CN105956486B - Long-range control method and device - Google Patents
Long-range control method and device Download PDFInfo
- Publication number
- CN105956486B CN105956486B CN201610282464.5A CN201610282464A CN105956486B CN 105956486 B CN105956486 B CN 105956486B CN 201610282464 A CN201610282464 A CN 201610282464A CN 105956486 B CN105956486 B CN 105956486B
- Authority
- CN
- China
- Prior art keywords
- application
- privacy
- display interface
- page
- interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- User Interface Of Digital Computer (AREA)
- Controls And Circuits For Display Device (AREA)
Abstract
The disclosure is directed to a kind of long-range control method and devices, belong to Internet technical field.The method is applied to first terminal, the described method includes: during remotely being controlled by second terminal, for each application in the first terminal, when detecting the enabled instruction for the application, start the application, and judges whether the application is privacy application;When the application be privacy in application, after starting the application, the display interface of the application is shielded, the masked images of the display interface are obtained;Show the masked images of the display interface.The privacy leakage of first terminal can be effectively prevented in the disclosure, guarantees the personal secrets of first terminal.
Description
Technical field
This disclosure relates to Internet technical field more particularly to a kind of long-range control method and device.
Background technique
It with the development of internet technology, often can be by long-range in order to meet the needs of user is for terminal management
Control technology realizes the Screen sharing and control between two or more terminals, wherein the terminal being remotely controlled can claim
For first terminal, the terminal remotely controlled first terminal is properly termed as second terminal.Since remote control technology has
High priority control characteristic, the high priority control characteristic be embodied in second terminal possess first terminal is controlled it is all
Permission, thus second terminal to first terminal carry out remotely control during, using second terminal user easily due to
Maloperation and start include in first terminal privacy information application, and after the application is activated, first terminal can show that this is answered
Display interface, so as to cause the privacy leakage of first terminal, therefore, needing one kind can let out to avoid the privacy of first terminal
The long-range control method of dew.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of long-range control method and device.
According to the first aspect of the embodiments of the present disclosure, a kind of long-range control method is provided, first terminal, the side are applied to
Method includes:
During remotely being controlled by second terminal, for each application in the first terminal, when detecting needle
When to the enabled instruction of the application, start the application, and judges whether the application is privacy application;
When the application be privacy in application, after starting the application, the display interface of the application is shielded,
Obtain the masked images of the display interface;
Show the masked images of the display interface.
With reference to first aspect, in the first possible implementation of above-mentioned first aspect, the judgement application
It whether is privacy application, comprising:
Judge the application identities that the application whether has been stored in the first privacy list of storage, the first privacy list
For storing the application identities of privacy application;
When having stored the application identities of the application in the first privacy list, determine that the application is answered for privacy
With.
The possible implementation of with reference to first aspect the first, in second of possible realization side of above-mentioned first aspect
In formula, the method also includes:
It, will when detecting the first preset instructions for the application for each application in the first terminal
The application identities of the application are stored into the first privacy list.
With reference to first aspect, described to the application in the third possible implementation of above-mentioned first aspect
Display interface is shielded, and the masked images of the display interface are obtained, comprising:
All areas in the display interface of the application are shielded, the interface image of the display interface is obtained;
The interface image is determined as to the masked images of the display interface.
With reference to first aspect, described to the application in the 4th kind of possible implementation of above-mentioned first aspect
Display interface is shielded, and the masked images of the display interface are obtained, comprising:
All areas in the display interface of the application are shielded, the interface image of the display interface is obtained;
Determine the open region in the interface image, the information in the open region is not privacy information;
The shielding to the open region is released, the masked images of the display interface are obtained.
The 4th kind of possible implementation with reference to first aspect, in the 5th kind of possible realization side of above-mentioned first aspect
Open region in formula, in the determination interface image, comprising:
When detecting the first choice instruction for the interface image, the first choice is instructed into selected area
Domain is determined as open region;Alternatively,
When detecting the second selection instruction for the interface image, specified region is determined as open region, institute
Stating specified region is the region in the interface image in addition to the selected region of the second selection instruction.
The third possible implementation or the 4th kind of possible implementation with reference to first aspect, above-mentioned first
In 6th kind of possible implementation of aspect, all areas in the display interface to the application are shielded, and obtain
To the interface image of the display interface, comprising:
By the specified image covering of all areas in the display interface, the interface image of the display interface is obtained;
Alternatively,
All information for including in the display interface are replaced with designated character, obtain the surface chart of the display interface
Picture.
Any possible implementation into the 5th kind of possible implementation of first aspect with reference to first aspect, in institute
It states in the 7th kind of possible implementation of first aspect, the method also includes:
For each application in the first terminal, after starting the application, the application is directed to when detecting
When the idsplay order of function pages, judge whether the function pages are the privacy page;
When the function pages are the privacy page, the function pages are shielded, the function pages are obtained
Masked images;
Show the masked images of the function pages.
The 7th kind of possible implementation with reference to first aspect, in the 8th kind of possible realization side of above-mentioned first aspect
It is described to judge whether the function pages are the privacy page in formula, comprising:
Judge the page iden-tity that the function pages whether have been stored in the second privacy list of storage, second privacy
List is used to store the page iden-tity of the privacy page;
When having stored the page iden-tity of the function pages in the second privacy list, determine that the function pages are
The privacy page.
The 7th kind of possible implementation with reference to first aspect, in the 9th kind of possible realization side of above-mentioned first aspect
It is described to judge whether the function pages are the privacy page in formula, comprising:
Whether judge in the function pages comprising privacy information;
When in the function pages including privacy information, determine that the function pages are the privacy page.
According to the second aspect of an embodiment of the present disclosure, a kind of remote control apparatus is provided, described device includes:
First judgment module, for being answered for each of first terminal during remotely being controlled by second terminal
With when detecting the enabled instruction for the application, starting the application, and judge whether the application is that privacy is answered
With;
First shroud module, for being privacy in application, after starting the application when the application, to the application
Display interface is shielded, and the masked images of the display interface are obtained;
First display module, for showing the masked images of the display interface.
In conjunction with second aspect, in the first possible implementation of above-mentioned second aspect, the first judgment module
Include:
First judging unit, for whether having stored the application mark of the application in judging the first privacy list of storage
Know, the first privacy list is used to store the application identities of privacy application;
First determination unit, for determining when having stored the application identities of the application in the first privacy list
The application is privacy application.
In conjunction with the first possible implementation of second aspect, in second of possible realization side of above-mentioned second aspect
In formula, described device further include:
Memory module, for being directed to the first of the application when detecting for each application in the first terminal
When preset instructions, the application identities of the application are stored into the first privacy list.
In conjunction with second aspect, in the third possible implementation of above-mentioned second aspect, first shroud module
Include:
Screen unit is shielded for all areas in the display interface to the application, obtains display circle
The interface image in face;
Second determination unit, for the interface image to be determined as to the masked images of the display interface.
