judge whether apply is privacy application, comprising:
Judge the application identities that application whether has been stored in the first privacy list of storage, the first privacy list is for storing The application identities of privacy application;
When having stored the application identities of application in the first privacy list, determine that application is privacy application.
In another embodiment of the present disclosure, this method further include:
For each application in first terminal, when detecting the first preset instructions for application, by answering for application With mark storage into the first privacy list.
In another embodiment of the present disclosure, the display interface of application is shielded, obtains the shielding figure of display interface Picture, comprising:
All areas in the display interface of application are shielded, the interface image of display interface is obtained;
Interface image is determined as to the masked images of display interface.
In another embodiment of the present disclosure, the display interface of application is shielded, obtains the shielding figure of display interface Picture, comprising:
All areas in the display interface of application are shielded, the interface image of display interface is obtained;
Determine the open region in interface image, the information in open region is not privacy information;
The shielding to open region is released, the masked images of display interface are obtained.
In another embodiment of the present disclosure, the open region in interface image is determined, comprising:
When detecting the first choice instruction for interface image, selected region is instructed to be determined as first choice Open region;Alternatively,
When detecting the second selection instruction for interface image, specified region is determined as open region, specifies area Domain is the region in interface image in addition to the selected region of the second selection instruction.
In another embodiment of the present disclosure, all areas in the display interface of application are shielded, are shown The interface image at interface, comprising:
By the specified image covering of all areas in display interface, the interface image of display interface is obtained;Alternatively,
All information for including in display interface are replaced with designated character, obtain the interface image of display interface.
In another embodiment of the present disclosure, this method further include:
For each application in first terminal, after starting application, the aobvious of the function pages applied is directed to when detecting When showing instruction, whether the arbitration functions page is the privacy page;
When function pages are the privacy page, function pages are shielded, the masked images of function pages are obtained;
The masked images of the display function page.
In another embodiment of the present disclosure, whether the arbitration functions page is the privacy page, comprising:
Judge whether the page iden-tity of the store function page, the second privacy list are used in the second privacy list of storage Store the page iden-tity of the privacy page;
When the page iden-tity of the store function page in the second privacy list, determine that function pages are the privacy page.
In another embodiment of the present disclosure, whether the arbitration functions page is the privacy page, comprising:
It whether include privacy information in the arbitration functions page;
When in function pages including privacy information, determine that function pages are the privacy page.
All the above alternatives, can form the alternative embodiment of the disclosure according to any combination, and the disclosure is real It applies example and this is no longer repeated one by one.
Fig. 2 is a kind of flow chart of long-range control method shown according to an exemplary embodiment, and this method is used for first In terminal.As shown in Fig. 2, this approach includes the following steps.
In step 201, during remotely being controlled by second terminal, for each application in first terminal, when When detecting the enabled instruction for the application, start the application, and judge whether the application is privacy application.
It should be noted that enabled instruction is applied for starting, and the enabled instruction can be triggered by the first user, first User can be single-click operation, double click operation, voice operating etc., the disclosure by specified operation triggering, the specified operation Embodiment is not specifically limited in this embodiment.Wherein, the first user is the user using first terminal.
In addition, privacy application can be the application comprising privacy information, it can also be to be answered by what the first user freely set With the embodiment of the present disclosure is not specifically limited in this embodiment.In one embodiment, privacy application can for example answer for instant messaging With, shopping platform application etc..In another embodiment, privacy application can also be set as having access for example for the first user The application of limitation, for example, camera shooting application, note application, dialing application etc..Wherein, privacy information may include ID card No., Phone number, Bank Account Number, customer name, account balance, birthdate etc., the embodiment of the present disclosure do not do specific limit to this It is fixed.
Wherein, when detecting the enabled instruction for the application, the operation for starting the application can refer to the relevant technologies, The embodiment of the present disclosure is to this without elaborating.
Wherein, judge whether the application is privacy in application, may determine that whether deposited in the first privacy list of storage The application identities of the application are stored up, which is used to store the application identities of privacy application;When the first privacy list In when having stored the application identities of the application, determine that the application is privacy application;When not stored this is answered in the first privacy list When application identities, determining the application not is privacy application.Due to can be directly according to the first privacy list come simple fast Judge whether the application is privacy application fastly, without carrying out other complex operations, it is thus possible to improve judging efficiency.
It should be noted that the first privacy list is used to determine the privacy application in first terminal.For example, when this is first hidden When the application identities stored in private list are application identities 1, application identities 3 and application identities 4, which can be with table It is now form as shown in Figure 3, certainly, in practical application, which can also show as other forms, the disclosure Embodiment is not specifically limited in this embodiment.
In addition, application identities are used for unique identification application, and the application identities can be Apply Names, the application drawing of application Mark etc., the embodiment of the present disclosure is not specifically limited in this embodiment.
For example, the application identities of the application are application identities 1, the application identities stored in the first privacy list are application Mark 1, application identities 3 and application identities 4, then can determine the application identities that the application has been stored in the first privacy list, Determine that the application is privacy application.
For another example the application identities of the application are application identities 2, the application identities stored in the first privacy list are to answer With mark 1, application identities 3 and application identities 4, then the application mark of the not stored application in the first privacy list can be determined Know, determining the application not is privacy application.
Further, each application in first terminal can also be preset when detecting for the first of the application When instruction, the application identities of the application are stored into the first privacy list.