In conjunction with second aspect, in the 4th kind of possible implementation of above-mentioned second aspect, first shroud module
Include:
The screen unit is shielded for all areas in the display interface to the application, is obtained described aobvious
Show the interface image at interface;
Third determination unit, for determining the open region in the interface image, the information in the open region is not
For privacy information;
Lifting unit obtains the masked images of the display interface for releasing the shielding to the open region.
In conjunction with the 4th kind of possible implementation of second aspect, in the 5th kind of possible realization side of above-mentioned second aspect
In formula, the third determination unit includes:
First determines subelement, for when detecting the first choice instruction for the interface image, by described the
The selected region of one selection instruction is determined as open region;Alternatively,
Second determines subelement, for when detecting the second selection instruction for the interface image, by specified area
Domain is determined as open region, the specified region be in the interface image except the selected region of the second selection instruction it
Outer region.
In conjunction with the third possible implementation of second aspect or the 4th kind of possible implementation, above-mentioned second
In 6th kind of possible implementation of aspect, the screen unit includes:
Subelement is covered, for obtaining the display for the specified image covering of all areas in the display interface
The interface image at interface;Alternatively,
Subelement is replaced, for replacing all information for including in the display interface with designated character, is obtained described
The interface image of display interface.
In conjunction with second aspect to second aspect the 5th kind of possible implementation in any possible implementation, upper
It states in the 7th kind of possible implementation of second aspect, described device further include:
Second judgment module, for working as detection after starting the application for each application in the first terminal
To for the application function pages idsplay order when, judge whether the function pages are the privacy page;
Secondary shielding module, for shielding, obtaining to the function pages when the function pages are the privacy page
To the masked images of the function pages;
Second display module, for showing the masked images of the function pages.
In conjunction with the 7th kind of possible implementation of second aspect, in the 8th kind of possible realization side of above-mentioned second aspect
In formula, second judgment module includes:
Second judgment unit, for whether having stored the page of the function pages in judging the second privacy list of storage
Mark, the second privacy list are used to store the page iden-tity of the privacy page;
4th determination unit, for when having stored the page iden-tity of the function pages in the second privacy list,
Determine that the function pages are the privacy page.
In conjunction with the 7th kind of possible implementation of second aspect, in the 9th kind of possible realization side of above-mentioned second aspect
In formula, second judgment module includes:
Third judging unit, for whether judging in the function pages comprising privacy information;
5th determination unit, for when in the function pages including privacy information, determining that the function pages are hidden
The private page.
According to the third aspect of an embodiment of the present disclosure, a kind of remote control apparatus is provided, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
During remotely being controlled by second terminal, for each application in first terminal, institute is directed to when detecting
When stating the enabled instruction of application, start the application, and judges whether the application is privacy application;
When the application be privacy in application, after starting the application, the display interface of the application is shielded,
Obtain the masked images of the display interface;
Show the masked images of the display interface.
The technical scheme provided by this disclosed embodiment can include the following benefits: in the embodiments of the present disclosure,
During first terminal is remotely controlled by second terminal, for each application in first terminal, when first terminal detects
For the application enabled instruction when, start the application, and judge whether the application is privacy application, when the application is answered for privacy
Used time, after starting the application, first terminal can be shielded the display interface of the application, obtain the screen of the display interface
Image is covered, and shows the masked images of the display interface.Since the masked images of the display interface are carried out to the display interface
It is obtained after shielding, it can thus be avoided the privacy information for including in privacy application is known by second user, so as to have
Effect prevents the privacy leakage of first terminal, guarantees the personal secrets of first terminal.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of long-range control method shown according to an exemplary embodiment.
Fig. 2 is the flow chart of another long-range control method shown according to an exemplary embodiment.
Fig. 3 is a kind of schematic diagram of first privacy list shown according to an exemplary embodiment.
Fig. 4 is a kind of schematic diagram of display interface shown according to an exemplary embodiment.
Fig. 5 (a) is a kind of schematic diagram of specified image shown according to an exemplary embodiment.
Fig. 5 (b) is a kind of schematic diagram of interface image shown according to an exemplary embodiment.
Fig. 6 is the schematic diagram of another interface image shown according to an exemplary embodiment.
Fig. 7 (a) is the schematic diagram of another interface image shown according to an exemplary embodiment.
Fig. 7 (b) is a kind of schematic diagram of the masked images of display interface shown according to an exemplary embodiment.
Fig. 8 is a kind of schematic diagram of second privacy list shown according to an exemplary embodiment.
Fig. 9 is a kind of block diagram of remote control apparatus shown according to an exemplary embodiment.
Figure 10 is a kind of block diagram of first judgment module shown according to an exemplary embodiment.
Figure 11 is a kind of block diagram of first shroud module shown according to an exemplary embodiment.
Figure 12 is the block diagram of another first shroud module shown according to an exemplary embodiment.
Figure 13 is a kind of block diagram of third determination unit shown according to an exemplary embodiment.
Figure 14 is a kind of block diagram of screen unit shown according to an exemplary embodiment.
Figure 15 is the block diagram of another remote control apparatus shown according to an exemplary embodiment.
Figure 16 is a kind of block diagram of second judgment module shown according to an exemplary embodiment.
Figure 17 is the block diagram of another second judgment module shown according to an exemplary embodiment.
Figure 18 is the block diagram of another remote control apparatus shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Before to the embodiment of the present disclosure carrying out that explanation is explained in detail, first the application scenarios of the embodiment of the present disclosure are given
Explanation.In order to meet the needs of user is for terminal management, often two or more can be realized by remote control technology
Screen sharing and control between terminal.And due to second terminal to first terminal carry out remotely control during, second
Terminal possesses all permissions controlled first terminal, so the user using second terminal is easily opened due to maloperation
It include the application of privacy information in dynamic first terminal, and after the application is activated, first terminal can show display circle of the application
Face, so as to cause the privacy leakage of first terminal, therefore, the embodiment of the present disclosure provides a kind of long-range control method, to avoid
The privacy leakage of first terminal.
Fig. 1 is a kind of flow chart of long-range control method shown according to an exemplary embodiment, and this method is used for first
In terminal.As shown in Figure 1, this approach includes the following steps.
In a step 101, during remotely being controlled by second terminal, for each application in first terminal, when
When detecting the enabled instruction for application, starting application, and judge whether apply is privacy application.
In a step 102, it is privacy in application, after starting application when applying, the display interface of application is shielded,
Obtain the masked images of display interface.
In step 103, the masked images of display interface are shown.
In the embodiments of the present disclosure, during first terminal is remotely controlled by second terminal, in first terminal
Each application start the application when first terminal detects the enabled instruction for the application, and whether judge the application
For privacy application, when the application is privacy in application, after starting the application, first terminal can be to the display interface of the application
It is shielded, obtains the masked images of the display interface, and show the masked images of the display interface.Due to the display interface
Masked images are obtained after shielding to the display interface, it can thus be avoided the privacy letter for including in privacy application
Breath is known by second user, so as to effectively prevent the privacy leakage of first terminal, guarantees the personal secrets of first terminal.
In another embodiment of the present disclosure, judge whether apply is privacy application, comprising:
Judge the application identities that application whether has been stored in the first privacy list of storage, the first privacy list is for storing
The application identities of privacy application;
When having stored the application identities of application in the first privacy list, determine that application is privacy application.
In another embodiment of the present disclosure, this method further include:
For each application in first terminal, when detecting the first preset instructions for application, by answering for application
With mark storage into the first privacy list.
In another embodiment of the present disclosure, the display interface of application is shielded, obtains the shielding figure of display interface
Picture, comprising:
All areas in the display interface of application are shielded, the interface image of display interface is obtained;
Interface image is determined as to the masked images of display interface.
In another embodiment of the present disclosure, the display interface of application is shielded, obtains the shielding figure of display interface
Picture, comprising:
All areas in the display interface of application are shielded, the interface image of display interface is obtained;
Determine the open region in interface image, the information in open region is not privacy information;
The shielding to open region is released, the masked images of display interface are obtained.
In another embodiment of the present disclosure, the open region in interface image is determined, comprising:
When detecting the first choice instruction for interface image, selected region is instructed to be determined as first choice
Open region;Alternatively,
When detecting the second selection instruction for interface image, specified region is determined as open region, specifies area
Domain is the region in interface image in addition to the selected region of the second selection instruction.
In another embodiment of the present disclosure, all areas in the display interface of application are shielded, are shown
The interface image at interface, comprising:
By the specified image covering of all areas in display interface, the interface image of display interface is obtained;Alternatively,
All information for including in display interface are replaced with designated character, obtain the interface image of display interface.
In another embodiment of the present disclosure, this method further include:
For each application in first terminal, after starting application, the aobvious of the function pages applied is directed to when detecting
When showing instruction, whether the arbitration functions page is the privacy page;
When function pages are the privacy page, function pages are shielded, the masked images of function pages are obtained;
The masked images of the display function page.
In another embodiment of the present disclosure, whether the arbitration functions page is the privacy page, comprising:
Judge whether the page iden-tity of the store function page, the second privacy list are used in the second privacy list of storage
Store the page iden-tity of the privacy page;
When the page iden-tity of the store function page in the second privacy list, determine that function pages are the privacy page.
In another embodiment of the present disclosure, whether the arbitration functions page is the privacy page, comprising:
It whether include privacy information in the arbitration functions page;
When in function pages including privacy information, determine that function pages are the privacy page.
All the above alternatives, can form the alternative embodiment of the disclosure according to any combination, and the disclosure is real
It applies example and this is no longer repeated one by one.
Fig. 2 is a kind of flow chart of long-range control method shown according to an exemplary embodiment, and this method is used for first
In terminal.As shown in Fig. 2, this approach includes the following steps.
In step 201, during remotely being controlled by second terminal, for each application in first terminal, when
When detecting the enabled instruction for the application, start the application, and judge whether the application is privacy application.
It should be noted that enabled instruction is applied for starting, and the enabled instruction can be triggered by the first user, first
User can be single-click operation, double click operation, voice operating etc., the disclosure by specified operation triggering, the specified operation
Embodiment is not specifically limited in this embodiment.Wherein, the first user is the user using first terminal.
In addition, privacy application can be the application comprising privacy information, it can also be to be answered by what the first user freely set
With the embodiment of the present disclosure is not specifically limited in this embodiment.In one embodiment, privacy application can for example answer for instant messaging
With, shopping platform application etc..In another embodiment, privacy application can also be set as having access for example for the first user
The application of limitation, for example, camera shooting application, note application, dialing application etc..Wherein, privacy information may include ID card No.,
Phone number, Bank Account Number, customer name, account balance, birthdate etc., the embodiment of the present disclosure do not do specific limit to this
It is fixed.
Wherein, when detecting the enabled instruction for the application, the operation for starting the application can refer to the relevant technologies,
The embodiment of the present disclosure is to this without elaborating.
Wherein, judge whether the application is privacy in application, may determine that whether deposited in the first privacy list of storage
The application identities of the application are stored up, which is used to store the application identities of privacy application;When the first privacy list
In when having stored the application identities of the application, determine that the application is privacy application;When not stored this is answered in the first privacy list
When application identities, determining the application not is privacy application.Due to can be directly according to the first privacy list come simple fast
Judge whether the application is privacy application fastly, without carrying out other complex operations, it is thus possible to improve judging efficiency.
It should be noted that the first privacy list is used to determine the privacy application in first terminal.For example, when this is first hidden
When the application identities stored in private list are application identities 1, application identities 3 and application identities 4, which can be with table
It is now form as shown in Figure 3, certainly, in practical application, which can also show as other forms, the disclosure
Embodiment is not specifically limited in this embodiment.
In addition, application identities are used for unique identification application, and the application identities can be Apply Names, the application drawing of application
Mark etc., the embodiment of the present disclosure is not specifically limited in this embodiment.
For example, the application identities of the application are application identities 1, the application identities stored in the first privacy list are application
Mark 1, application identities 3 and application identities 4, then can determine the application identities that the application has been stored in the first privacy list,
Determine that the application is privacy application.
For another example the application identities of the application are application identities 2, the application identities stored in the first privacy list are to answer
With mark 1, application identities 3 and application identities 4, then the application mark of the not stored application in the first privacy list can be determined
Know, determining the application not is privacy application.
Further, each application in first terminal can also be preset when detecting for the first of the application
When instruction, the application identities of the application are stored into the first privacy list.
It should be noted that the first preset instructions are used to indicate the application identities storage of application to the first privacy list
In, which can be triggered by the first user, and the first user can pass through specified operation triggering, the embodiment of the present disclosure
It is not specifically limited in this embodiment.
Since first preset instructions can be triggered by the first user, application identities of the first terminal to the application
The process that the process stored actually namely the first user operates the first privacy list.And due to first hidden
Private list is used to determine the privacy application in first terminal, therefore, the mistake that the first user operates the first privacy list
Journey actually namely determines that the process of the privacy application in first terminal, the determination process simple and flexible can not only save
Privacy application is fixed time really, can also meet the privacy requirements of the first user, thus ensure that the personal secrets of first terminal,
And improve the operating experience of the first user.
It should be noted that first terminal can also incite somebody to action before the first user operates the first privacy list
Specified application identities are prestored in the first privacy list, are fixed time really with being further reduced privacy application.Wherein, refer to
Determining application identities can preset, and specifying application identities such as this can be application identities, the shopping platform of instant messaging application
The application identities etc. of application, the embodiment of the present disclosure is not specifically limited in this embodiment.
Wherein, by the storage of the application identities of the application in the first privacy list operation in the related technology will be a certain
Information storage is similar to the operation in some list, and the embodiment of the present disclosure is to this without elaborating.
In step 202, when the application is privacy in application, after starting the application, to the display interface of the application into
Row shielding, obtains the masked images of the display interface.
It should be noted that the display interface of application is that the application is activated rear shown interface.
Since display interface of first user to the application may have different shielding demands, such as the first user may
Want to shield all areas in the display interface of the application, or wants to the part in the display interface of the application
Region is shielded, and therefore, shielding demand that can be different according to the first user shields the display interface of the application,
Obtain the masked images of the display interface.And the shielding demand different according to the first user, the display interface of the application is carried out
Shielding, the operation for obtaining the masked images of the display interface can be realized by the following two kinds mode:
First way: shielding all areas in the display interface of the application, obtains the boundary of the display interface
The interface image is determined as the masked images of the display interface by face image.