It should be noted that the first preset instructions are used to indicate the application identities storage of application to the first privacy list In, which can be triggered by the first user, and the first user can pass through specified operation triggering, the embodiment of the present disclosure It is not specifically limited in this embodiment.
Since first preset instructions can be triggered by the first user, application identities of the first terminal to the application The process that the process stored actually namely the first user operates the first privacy list.And due to first hidden Private list is used to determine the privacy application in first terminal, therefore, the mistake that the first user operates the first privacy list Journey actually namely determines that the process of the privacy application in first terminal, the determination process simple and flexible can not only save Privacy application is fixed time really, can also meet the privacy requirements of the first user, thus ensure that the personal secrets of first terminal, And improve the operating experience of the first user.
It should be noted that first terminal can also incite somebody to action before the first user operates the first privacy list Specified application identities are prestored in the first privacy list, are fixed time really with being further reduced privacy application.Wherein, refer to Determining application identities can preset, and specifying application identities such as this can be application identities, the shopping platform of instant messaging application The application identities etc. of application, the embodiment of the present disclosure is not specifically limited in this embodiment.
Wherein, by the storage of the application identities of the application in the first privacy list operation in the related technology will be a certain Information storage is similar to the operation in some list, and the embodiment of the present disclosure is to this without elaborating.
In step 202, when the application is privacy in application, after starting the application, to the display interface of the application into Row shielding, obtains the masked images of the display interface.
It should be noted that the display interface of application is that the application is activated rear shown interface.
Since display interface of first user to the application may have different shielding demands, such as the first user may Want to shield all areas in the display interface of the application, or wants to the part in the display interface of the application Region is shielded, and therefore, shielding demand that can be different according to the first user shields the display interface of the application, Obtain the masked images of the display interface.And the shielding demand different according to the first user, the display interface of the application is carried out Shielding, the operation for obtaining the masked images of the display interface can be realized by the following two kinds mode:
First way: shielding all areas in the display interface of the application, obtains the boundary of the display interface The interface image is determined as the masked images of the display interface by face image.
It should be noted that the masked images of the display interface obtained by above-mentioned first way are the display interface Full-shield image, all areas in the full-shield image are shielded, which can satisfy the first user couple The full-shield demand of the display interface, all information for including in the display interface at this time not will be leaked, so as to protect Demonstrate,prove the personal secrets of first terminal.
Wherein, all areas in the display interface of the application are shielded, obtains the interface image of the display interface When, the specified image covering of all areas in the display interface can be obtained into the interface image of the display interface;Alternatively, All information for including in the display interface are replaced with designated character, obtain the interface image of the display interface, it is certainly, practical In, all areas in the display interface can also be shielded otherwise, obtain the boundary of the display interface Face image, the embodiment of the present disclosure are not specifically limited in this embodiment.
It should be noted that specified image can be preset, specifying image such as this can be mosaic image, solid block of color Image or other images, the embodiment of the present disclosure are not specifically limited in this embodiment.
In addition, designated character can be preset, such as the designated character can be symbol *, #, %, number 1,2,3 etc., The embodiment of the present disclosure is not specifically limited in this embodiment.
For example, the display interface is interface as shown in Figure 4, specifying image is the image as shown in Fig. 5 (a), then can be with It specifies image to cover with this all areas in display interface, obtains the surface chart of the display interface as shown in Fig. 5 (b) Picture.
For another example the display interface is interface as shown in Figure 4, designated character is symbol *, then can be by the display interface In include all information with the designated character replace, obtain the interface image of the display interface as shown in FIG. 6.
The second way: shielding all areas in the display interface of the application, obtains the boundary of the display interface Face image;Determine the open region in the interface image, the information in the disclosure region is not privacy information;It releases to the disclosure The shielding in region obtains the masked images of the display interface.
It should be noted that the masked images of the display interface obtained by the above-mentioned second way are the display interface Partly shielding effect image, the region in the partly shielding effect image in addition to open region shielded, which can To meet the first user to the partly shielding effect demand of the display interface, the region in the display interface in addition to open region at this time In all information not will be leaked, thereby may be ensured that the personal secrets of first terminal.
For example, first terminal shields all areas in the display interface of the application, obtain as shown in Fig. 7 (a) Interface image, it is assumed that first terminal determines that the open region in the interface image is the area shown in Fig. 7 (a) in interface image Domain 1 can then release the shielding to open region 1, obtain the masked images of the display interface as shown in Fig. 7 (b).
Wherein, all areas in the display interface of the application are shielded, obtains the interface image of the display interface Operation it is identical as the operation in above-mentioned first way, details are not described herein for the embodiment of the present disclosure.
It, can be when detecting the first choosing for the interface image wherein it is determined that when open region in the display interface When selecting instruction, selected region is instructed to be determined as open region the first choice;Alternatively, when detecting for the surface chart When the second selection instruction of picture, specified region is determined as open region, the specified region be in the interface image except this second Region except the selected region of selection instruction.
It should be noted that first choice instruction, for selecting open region from the interface image, which refers to Order can be triggered by the first user, and the first user can not do specific limit to this by specified operation triggering, the embodiment of the present disclosure It is fixed.
In addition, the second selection instruction, for selecting privacy area from the interface image, which is the surface chart Region as in addition to display area, second selection instruction can be triggered by the first user, and the first user can pass through finger Fixed operation triggering, the embodiment of the present disclosure are not specifically limited in this embodiment.
Furthermore since first choice instruction and the second selection instruction can be triggered by the first user, the disclosure is real It applies in example through the process of first choice instruction or the second selection instruction selection region in practical applications, the can be shown as One user passes through virtual dauber to some region of slide etc., originally to some region of frame selection operation, the first user Open embodiment is not specifically limited in this embodiment.
For example, the interface image of the display interface is the image as shown in Fig. 7 (a), first choice instructs selected area Domain is the region 1 in interface image shown in Fig. 7 (a), then region 1 can be determined as to open region.
For another example the interface image of the display interface is the image as shown in Fig. 7 (a), the second selection instruction is selected Region is the region 2 in interface image shown in Fig. 7 (a), then can be true by the region 1 in the interface image in addition to region 2 It is set to specified region, and specifies region 1 to be determined as open region this.
It wherein, can be according to first terminal to all areas of the display interface when releasing the shielding to the disclosure region The operation shielded carries out correspondingly inverse operation to the disclosure region, to release the shielding to the disclosure region, shows the public affairs Information in open region.
For example, all areas in the display interface are covered with specified image, then it at this time can be to the disclosure region The specified image of upper covering is eliminated, and to release the shielding to the disclosure region, shows the information in the disclosure region.
It, then at this time can be with for another example all information for including in the display interface are replaced with designated character It is counter to all designated characters for including in the disclosure region to be replaced, to release the shielding to the disclosure region, show the public affairs Information in open region.
In step 203, the masked images of the display interface are shown.
It should be noted that showing the operation of the masked images of the display interface and showing a certain image in the related technology Operate similar, the embodiment of the present disclosure is to this without elaborating.
It should be noted that when the masked images of the display interface are the full-shield image of the display interface, the display All areas in the masked images at interface are shielded, thus when second user is opened in first terminal due to maloperation Privacy in application, can to avoid the privacy apply in include privacy information be known by second user, avoid first terminal Privacy leakage, and can prevent second user from continuing to operate the display interface, it ensure that the personal secrets of first terminal.
In addition, when the masked images of the display interface are the partly shielding effect image of the display interface, the display interface Region in masked images in addition to open region is shielded, since the information in the disclosure region is not privacy information, because This, when second user opens the privacy in first terminal in application, equally can be to avoid in privacy application due to maloperation The privacy information for including is known by second user, avoids the privacy leakage of first terminal, ensure that the privacy peace of first terminal Entirely.And due to showing the information in the disclosure region in the masked images of the display interface, so as to be convenient for the first user Perhaps the information in second user timely learning the disclosure region and convenient for the first user or second user to the disclosure region In information handled, improve user experience.
Further, it can also be somebody's turn to do for each application in first terminal, after starting the application when detecting to be directed to When the idsplay order of the function pages of application, judge whether the function pages are the privacy page;When the function pages are privacy page When face, which is shielded, obtains the masked images of the function pages;Show the masked images of the function pages.
It should be noted that the page that the function pages of application are shown after being opened for the functional module in the application.
In addition, idsplay order is used to show the function pages, and the idsplay order can be triggered by the first user, and first uses Family can be not specifically limited in this embodiment by specified operation triggering, the embodiment of the present disclosure.
It can also be the page freely set by the first user furthermore the privacy page can be the page comprising privacy information Face, the embodiment of the present disclosure are not specifically limited in this embodiment.In one embodiment, the privacy page for example can for the address list page, Page etc. is set.In another embodiment, which can also for example be set as with access limitation for the first user The page, for example, the collection page, historical record page etc..
Wherein, judge whether the function pages are that the operation of the privacy page can be realized by the following two kinds mode.
First way: judging the page iden-tity that the function pages whether have been stored in the second privacy list of storage, should Second privacy list is used to store the page iden-tity of the privacy page;When the page for having stored the function pages in the second privacy list When face identifies, determine that the function pages are the privacy page;When the page mark of the not stored function pages in the second privacy list When knowledge, determining the function pages not is the privacy page.
It should be noted that directly can quickly and easily be sentenced according to the second privacy list in above-mentioned first way Whether the function pages that break are the privacy page, without carrying out other complex operations, so as to improve judging efficiency.
It should be noted that the second privacy list is for determining the privacy page in application.For example, when second privacy arranges When the page iden-tity stored in table is page iden-tity 1, page iden-tity 3 and page iden-tity 4, which can be shown as Form as shown in Figure 8, certainly, in practical application, which can also show as other forms, and the disclosure is implemented Example is not specifically limited in this embodiment.
In addition, page iden-tity is used for the unique identification page, and the page iden-tity can be the Page Name etc. of the page, this Open embodiment is not specifically limited in this embodiment.
For example, the page iden-tity of the function pages is page iden-tity 1, the page iden-tity stored in the second privacy list is Page iden-tity 1, page iden-tity 3 and page iden-tity 4 can then determine the page that the function pages have been stored in the second privacy list Face mark determines that the function pages are the privacy page.
For another example the page iden-tity of the function pages is page iden-tity 2, the page iden-tity stored in the second privacy list For page iden-tity 1, page iden-tity 3 and page iden-tity 4, then the not stored function pages in the second privacy list can be determined Page iden-tity, determining the function pages not is the privacy page.
It further, can also be for each function pages in the application, when detecting for the function pages When two preset instructions, the page iden-tity of the function pages is stored into the second privacy list.
It should be noted that the second preset instructions are used to indicate the page iden-tity storage of the function pages to the second privacy In list, which can be triggered by the first user, and the first user can be by specified operation triggering, and the disclosure is real Example is applied to be not specifically limited in this embodiment.