It should be noted that the masked images of the display interface obtained by above-mentioned first way are the display interface
Full-shield image, all areas in the full-shield image are shielded, which can satisfy the first user couple
The full-shield demand of the display interface, all information for including in the display interface at this time not will be leaked, so as to protect
Demonstrate,prove the personal secrets of first terminal.
Wherein, all areas in the display interface of the application are shielded, obtains the interface image of the display interface
When, the specified image covering of all areas in the display interface can be obtained into the interface image of the display interface;Alternatively,
All information for including in the display interface are replaced with designated character, obtain the interface image of the display interface, it is certainly, practical
In, all areas in the display interface can also be shielded otherwise, obtain the boundary of the display interface
Face image, the embodiment of the present disclosure are not specifically limited in this embodiment.
It should be noted that specified image can be preset, specifying image such as this can be mosaic image, solid block of color
Image or other images, the embodiment of the present disclosure are not specifically limited in this embodiment.
In addition, designated character can be preset, such as the designated character can be symbol *, #, %, number 1,2,3 etc.,
The embodiment of the present disclosure is not specifically limited in this embodiment.
For example, the display interface is interface as shown in Figure 4, specifying image is the image as shown in Fig. 5 (a), then can be with
It specifies image to cover with this all areas in display interface, obtains the surface chart of the display interface as shown in Fig. 5 (b)
Picture.
For another example the display interface is interface as shown in Figure 4, designated character is symbol *, then can be by the display interface
In include all information with the designated character replace, obtain the interface image of the display interface as shown in FIG. 6.
The second way: shielding all areas in the display interface of the application, obtains the boundary of the display interface
Face image;Determine the open region in the interface image, the information in the disclosure region is not privacy information;It releases to the disclosure
The shielding in region obtains the masked images of the display interface.
It should be noted that the masked images of the display interface obtained by the above-mentioned second way are the display interface
Partly shielding effect image, the region in the partly shielding effect image in addition to open region shielded, which can
To meet the first user to the partly shielding effect demand of the display interface, the region in the display interface in addition to open region at this time
In all information not will be leaked, thereby may be ensured that the personal secrets of first terminal.
For example, first terminal shields all areas in the display interface of the application, obtain as shown in Fig. 7 (a)
Interface image, it is assumed that first terminal determines that the open region in the interface image is the area shown in Fig. 7 (a) in interface image
Domain 1 can then release the shielding to open region 1, obtain the masked images of the display interface as shown in Fig. 7 (b).
Wherein, all areas in the display interface of the application are shielded, obtains the interface image of the display interface
Operation it is identical as the operation in above-mentioned first way, details are not described herein for the embodiment of the present disclosure.
It, can be when detecting the first choosing for the interface image wherein it is determined that when open region in the display interface
When selecting instruction, selected region is instructed to be determined as open region the first choice;Alternatively, when detecting for the surface chart
When the second selection instruction of picture, specified region is determined as open region, the specified region be in the interface image except this second
Region except the selected region of selection instruction.
It should be noted that first choice instruction, for selecting open region from the interface image, which refers to
Order can be triggered by the first user, and the first user can not do specific limit to this by specified operation triggering, the embodiment of the present disclosure
It is fixed.
In addition, the second selection instruction, for selecting privacy area from the interface image, which is the surface chart
Region as in addition to display area, second selection instruction can be triggered by the first user, and the first user can pass through finger
Fixed operation triggering, the embodiment of the present disclosure are not specifically limited in this embodiment.
Furthermore since first choice instruction and the second selection instruction can be triggered by the first user, the disclosure is real
It applies in example through the process of first choice instruction or the second selection instruction selection region in practical applications, the can be shown as
One user passes through virtual dauber to some region of slide etc., originally to some region of frame selection operation, the first user
Open embodiment is not specifically limited in this embodiment.
For example, the interface image of the display interface is the image as shown in Fig. 7 (a), first choice instructs selected area
Domain is the region 1 in interface image shown in Fig. 7 (a), then region 1 can be determined as to open region.
For another example the interface image of the display interface is the image as shown in Fig. 7 (a), the second selection instruction is selected
Region is the region 2 in interface image shown in Fig. 7 (a), then can be true by the region 1 in the interface image in addition to region 2
It is set to specified region, and specifies region 1 to be determined as open region this.
It wherein, can be according to first terminal to all areas of the display interface when releasing the shielding to the disclosure region
The operation shielded carries out correspondingly inverse operation to the disclosure region, to release the shielding to the disclosure region, shows the public affairs
Information in open region.
For example, all areas in the display interface are covered with specified image, then it at this time can be to the disclosure region
The specified image of upper covering is eliminated, and to release the shielding to the disclosure region, shows the information in the disclosure region.
It, then at this time can be with for another example all information for including in the display interface are replaced with designated character
It is counter to all designated characters for including in the disclosure region to be replaced, to release the shielding to the disclosure region, show the public affairs
Information in open region.
In step 203, the masked images of the display interface are shown.
It should be noted that showing the operation of the masked images of the display interface and showing a certain image in the related technology
Operate similar, the embodiment of the present disclosure is to this without elaborating.
It should be noted that when the masked images of the display interface are the full-shield image of the display interface, the display
All areas in the masked images at interface are shielded, thus when second user is opened in first terminal due to maloperation
Privacy in application, can to avoid the privacy apply in include privacy information be known by second user, avoid first terminal
Privacy leakage, and can prevent second user from continuing to operate the display interface, it ensure that the personal secrets of first terminal.
In addition, when the masked images of the display interface are the partly shielding effect image of the display interface, the display interface
Region in masked images in addition to open region is shielded, since the information in the disclosure region is not privacy information, because
This, when second user opens the privacy in first terminal in application, equally can be to avoid in privacy application due to maloperation
The privacy information for including is known by second user, avoids the privacy leakage of first terminal, ensure that the privacy peace of first terminal
Entirely.And due to showing the information in the disclosure region in the masked images of the display interface, so as to be convenient for the first user
Perhaps the information in second user timely learning the disclosure region and convenient for the first user or second user to the disclosure region
In information handled, improve user experience.
Further, it can also be somebody's turn to do for each application in first terminal, after starting the application when detecting to be directed to
When the idsplay order of the function pages of application, judge whether the function pages are the privacy page;When the function pages are privacy page
When face, which is shielded, obtains the masked images of the function pages;Show the masked images of the function pages.
It should be noted that the page that the function pages of application are shown after being opened for the functional module in the application.
In addition, idsplay order is used to show the function pages, and the idsplay order can be triggered by the first user, and first uses
Family can be not specifically limited in this embodiment by specified operation triggering, the embodiment of the present disclosure.
It can also be the page freely set by the first user furthermore the privacy page can be the page comprising privacy information
Face, the embodiment of the present disclosure are not specifically limited in this embodiment.In one embodiment, the privacy page for example can for the address list page,
Page etc. is set.In another embodiment, which can also for example be set as with access limitation for the first user
The page, for example, the collection page, historical record page etc..
Wherein, judge whether the function pages are that the operation of the privacy page can be realized by the following two kinds mode.
First way: judging the page iden-tity that the function pages whether have been stored in the second privacy list of storage, should
Second privacy list is used to store the page iden-tity of the privacy page;When the page for having stored the function pages in the second privacy list
When face identifies, determine that the function pages are the privacy page;When the page mark of the not stored function pages in the second privacy list
When knowledge, determining the function pages not is the privacy page.
It should be noted that directly can quickly and easily be sentenced according to the second privacy list in above-mentioned first way
Whether the function pages that break are the privacy page, without carrying out other complex operations, so as to improve judging efficiency.
It should be noted that the second privacy list is for determining the privacy page in application.For example, when second privacy arranges
When the page iden-tity stored in table is page iden-tity 1, page iden-tity 3 and page iden-tity 4, which can be shown as
Form as shown in Figure 8, certainly, in practical application, which can also show as other forms, and the disclosure is implemented
Example is not specifically limited in this embodiment.
In addition, page iden-tity is used for the unique identification page, and the page iden-tity can be the Page Name etc. of the page, this
Open embodiment is not specifically limited in this embodiment.
For example, the page iden-tity of the function pages is page iden-tity 1, the page iden-tity stored in the second privacy list is
Page iden-tity 1, page iden-tity 3 and page iden-tity 4 can then determine the page that the function pages have been stored in the second privacy list
Face mark determines that the function pages are the privacy page.
For another example the page iden-tity of the function pages is page iden-tity 2, the page iden-tity stored in the second privacy list
For page iden-tity 1, page iden-tity 3 and page iden-tity 4, then the not stored function pages in the second privacy list can be determined
Page iden-tity, determining the function pages not is the privacy page.
It further, can also be for each function pages in the application, when detecting for the function pages
When two preset instructions, the page iden-tity of the function pages is stored into the second privacy list.
It should be noted that the second preset instructions are used to indicate the page iden-tity storage of the function pages to the second privacy
In list, which can be triggered by the first user, and the first user can be by specified operation triggering, and the disclosure is real
Example is applied to be not specifically limited in this embodiment.
Since second preset instructions can be triggered by the first user, the page of the first terminal to the function pages
Identify the process that process actually namely the first user stored operates the second privacy list.And due to
Two privacy lists are for determining the privacy page in application, therefore, the mistake that the first user operates the second privacy list
Journey actually namely determines that the process of the privacy page in application, the determination process simple and flexible can not only save privacy
The page is fixed time really, can also meet the privacy requirements of the first user, to ensure that the personal secrets of first terminal, and is mentioned
The high operating experience of first user.
It should be noted that first terminal can also incite somebody to action before the first user operates the second privacy list
Specified page mark is prestored in the second privacy list, is fixed time really with being further reduced the privacy page.Wherein, refer to
Determining page iden-tity can preset, as specified page mark can be the page iden-tity of the address list page, the page is arranged
Page iden-tity etc., the embodiment of the present disclosure is not specifically limited in this embodiment.
Wherein, the page iden-tity storage of the function pages to the operation in the second privacy list and in the related technology will
A certain information storage is similar to the operation in some list, and the embodiment of the present disclosure is to this without elaborating.
The second way: whether judge in the function pages comprising privacy information;When in the function pages include privacy believe
When breath, determine that the function pages are the privacy page;When not including privacy information in the function pages, the function pages are determined not
For the privacy page.
It should be noted that whether including privacy information according only in the function pages in the above-mentioned second way
Judge whether the function pages are the privacy page, and the deterministic process simple and flexible, judging efficiency is higher, as long as and which predefines
A little information are privacy information, so that it may carry out accurate judgement to function pages all in application, judging nicety rate is also higher.
Wherein, judge whether the operation comprising privacy information can refer to the relevant technologies in the function pages, and the disclosure is real
Example is applied to be not specifically limited in this embodiment.
For example, privacy information is ID card No., then whether first terminal may determine that in the function pages comprising identity
Number is demonstrate,proved, when in the function pages including ID card No., can determine that the function pages are the privacy page, when the page function
When not including ID card No. in face, can determine the function pages not is the privacy page.
Wherein, when the function pages are the privacy page, which is shielded, the screen of the function pages is obtained
The operation for covering image is similar with the operation in above-mentioned steps 202, and the embodiment of the present disclosure repeats no more this.
Wherein, the operation for showing the masked images of the function pages and the operation class for showing a certain image in the related technology
Seemingly, the embodiment of the present disclosure is to this without elaborating.
It should be noted that in the embodiment of the present disclosure, it, can be to the function pages when the function pages are the privacy page
Shielded, obtain the masked images of the function pages, and show the masked images of the function pages, thus when second user by
It, can be to avoid the privacy information for including in the privacy page by second user when the privacy page in application is opened in maloperation
Know, avoid the privacy leakage of first terminal, ensure that the personal secrets of first terminal.
In the embodiments of the present disclosure, during first terminal is remotely controlled by second terminal, in first terminal
Each application start the application when first terminal detects the enabled instruction for the application, and whether judge the application
For privacy application, when the application is privacy in application, after starting the application, first terminal can be to the display interface of the application
It is shielded, obtains the masked images of the display interface, and show the masked images of the display interface.Due to the display interface
Masked images are obtained after shielding to the display interface, it can thus be avoided the privacy letter for including in privacy application
Breath is known by second user, so as to effectively prevent the privacy leakage of first terminal, guarantees the personal secrets of first terminal.
Fig. 9 is a kind of block diagram of remote control apparatus shown according to an exemplary embodiment.Referring to Fig. 9, the device packet
Include first judgment module 901, the first shroud module 902 and the first display module 903.
First judgment module 901 is used for during remotely being controlled by second terminal, for each of first terminal
Using, when detecting the enabled instruction for application, starting application, and judge whether apply is privacy application;
First shroud module 902, for when using for privacy in application, starting apply after, to the display interface of application
It is shielded, obtains the masked images of display interface;
First display module 903, for showing the masked images of display interface.
In another embodiment of the present disclosure, referring to Fig.1 0, which includes the first judging unit 9011
With the first determination unit 9012.
First judging unit 9011, for whether having stored the application mark of application in judging the first privacy list of storage
Know, the first privacy list is used to store the application identities of privacy application;
First determination unit 9012, for determining application when having stored the application identities of application in the first privacy list
For privacy application.
In another embodiment of the present disclosure, which further includes memory module.
Memory module, for for each application in first terminal, when detecting the first preset instructions for application
When, the application identities of application are stored into the first privacy list.
In another embodiment of the present disclosure, referring to Fig.1 1, which includes screen unit 9021 and the
Three determination units 9022.
Screen unit 9021 shields for all areas in the display interface to application, obtains display interface
Interface image;
Second determination unit 9022, for interface image to be determined as to the masked images of display interface.
In another embodiment of the present disclosure, referring to Fig.1 2, which includes screen unit 9021, the
Three determination units 9023 and lifting unit 9024.