Since second preset instructions can be triggered by the first user, the page of the first terminal to the function pages Identify the process that process actually namely the first user stored operates the second privacy list.And due to Two privacy lists are for determining the privacy page in application, therefore, the mistake that the first user operates the second privacy list Journey actually namely determines that the process of the privacy page in application, the determination process simple and flexible can not only save privacy The page is fixed time really, can also meet the privacy requirements of the first user, to ensure that the personal secrets of first terminal, and is mentioned The high operating experience of first user.
It should be noted that first terminal can also incite somebody to action before the first user operates the second privacy list Specified page mark is prestored in the second privacy list, is fixed time really with being further reduced the privacy page.Wherein, refer to Determining page iden-tity can preset, as specified page mark can be the page iden-tity of the address list page, the page is arranged Page iden-tity etc., the embodiment of the present disclosure is not specifically limited in this embodiment.
Wherein, the page iden-tity storage of the function pages to the operation in the second privacy list and in the related technology will A certain information storage is similar to the operation in some list, and the embodiment of the present disclosure is to this without elaborating.
The second way: whether judge in the function pages comprising privacy information;When in the function pages include privacy believe When breath, determine that the function pages are the privacy page;When not including privacy information in the function pages, the function pages are determined not For the privacy page.
It should be noted that whether including privacy information according only in the function pages in the above-mentioned second way Judge whether the function pages are the privacy page, and the deterministic process simple and flexible, judging efficiency is higher, as long as and which predefines A little information are privacy information, so that it may carry out accurate judgement to function pages all in application, judging nicety rate is also higher.
Wherein, judge whether the operation comprising privacy information can refer to the relevant technologies in the function pages, and the disclosure is real Example is applied to be not specifically limited in this embodiment.
For example, privacy information is ID card No., then whether first terminal may determine that in the function pages comprising identity Number is demonstrate,proved, when in the function pages including ID card No., can determine that the function pages are the privacy page, when the page function When not including ID card No. in face, can determine the function pages not is the privacy page.
Wherein, when the function pages are the privacy page, which is shielded, the screen of the function pages is obtained The operation for covering image is similar with the operation in above-mentioned steps 202, and the embodiment of the present disclosure repeats no more this.
Wherein, the operation for showing the masked images of the function pages and the operation class for showing a certain image in the related technology Seemingly, the embodiment of the present disclosure is to this without elaborating.
It should be noted that in the embodiment of the present disclosure, it, can be to the function pages when the function pages are the privacy page Shielded, obtain the masked images of the function pages, and show the masked images of the function pages, thus when second user by It, can be to avoid the privacy information for including in the privacy page by second user when the privacy page in application is opened in maloperation Know, avoid the privacy leakage of first terminal, ensure that the personal secrets of first terminal.
In the embodiments of the present disclosure, during first terminal is remotely controlled by second terminal, in first terminal Each application start the application when first terminal detects the enabled instruction for the application, and whether judge the application For privacy application, when the application is privacy in application, after starting the application, first terminal can be to the display interface of the application It is shielded, obtains the masked images of the display interface, and show the masked images of the display interface.Due to the display interface Masked images are obtained after shielding to the display interface, it can thus be avoided the privacy letter for including in privacy application Breath is known by second user, so as to effectively prevent the privacy leakage of first terminal, guarantees the personal secrets of first terminal.
Fig. 9 is a kind of block diagram of remote control apparatus shown according to an exemplary embodiment.Referring to Fig. 9, the device packet Include first judgment module 901, the first shroud module 902 and the first display module 903.
First judgment module 901 is used for during remotely being controlled by second terminal, for each of first terminal Using, when detecting the enabled instruction for application, starting application, and judge whether apply is privacy application;
First shroud module 902, for when using for privacy in application, starting apply after, to the display interface of application It is shielded, obtains the masked images of display interface;
First display module 903, for showing the masked images of display interface.
In another embodiment of the present disclosure, referring to Fig.1 0, which includes the first judging unit 9011 With the first determination unit 9012.
First judging unit 9011, for whether having stored the application mark of application in judging the first privacy list of storage Know, the first privacy list is used to store the application identities of privacy application;
First determination unit 9012, for determining application when having stored the application identities of application in the first privacy list For privacy application.
In another embodiment of the present disclosure, which further includes memory module.
Memory module, for for each application in first terminal, when detecting the first preset instructions for application When, the application identities of application are stored into the first privacy list.
In another embodiment of the present disclosure, referring to Fig.1 1, which includes screen unit 9021 and the Three determination units 9022.
Screen unit 9021 shields for all areas in the display interface to application, obtains display interface Interface image;
Second determination unit 9022, for interface image to be determined as to the masked images of display interface.
In another embodiment of the present disclosure, referring to Fig.1 2, which includes screen unit 9021, the Three determination units 9023 and lifting unit 9024.
Screen unit 9021 shields for all areas in the display interface to application, obtains display interface Interface image;
4th determination unit 9023, for determining the open region in interface image, the information in open region is not hidden Personal letter breath;
Lifting unit 9024 obtains the masked images of display interface for releasing the shielding to open region.
In another embodiment of the present disclosure, referring to Fig.1 3, which includes first determining subelement 90231 and second determine subelement 90232.
First determines subelement 90231, for when detecting the first choice instruction for interface image, first to be selected It selects the selected region of instruction and is determined as open region;Alternatively,
Second determines subelement 90232, for when detecting the second selection instruction for interface image, by specified area Domain is determined as open region, and specifying region is the region in interface image in addition to the selected region of the second selection instruction.
In another embodiment of the present disclosure, referring to Fig.1 4, which includes covering subelement 90211 and replaces Change subelement 90212.
Subelement 90211 is covered, for obtaining display interface for the specified image covering of all areas in display interface Interface image;Alternatively,
Replacement subelement 90212 is shown for replacing all information for including in display interface with designated character The interface image at interface.
In another embodiment of the present disclosure, referring to Fig.1 5, which further includes the second judgment module 904, secondary shielding Module 905 and the second display module 906.
Second judgment module 904, for for each application in first terminal, after starting application, when detecting needle When to the idsplay orders of the function pages of application, whether the arbitration functions page is the privacy page;
Secondary shielding module 905, for being shielded to function pages, obtaining function when function pages are the privacy page The masked images of the energy page;
Second display module 906, the masked images for the display function page.
In another embodiment of the present disclosure, referring to Fig.1 6, which includes second judgment unit 9041 With the 4th determination unit 9042.
Second judgment unit 9041, the page of the whether store function page in the second privacy list for judging storage Mark, the second privacy list are used to store the page iden-tity of the privacy page;
4th determination unit 9042, for determining when the page iden-tity of the store function page in the second privacy list Function pages are the privacy page.
In another embodiment of the present disclosure, referring to Fig.1 7, which includes third judging unit 9043 With the 5th determination unit 9044.
Third judging unit 9043, for whether including privacy information in the arbitration functions page;
5th determination unit 9044, for when in function pages including privacy information, determining that function pages are privacy page Face.
In the embodiments of the present disclosure, during first terminal is remotely controlled by second terminal, in first terminal Each application start the application when first terminal detects the enabled instruction for the application, and whether judge the application For privacy application, when the application is privacy in application, after starting the application, first terminal can be to the display interface of the application It is shielded, obtains the masked images of the display interface, and show the masked images of the display interface.Due to the display interface Masked images are obtained after shielding to the display interface, it can thus be avoided the privacy letter for including in privacy application Breath is known by second user, so as to effectively prevent the privacy leakage of first terminal, guarantees the personal secrets of first terminal.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Figure 18 is a kind of block diagram of device 1800 for image transmitting shown according to an exemplary embodiment.For example, Device 1800 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig.1 8, device 1800 may include following one or more components: processing component 1802, memory 1804, Power supply module 1806, multimedia component 1808, audio component 1810, the interface 1812 of input/output (I/O), sensor module 1814 and communication component 1816.
The integrated operation of the usual control device 1800 of processing component 1802, such as with display, telephone call, data communication, Camera operation and record operate associated operation.Processing component 1802 may include one or more processors 1820 to execute Instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1802 may include one or more moulds Block, convenient for the interaction between processing component 1802 and other assemblies.For example, processing component 1802 may include multi-media module, To facilitate the interaction between multimedia component 1808 and processing component 1802.
Memory 1804 is configured as storing various types of data to support the operation in device 1800.These data Example includes the instruction of any application or method for operating on device 1800, contact data, telephone book data, Message, picture, video etc..Memory 1804 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Power supply module 1806 provides power supply for the various assemblies of device 1800.Power supply module 1806 may include power management System, one or more power supplys and other with for device 1800 generate, manage, and distribute the associated component of power supply.
Multimedia component 1808 includes the screen of one output interface of offer between described device 1800 and controlled user Curtain.In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touching Panel, screen may be implemented as touch screen, to receive the input signal from controlled user.Touch panel includes one or more A touch sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch Or the boundary of sliding action, but also detect duration and pressure associated with the touch or slide operation.In some realities It applies in example, multimedia component 1808 includes a front camera and/or rear camera.When device 1800 is in operation mould Formula, such as in a shooting mode or a video mode, front camera and/or rear camera can receive external multi-medium data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom energy Power.
Audio component 1810 is configured as output and/or input audio signal.For example, audio component 1810 includes a wheat Gram wind (MIC), when device 1800 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone quilt It is configured to receive external audio signal.The received audio signal can be further stored in memory 1804 or via communication Component 1816 is sent.In some embodiments, audio component 1810 further includes a loudspeaker, is used for output audio signal.
I/O interface 1812 provides interface, above-mentioned peripheral interface module between processing component 1802 and peripheral interface module It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and Locking press button.
Sensor module 1814 includes one or more sensors, and the state for providing various aspects for device 1800 is commented Estimate.For example, sensor module 1814 can detecte the state that opens/closes of device 1800, the relative positioning of component, such as institute The display and keypad that component is device 1800 are stated, sensor module 1814 can be with detection device 1800 or device 1,800 1 The position change of a component, the existence or non-existence that controlled user contacts with device 1800,1800 orientation of device or acceleration/deceleration With the temperature change of device 1800.Sensor module 1814 may include proximity sensor, be configured to not any It is detected the presence of nearby objects when physical contact.Sensor module 1814 can also include optical sensor, such as CMOS or ccd image Sensor, for being used in imaging applications.In some embodiments, which can also include that acceleration passes Sensor, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1816 is configured to facilitate the communication of wired or wireless way between device 1800 and other equipment.Dress The wireless network based on communication standard, such as WiFi can be accessed by setting 1800,2G or 3G or their combination.It is exemplary at one In embodiment, communication component 1816 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1816 further includes near-field communication (NFC) module, to promote short distance Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1800 can be by one or more application specific integrated circuit (ASIC), number Signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 1804 of instruction, above-metioned instruction can be executed by the processor 1820 of device 1800 to complete the above method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device executes, so that mobile terminal is able to carry out a kind of long-range control method, which comprises
During remotely being controlled by second terminal, for each application in first terminal, answered when detecting to be directed to When enabled instruction, starting application, and judge whether apply is privacy application;
It is privacy in application, after starting application when applying, the display interface of application is shielded, display interface is obtained Masked images;
Show the masked images of display interface.