Screen unit 9021 shields for all areas in the display interface to application, obtains display interface
Interface image;
4th determination unit 9023, for determining the open region in interface image, the information in open region is not hidden
Personal letter breath;
Lifting unit 9024 obtains the masked images of display interface for releasing the shielding to open region.
In another embodiment of the present disclosure, referring to Fig.1 3, which includes first determining subelement
90231 and second determine subelement 90232.
First determines subelement 90231, for when detecting the first choice instruction for interface image, first to be selected
It selects the selected region of instruction and is determined as open region;Alternatively,
Second determines subelement 90232, for when detecting the second selection instruction for interface image, by specified area
Domain is determined as open region, and specifying region is the region in interface image in addition to the selected region of the second selection instruction.
In another embodiment of the present disclosure, referring to Fig.1 4, which includes covering subelement 90211 and replaces
Change subelement 90212.
Subelement 90211 is covered, for obtaining display interface for the specified image covering of all areas in display interface
Interface image;Alternatively,
Replacement subelement 90212 is shown for replacing all information for including in display interface with designated character
The interface image at interface.
In another embodiment of the present disclosure, referring to Fig.1 5, which further includes the second judgment module 904, secondary shielding
Module 905 and the second display module 906.
Second judgment module 904, for for each application in first terminal, after starting application, when detecting needle
When to the idsplay orders of the function pages of application, whether the arbitration functions page is the privacy page;
Secondary shielding module 905, for being shielded to function pages, obtaining function when function pages are the privacy page
The masked images of the energy page;
Second display module 906, the masked images for the display function page.
In another embodiment of the present disclosure, referring to Fig.1 6, which includes second judgment unit 9041
With the 4th determination unit 9042.
Second judgment unit 9041, the page of the whether store function page in the second privacy list for judging storage
Mark, the second privacy list are used to store the page iden-tity of the privacy page;
4th determination unit 9042, for determining when the page iden-tity of the store function page in the second privacy list
Function pages are the privacy page.
In another embodiment of the present disclosure, referring to Fig.1 7, which includes third judging unit 9043
With the 5th determination unit 9044.
Third judging unit 9043, for whether including privacy information in the arbitration functions page;
5th determination unit 9044, for when in function pages including privacy information, determining that function pages are privacy page
Face.
In the embodiments of the present disclosure, during first terminal is remotely controlled by second terminal, in first terminal
Each application start the application when first terminal detects the enabled instruction for the application, and whether judge the application
For privacy application, when the application is privacy in application, after starting the application, first terminal can be to the display interface of the application
It is shielded, obtains the masked images of the display interface, and show the masked images of the display interface.Due to the display interface
Masked images are obtained after shielding to the display interface, it can thus be avoided the privacy letter for including in privacy application
Breath is known by second user, so as to effectively prevent the privacy leakage of first terminal, guarantees the personal secrets of first terminal.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
Figure 18 is a kind of block diagram of device 1800 for image transmitting shown according to an exemplary embodiment.For example,
Device 1800 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device,
Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig.1 8, device 1800 may include following one or more components: processing component 1802, memory 1804,
Power supply module 1806, multimedia component 1808, audio component 1810, the interface 1812 of input/output (I/O), sensor module
1814 and communication component 1816.
The integrated operation of the usual control device 1800 of processing component 1802, such as with display, telephone call, data communication,
Camera operation and record operate associated operation.Processing component 1802 may include one or more processors 1820 to execute
Instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1802 may include one or more moulds
Block, convenient for the interaction between processing component 1802 and other assemblies.For example, processing component 1802 may include multi-media module,
To facilitate the interaction between multimedia component 1808 and processing component 1802.
Memory 1804 is configured as storing various types of data to support the operation in device 1800.These data
Example includes the instruction of any application or method for operating on device 1800, contact data, telephone book data,
Message, picture, video etc..Memory 1804 can by any kind of volatibility or non-volatile memory device or they
Combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Power supply module 1806 provides power supply for the various assemblies of device 1800.Power supply module 1806 may include power management
System, one or more power supplys and other with for device 1800 generate, manage, and distribute the associated component of power supply.
Multimedia component 1808 includes the screen of one output interface of offer between described device 1800 and controlled user
Curtain.In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touching
Panel, screen may be implemented as touch screen, to receive the input signal from controlled user.Touch panel includes one or more
A touch sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch
Or the boundary of sliding action, but also detect duration and pressure associated with the touch or slide operation.In some realities
It applies in example, multimedia component 1808 includes a front camera and/or rear camera.When device 1800 is in operation mould
Formula, such as in a shooting mode or a video mode, front camera and/or rear camera can receive external multi-medium data.
Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom energy
Power.
Audio component 1810 is configured as output and/or input audio signal.For example, audio component 1810 includes a wheat
Gram wind (MIC), when device 1800 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone quilt
It is configured to receive external audio signal.The received audio signal can be further stored in memory 1804 or via communication
Component 1816 is sent.In some embodiments, audio component 1810 further includes a loudspeaker, is used for output audio signal.
I/O interface 1812 provides interface, above-mentioned peripheral interface module between processing component 1802 and peripheral interface module
It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and
Locking press button.
Sensor module 1814 includes one or more sensors, and the state for providing various aspects for device 1800 is commented
Estimate.For example, sensor module 1814 can detecte the state that opens/closes of device 1800, the relative positioning of component, such as institute
The display and keypad that component is device 1800 are stated, sensor module 1814 can be with detection device 1800 or device 1,800 1
The position change of a component, the existence or non-existence that controlled user contacts with device 1800,1800 orientation of device or acceleration/deceleration
With the temperature change of device 1800.Sensor module 1814 may include proximity sensor, be configured to not any
It is detected the presence of nearby objects when physical contact.Sensor module 1814 can also include optical sensor, such as CMOS or ccd image
Sensor, for being used in imaging applications.In some embodiments, which can also include that acceleration passes
Sensor, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1816 is configured to facilitate the communication of wired or wireless way between device 1800 and other equipment.Dress
The wireless network based on communication standard, such as WiFi can be accessed by setting 1800,2G or 3G or their combination.It is exemplary at one
In embodiment, communication component 1816 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel
Information.In one exemplary embodiment, the communication component 1816 further includes near-field communication (NFC) module, to promote short distance
Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module
(UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1800 can be by one or more application specific integrated circuit (ASIC), number
Signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 1804 of instruction, above-metioned instruction can be executed by the processor 1820 of device 1800 to complete the above method.Example
Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft
Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device executes, so that mobile terminal is able to carry out a kind of long-range control method, which comprises
During remotely being controlled by second terminal, for each application in first terminal, answered when detecting to be directed to
When enabled instruction, starting application, and judge whether apply is privacy application;
It is privacy in application, after starting application when applying, the display interface of application is shielded, display interface is obtained
Masked images;
Show the masked images of display interface.
In another embodiment of the present disclosure, judge whether apply is privacy application, comprising:
Judge the application identities that application whether has been stored in the first privacy list of storage, the first privacy list is for storing
The application identities of privacy application;
When having stored the application identities of application in the first privacy list, determine that application is privacy application.
In another embodiment of the present disclosure, this method further include:
For each application in first terminal, when detecting the first preset instructions for application, by answering for application
With mark storage into the first privacy list.
In another embodiment of the present disclosure, the display interface of application is shielded, obtains the shielding figure of display interface
Picture, comprising:
All areas in the display interface of application are shielded, the interface image of display interface is obtained;
Interface image is determined as to the masked images of display interface.
In another embodiment of the present disclosure, the display interface of application is shielded, obtains the shielding figure of display interface
Picture, comprising:
All areas in the display interface of application are shielded, the interface image of display interface is obtained;
Determine the open region in interface image, the information in open region is not privacy information;
The shielding to open region is released, the masked images of display interface are obtained.
In another embodiment of the present disclosure, the open region in interface image is determined, comprising:
When detecting the first choice instruction for interface image, selected region is instructed to be determined as first choice
Open region;Alternatively,
When detecting the second selection instruction for interface image, specified region is determined as open region, specifies area
Domain is the region in interface image in addition to the selected region of the second selection instruction.
In another embodiment of the present disclosure, all areas in the display interface of application are shielded, are shown
The interface image at interface, comprising:
By the specified image covering of all areas in display interface, the interface image of display interface is obtained;Alternatively,
All information for including in display interface are replaced with designated character, obtain the interface image of display interface.
In another embodiment of the present disclosure, this method further include:
For each application in first terminal, after starting application, the aobvious of the function pages applied is directed to when detecting
When showing instruction, whether the arbitration functions page is the privacy page;
When function pages are the privacy page, function pages are shielded, the masked images of function pages are obtained;
The masked images of the display function page.
In another embodiment of the present disclosure, whether the arbitration functions page is the privacy page, comprising:
Judge whether the page iden-tity of the store function page, the second privacy list are used in the second privacy list of storage
Store the page iden-tity of the privacy page;
When the page iden-tity of the store function page in the second privacy list, determine that function pages are the privacy page.
In another embodiment of the present disclosure, whether the arbitration functions page is the privacy page, comprising:
It whether include privacy information in the arbitration functions page;
When in function pages including privacy information, determine that function pages are the privacy page.
In the embodiments of the present disclosure, during first terminal is remotely controlled by second terminal, in first terminal
Each application start the application when first terminal detects the enabled instruction for the application, and whether judge the application
For privacy application, when the application is privacy in application, after starting the application, first terminal can be to the display interface of the application
It is shielded, obtains the masked images of the display interface, and show the masked images of the display interface.Due to the display interface
Masked images are obtained after shielding to the display interface, it can thus be avoided the privacy letter for including in privacy application
Breath is known by second user, so as to effectively prevent the privacy leakage of first terminal, guarantees the personal secrets of first terminal.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or
Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.
Claims (15)
1. a kind of long-range control method, which is characterized in that be applied to first terminal, which comprises
During remotely being controlled by second terminal, for each application in the first terminal, institute is directed to when detecting
When stating the enabled instruction of application, start the application, and judges whether the application is privacy application;
When the application be privacy in application, after starting the application, the display interface of the application is shielded, is obtained
The masked images of the display interface, the display interface of the application are that the application is activated rear shown interface;
Show the masked images of the display interface;
The method also includes:
For each application in the first terminal, after starting the application, when detecting the function for the application
When the idsplay order of the page, the page iden-tity that the function pages whether have been stored in the second privacy list of storage, institute are judged
The second privacy list is stated for storing the page iden-tity of the privacy page, when having stored the page function in the second privacy list
When the page iden-tity in face, determine that the function pages are the privacy page, alternatively, whether judging in the function pages comprising privacy
Information determines that the function pages are the privacy page when in the function pages including privacy information;
When the function pages are the privacy page, the function pages are shielded, the shielding of the function pages is obtained
Image;
Show the masked images of the function pages.
2. the method as described in claim 1, which is characterized in that described to judge whether the application is privacy application, comprising:
Judge the application identities that the application whether has been stored in the first privacy list of storage, the first privacy list is used for
Store the application identities of privacy application;
When having stored the application identities of the application in the first privacy list, determine that the application is privacy application.
3. method according to claim 2, which is characterized in that the method also includes:
It, will be described when detecting the first preset instructions for the application for each application in the first terminal
The application identities of application are stored into the first privacy list.
4. the method as described in claim 1, which is characterized in that the display interface to the application shields, and obtains
The masked images of the display interface, comprising:
All areas in the display interface of the application are shielded, the interface image of the display interface is obtained;
The interface image is determined as to the masked images of the display interface.
5. the method as described in claim 1, which is characterized in that the display interface to the application shields, and obtains
The masked images of the display interface, comprising:
All areas in the display interface of the application are shielded, the interface image of the display interface is obtained;
Determine the open region in the interface image, the information in the open region is not privacy information;
The shielding to the open region is released, the masked images of the display interface are obtained.
6. method as claimed in claim 5, which is characterized in that the open region in the determination interface image, comprising:
When detecting the first choice instruction for the interface image, instruct selected region true the first choice
It is set to open region;Alternatively,
When detecting the second selection instruction for the interface image, specified region is determined as open region, the finger
Determining region is the region in the interface image in addition to the selected region of the second selection instruction.
7. method as described in claim 4 or 5, which is characterized in that all areas in the display interface to the application
Domain is shielded, and the interface image of the display interface is obtained, comprising:
By the specified image covering of all areas in the display interface, the interface image of the display interface is obtained;Alternatively,
All information for including in the display interface are replaced with designated character, obtain the interface image of the display interface.
8. a kind of remote control apparatus, which is characterized in that described device includes:
First judgment module, for during remotely being controlled by second terminal, for each application in first terminal, when
When detecting the enabled instruction for the application, start the application, and judges whether the application is privacy application;
First shroud module, for when the application for privacy in application, display after starting the application, to the application
Interface is shielded, and the masked images of the display interface are obtained, and the display interface of the application is after the application is activated
Shown interface;
First display module, for showing the masked images of the display interface;
Second judgment module, for for each application in the first terminal, after starting the application, when detecting needle
When to the idsplay orders of the function pages of the application, judge whether the function pages are the privacy page;
Secondary shielding module, for being shielded to the function pages, obtaining institute when the function pages are the privacy page
State the masked images of function pages;
Second display module, for showing the masked images of the function pages;
Wherein, whether second judgment module includes: second judgment unit, in the second privacy list for judging storage
The page iden-tity of the function pages is stored, the second privacy list is used to store the page iden-tity of the privacy page, and the 4th really
Order member, for determining the page function when having stored the page iden-tity of the function pages in the second privacy list
Face is the privacy page, and whether third judging unit is determining single comprising privacy information, the 5th in the function pages for judging
Member, for when in the function pages including privacy information, determining that the function pages are the privacy page.
9. device as claimed in claim 8, which is characterized in that the first judgment module includes:
First judging unit, for whether having stored the application identities of the application, institute in judging the first privacy list of storage
The first privacy list is stated for storing the application identities of privacy application;
First determination unit, described in determining when having stored the application identities of the application in the first privacy list
Using for privacy application.