In another embodiment of the present disclosure, judge whether apply is privacy application, comprising:
Judge the application identities that application whether has been stored in the first privacy list of storage, the first privacy list is for storing The application identities of privacy application;
When having stored the application identities of application in the first privacy list, determine that application is privacy application.
In another embodiment of the present disclosure, this method further include:
For each application in first terminal, when detecting the first preset instructions for application, by answering for application With mark storage into the first privacy list.
In another embodiment of the present disclosure, the display interface of application is shielded, obtains the shielding figure of display interface Picture, comprising:
All areas in the display interface of application are shielded, the interface image of display interface is obtained;
Interface image is determined as to the masked images of display interface.
In another embodiment of the present disclosure, the display interface of application is shielded, obtains the shielding figure of display interface Picture, comprising:
All areas in the display interface of application are shielded, the interface image of display interface is obtained;
Determine the open region in interface image, the information in open region is not privacy information;
The shielding to open region is released, the masked images of display interface are obtained.
In another embodiment of the present disclosure, the open region in interface image is determined, comprising:
When detecting the first choice instruction for interface image, selected region is instructed to be determined as first choice Open region;Alternatively,
When detecting the second selection instruction for interface image, specified region is determined as open region, specifies area Domain is the region in interface image in addition to the selected region of the second selection instruction.
In another embodiment of the present disclosure, all areas in the display interface of application are shielded, are shown The interface image at interface, comprising:
By the specified image covering of all areas in display interface, the interface image of display interface is obtained;Alternatively,
All information for including in display interface are replaced with designated character, obtain the interface image of display interface.
In another embodiment of the present disclosure, this method further include:
For each application in first terminal, after starting application, the aobvious of the function pages applied is directed to when detecting When showing instruction, whether the arbitration functions page is the privacy page;
When function pages are the privacy page, function pages are shielded, the masked images of function pages are obtained;
The masked images of the display function page.
In another embodiment of the present disclosure, whether the arbitration functions page is the privacy page, comprising:
Judge whether the page iden-tity of the store function page, the second privacy list are used in the second privacy list of storage Store the page iden-tity of the privacy page;
When the page iden-tity of the store function page in the second privacy list, determine that function pages are the privacy page.
In another embodiment of the present disclosure, whether the arbitration functions page is the privacy page, comprising:
It whether include privacy information in the arbitration functions page;
When in function pages including privacy information, determine that function pages are the privacy page.
In the embodiments of the present disclosure, during first terminal is remotely controlled by second terminal, in first terminal Each application start the application when first terminal detects the enabled instruction for the application, and whether judge the application For privacy application, when the application is privacy in application, after starting the application, first terminal can be to the display interface of the application It is shielded, obtains the masked images of the display interface, and show the masked images of the display interface.Due to the display interface Masked images are obtained after shielding to the display interface, it can thus be avoided the privacy letter for including in privacy application Breath is known by second user, so as to effectively prevent the privacy leakage of first terminal, guarantees the personal secrets of first terminal.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (15)

1. a kind of long-range control method, which is characterized in that be applied to first terminal, which comprises
During remotely being controlled by second terminal, for each application in the first terminal, institute is directed to when detecting When stating the enabled instruction of application, start the application, and judges whether the application is privacy application;
When the application be privacy in application, after starting the application, the display interface of the application is shielded, is obtained The masked images of the display interface, the display interface of the application are that the application is activated rear shown interface;
Show the masked images of the display interface;
The method also includes:
For each application in the first terminal, after starting the application, when detecting the function for the application When the idsplay order of the page, the page iden-tity that the function pages whether have been stored in the second privacy list of storage, institute are judged The second privacy list is stated for storing the page iden-tity of the privacy page, when having stored the page function in the second privacy list When the page iden-tity in face, determine that the function pages are the privacy page, alternatively, whether judging in the function pages comprising privacy Information determines that the function pages are the privacy page when in the function pages including privacy information;
When the function pages are the privacy page, the function pages are shielded, the shielding of the function pages is obtained Image;
Show the masked images of the function pages.
2. the method as described in claim 1, which is characterized in that described to judge whether the application is privacy application, comprising:
Judge the application identities that the application whether has been stored in the first privacy list of storage, the first privacy list is used for Store the application identities of privacy application;
When having stored the application identities of the application in the first privacy list, determine that the application is privacy application.
3. method according to claim 2, which is characterized in that the method also includes:
It, will be described when detecting the first preset instructions for the application for each application in the first terminal The application identities of application are stored into the first privacy list.
4. the method as described in claim 1, which is characterized in that the display interface to the application shields, and obtains The masked images of the display interface, comprising:
All areas in the display interface of the application are shielded, the interface image of the display interface is obtained;
The interface image is determined as to the masked images of the display interface.