10. device as claimed in claim 9, which is characterized in that described device further include:
Memory module, for being preset for the first of the application when detecting for each application in the first terminal
When instruction, the application identities of the application are stored into the first privacy list.
11. device as claimed in claim 8, which is characterized in that first shroud module includes:
Screen unit is shielded for all areas in the display interface to the application, obtains the display interface
Interface image;
Second determination unit, for the interface image to be determined as to the masked images of the display interface.
12. device as claimed in claim 8, which is characterized in that first shroud module includes:
The screen unit is shielded for all areas in the display interface to the application, obtains display circle
The interface image in face;
Third determination unit, for determining the open region in the interface image, the information in the open region is not hidden
Personal letter breath;
Lifting unit obtains the masked images of the display interface for releasing the shielding to the open region.
13. device as claimed in claim 12, which is characterized in that the third determination unit includes:
First determines subelement, for when detecting the first choice instruction for the interface image, described first to be selected
It selects the selected region of instruction and is determined as open region;Alternatively,
Second determines subelement, for when detecting the second selection instruction for the interface image, specified region is true
Be set to open region, the specified region be in the interface image in addition to the selected region of the second selection instruction
Region.
14. the device as described in claim 11 or 12, which is characterized in that the screen unit includes:
Subelement is covered, for obtaining the display interface for the specified image covering of all areas in the display interface
Interface image;Alternatively,
It replaces subelement and obtains the display for replacing all information for including in the display interface with designated character
The interface image at interface.
15. a kind of remote control apparatus, which is characterized in that described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
During remotely being controlled by second terminal, for each application in first terminal, answered when detecting for described
When enabled instruction, start the application, and judges whether the application is privacy application;
When the application be privacy in application, after starting the application, the display interface of the application is shielded, is obtained
The masked images of the display interface, the display interface of the application are that the application is activated rear shown interface;
Show the masked images of the display interface;
For each application in the first terminal, after starting the application, when detecting the function for the application
When the idsplay order of the page, the page iden-tity that the function pages whether have been stored in the second privacy list of storage, institute are judged
The second privacy list is stated for storing the page iden-tity of the privacy page, when having stored the page function in the second privacy list
When the page iden-tity in face, determine that the function pages are the privacy page, alternatively, whether judging in the function pages comprising privacy
Information determines that the function pages are the privacy page when in the function pages including privacy information;
When the function pages are the privacy page, the function pages are shielded, the shielding of the function pages is obtained
Image;
Show the masked images of the function pages.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610282464.5A CN105956486B (en) | 2016-04-29 | 2016-04-29 | Long-range control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610282464.5A CN105956486B (en) | 2016-04-29 | 2016-04-29 | Long-range control method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105956486A CN105956486A (en) | 2016-09-21 |
CN105956486B true CN105956486B (en) | 2019-03-08 |
Family
ID=56914371
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610282464.5A Active CN105956486B (en) | 2016-04-29 | 2016-04-29 | Long-range control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105956486B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778331A (en) * | 2016-11-29 | 2017-05-31 | 广东电网有限责任公司信息中心 | A kind of monitoring method of application program, apparatus and system |
CN107220538A (en) * | 2017-06-27 | 2017-09-29 | 广东欧珀移动通信有限公司 | Pay class application management method, device and mobile terminal |
CN107358111B (en) * | 2017-08-28 | 2019-11-22 | 维沃移动通信有限公司 | A kind of method for secret protection and mobile terminal |
CN107682538A (en) * | 2017-09-27 | 2018-02-09 | 北京小米移动软件有限公司 | The display methods and device of application interface |
CN109451141B (en) * | 2018-09-26 | 2021-06-04 | 维沃移动通信有限公司 | Operation control method and related terminal |
CN109918896A (en) * | 2019-01-30 | 2019-06-21 | 上海传英信息技术有限公司 | Application permission control method, secondary terminal and higher level's terminal |
CN111277807A (en) * | 2020-01-14 | 2020-06-12 | 广东小天才科技有限公司 | Projection implementation method, wearable device, display device and storage medium |
CN114286178B (en) * | 2021-12-31 | 2023-08-11 | 神思电子技术股份有限公司 | Privacy data protection method, device and medium based on remote control |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201203870Y (en) * | 2007-12-28 | 2009-03-04 | 北京帮助在线信息技术有限公司 | Apparatus for protecting on-line help transparent window privacy |
CN101470786A (en) * | 2007-12-28 | 2009-07-01 | 北京帮助在线信息技术有限公司 | Apparatus and method used for transparent window intimacy protection of on-line help |
CN101470787A (en) * | 2007-12-28 | 2009-07-01 | 北京帮助在线信息技术有限公司 | Apparatus and method used for transparent window intimacy protection of on-line help |
CN103077361A (en) * | 2012-12-28 | 2013-05-01 | 东莞宇龙通信科技有限公司 | Mobile terminal and anti-spy method thereof |
CN103237047A (en) * | 2013-03-11 | 2013-08-07 | 广东欧珀移动通信有限公司 | Remote controlled and control method |
CN104298484A (en) * | 2014-10-17 | 2015-01-21 | 深圳市中兴移动通信有限公司 | Multi-screen interaction method and device |
CN104318145A (en) * | 2014-09-26 | 2015-01-28 | 来安县新元机电设备设计有限公司 | Method and system for privacy protection |
CN104680090A (en) * | 2015-02-06 | 2015-06-03 | 西安酷派软件科技有限公司 | Application hiding control method, device and mobile terminal |
CN105069374A (en) * | 2015-08-06 | 2015-11-18 | 上海斐讯数据通信技术有限公司 | Private data intercepting protection method and system |
CN105095770A (en) * | 2014-04-18 | 2015-11-25 | 海信集团有限公司 | Method and device for multi-screen interaction of multimedia resource |
-
2016
- 2016-04-29 CN CN201610282464.5A patent/CN105956486B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201203870Y (en) * | 2007-12-28 | 2009-03-04 | 北京帮助在线信息技术有限公司 | Apparatus for protecting on-line help transparent window privacy |
CN101470786A (en) * | 2007-12-28 | 2009-07-01 | 北京帮助在线信息技术有限公司 | Apparatus and method used for transparent window intimacy protection of on-line help |
CN101470787A (en) * | 2007-12-28 | 2009-07-01 | 北京帮助在线信息技术有限公司 | Apparatus and method used for transparent window intimacy protection of on-line help |
CN103077361A (en) * | 2012-12-28 | 2013-05-01 | 东莞宇龙通信科技有限公司 | Mobile terminal and anti-spy method thereof |
CN103237047A (en) * | 2013-03-11 | 2013-08-07 | 广东欧珀移动通信有限公司 | Remote controlled and control method |
CN105095770A (en) * | 2014-04-18 | 2015-11-25 | 海信集团有限公司 | Method and device for multi-screen interaction of multimedia resource |
CN104318145A (en) * | 2014-09-26 | 2015-01-28 | 来安县新元机电设备设计有限公司 | Method and system for privacy protection |
CN104298484A (en) * | 2014-10-17 | 2015