5. the method as described in claim 1, which is characterized in that the display interface to the application shields, and obtains The masked images of the display interface, comprising:
All areas in the display interface of the application are shielded, the interface image of the display interface is obtained;
Determine the open region in the interface image, the information in the open region is not privacy information;
The shielding to the open region is released, the masked images of the display interface are obtained.
6. method as claimed in claim 5, which is characterized in that the open region in the determination interface image, comprising:
When detecting the first choice instruction for the interface image, instruct selected region true the first choice It is set to open region;Alternatively,
When detecting the second selection instruction for the interface image, specified region is determined as open region, the finger Determining region is the region in the interface image in addition to the selected region of the second selection instruction.
7. method as described in claim 4 or 5, which is characterized in that all areas in the display interface to the application Domain is shielded, and the interface image of the display interface is obtained, comprising:
By the specified image covering of all areas in the display interface, the interface image of the display interface is obtained;Alternatively,
All information for including in the display interface are replaced with designated character, obtain the interface image of the display interface.
8. a kind of remote control apparatus, which is characterized in that described device includes:
First judgment module, for during remotely being controlled by second terminal, for each application in first terminal, when When detecting the enabled instruction for the application, start the application, and judges whether the application is privacy application;
First shroud module, for when the application for privacy in application, display after starting the application, to the application Interface is shielded, and the masked images of the display interface are obtained, and the display interface of the application is after the application is activated Shown interface;
First display module, for showing the masked images of the display interface;
Second judgment module, for for each application in the first terminal, after starting the application, when detecting needle When to the idsplay orders of the function pages of the application, judge whether the function pages are the privacy page;
Secondary shielding module, for being shielded to the function pages, obtaining institute when the function pages are the privacy page State the masked images of function pages;
Second display module, for showing the masked images of the function pages;
Wherein, whether second judgment module includes: second judgment unit, in the second privacy list for judging storage The page iden-tity of the function pages is stored, the second privacy list is used to store the page iden-tity of the privacy page, and the 4th really Order member, for determining the page function when having stored the page iden-tity of the function pages in the second privacy list Face is the privacy page, and whether third judging unit is determining single comprising privacy information, the 5th in the function pages for judging Member, for when in the function pages including privacy information, determining that the function pages are the privacy page.
9. device as claimed in claim 8, which is characterized in that the first judgment module includes:
First judging unit, for whether having stored the application identities of the application, institute in judging the first privacy list of storage The first privacy list is stated for storing the application identities of privacy application;
First determination unit, described in determining when having stored the application identities of the application in the first privacy list Using for privacy application.
10. device as claimed in claim 9, which is characterized in that described device further include:
Memory module, for being preset for the first of the application when detecting for each application in the first terminal When instruction, the application identities of the application are stored into the first privacy list.
11. device as claimed in claim 8, which is characterized in that first shroud module includes:
Screen unit is shielded for all areas in the display interface to the application, obtains the display interface Interface image;
Second determination unit, for the interface image to be determined as to the masked images of the display interface.
12. device as claimed in claim 8, which is characterized in that first shroud module includes:
The screen unit is shielded for all areas in the display interface to the application, obtains display circle The interface image in face;
Third determination unit, for determining the open region in the interface image, the information in the open region is not hidden Personal letter breath;
Lifting unit obtains the masked images of the display interface for releasing the shielding to the open region.
13. device as claimed in claim 12, which is characterized in that the third determination unit includes:
First determines subelement, for when detecting the first choice instruction for the interface image, described first to be selected It selects the selected region of instruction and is determined as open region;Alternatively,
Second determines subelement, for when detecting the second selection instruction for the interface image, specified region is true Be set to open region, the specified region be in the interface image in addition to the selected region of the second selection instruction Region.
14. the device as described in claim 11 or 12, which is characterized in that the screen unit includes:
Subelement is covered, for obtaining the display interface for the specified image covering of all areas in the display interface Interface image;Alternatively,
It replaces subelement and obtains the display for replacing all information for including in the display interface with designated character The interface image at interface.
15. a kind of remote control apparatus, which is characterized in that described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
During remotely being controlled by second terminal, for each application in first terminal, answered when detecting for described When enabled instruction, start the application, and judges whether the application is privacy application;
When the application be privacy in application, after starting the application, the display interface of the application is shielded, is obtained The masked images of the display interface, the display interface of the application are that the application is activated rear shown interface;
Show the masked images of the display interface;
For each application in the first terminal, after starting the application, when detecting the function for the application When the idsplay order of the page, the page iden-tity that the function pages whether have been stored in the second privacy list of storage, institute are judged The second privacy list is stated for storing the page iden-tity of the privacy page, when having stored the page function in the second privacy list When the page iden-tity in face, determine that the function pages are the privacy page, alternatively, whether judging in the function pages comprising privacy Information determines that the function pages are the privacy page when in the function pages including privacy information;
When the function pages are the privacy page, the function pages are shielded, the shielding of the function pages is obtained Image;
Show the masked images of the function pages.
CN201610282464.5A 2016-04-29 2016-04-29 Long-range control method and device Active CN105956486B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610282464.5A CN105956486B (en) 2016-04-29 2016-04-29 Long-range control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610282464.5A CN105956486B (en) 2016-04-29 2016-04-29 Long-range control method and device

Publications (2)

Publication Number Publication Date
CN105956486A CN105956486A (en) 2016-09-21
CN105956486B true CN105956486B (en) 2019-03-08

Family

ID=56914371

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610282464.5A Active CN105956486B (en) 2016-04-29 2016-04-29 Long-range control method and device

Country Status (1)

Country Link
CN (1) CN105956486B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778331A (en) * 2016-11-29 2017-05-31 广东电网有限责任公司信息中心 A kind of monitoring method of application program, apparatus and system
CN107220538A (en) * 2017-06-27 2017-09-29 广东欧珀移动通信有限公司 Pay class application management method, device and mobile terminal
CN107358111B (en) * 2017-08-28 2019-11-22 维沃移动通信有限公司 A kind of method for secret protection and mobile terminal
CN107682538A (en) * 2017-09-27 2018-02-09 北京小米移动软件有限公司 The display methods and device of application interface
CN109451141B (en) * 2018-09-26 2021-06-04 维沃移动通信有限公司 Operation control method and related terminal
CN109918896A (en) * 2019-01-30 2019-06-21 上海传英信息技术有限公司 Application permission control method, secondary terminal and higher level's terminal
CN111277807A (en) * 2020-01-14 2020-06-12 广东小天才科技有限公司 Projection implementation method, wearable device, display device and storage medium
CN114286178B (en) * 2021-12-31 2023-08-11 神思电子技术股份有限公司 Privacy data protection method, device and medium based on remote control

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201203870Y (en) * 2007-12-28 2009-03-04 北京帮助在线信息技术有限公司 Apparatus for protecting on-line help transparent window privacy
CN101470786A (en) * 2007-12-28 2009-07-01 北京帮助在线信息技术有限公司 Apparatus and method used for transparent window intimacy protection of on-line help
CN101470787A (en) * 2007-12-28 2009-07-01 北京帮助在线信息技术有限公司 Apparatus and method used for transparent window intimacy protection of on-line help
CN103077361A (en) * 2012-12-28 2013-05-01 东莞宇龙通信科技有限公司 Mobile terminal and anti-spy method thereof
CN103237047A (en) * 2013-03-11 2013-08-07 广东欧珀移动通信有限公司 Remote controlled and control method
CN104298484A (en) * 2014-10-17 2015-01-21 深圳市中兴移动通信有限公司 Multi-screen interaction method and device
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN104680090A (en) * 2015-02-06 2015-06-03 西安酷派软件科技有限公司 Application hiding control method, device and mobile terminal
CN105069374A (en) * 2015-08-06 2015-11-18 上海斐讯数据通信技术有限公司 Private data intercepting protection method and system
CN105095770A (en) * 2014-04-18 2015-11-25 海信集团有限公司 Method and device for multi-screen interaction of multimedia resource

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201203870Y (en) * 2007-12-28 2009-03-04 北京帮助在线信息技术有限公司 Apparatus for protecting on-line help transparent window privacy
CN101470786A (en) * 2007-12-28 2009-07-01 北京帮助在线信息技术有限公司 Apparatus and method used for transparent window intimacy protection of on-line help
CN101470787A (en) * 2007-12-28 2009-07-01 北京帮助在线信息技术有限公司 Apparatus and method used for transparent window intimacy protection of on-line help
CN103077361A (en) * 2012-12-28 2013-05-01 东莞宇龙通信科技有限公司 Mobile terminal and anti-spy method thereof
CN103237047A (en) * 2013-03-11 2013-08-07 广东欧珀移动通信有限公司 Remote controlled and control method
CN105095770A (en) * 2014-04-18 2015-11-25 海信集团有限公司 Method and device for multi-screen interaction of multimedia resource
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN104298484A (en) * 2014-10-17 2015-01-21 深圳市中兴移动通信有限公司 Multi-screen interaction method and device
CN104680090A (en) * 2015-02-06 2015-06-03 西安酷派软件科技有限公司 Application hiding control method, device and mobile terminal
CN105069374A (en) * 2015-08-06 2015-11-18 上海斐讯数据通信技术有限公司 Private data intercepting protection method and system

Also Published As

Publication number Publication date
CN105956486A (en) 2016-09-21

Similar Documents

Publication Publication Date Title
CN105956486B (en) Long-range control method and device
CN105511686B (en) Call processing method, device and terminal electronic device
CN104182313B (en) Be delayed the method and apparatus taken pictures
CN105607834B (en) Screen control method, device and terminal
CN106095220B (en) Notification message reminding method and device
WO2017177595A1 (en) Data migration method and device
CN107357505A (en) The method, apparatus and computer-readable recording medium of screenshot capture
CN105516508A (en) Method and device for activating virtual SIM card
CN104837154B (en) The control method and device of wireless access points
CN104965732B (en) Desktop starts method and device
CN105554255B (en) Method of controlling operation thereof and device for terminal device
CN106528131A (en) Application function display method and apparatus, and terminal device
CN109117229A (en) Screen partition domain display methods and device
CN105426060B (en) application control method and device
CN105426745B (en) Information display method and device
CN105955684A (en) Image display method and apparatus
CN109558229A (en) Browser control method and device
CN106096442B (en) Applications trigger method and device
CN106650569B (en) Fingerprint input method and device
CN106101372B (en) Using prompting setting method and device
CN105955635B (en) Interface display method and device
CN106325621B (en) Mobile terminal and touch-responsive method
CN107239236A (en) Method for writing data and device
CN106775240A (en) The triggering method of application program, device and terminal
CN106789554A (en) The method and device of short message treatment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant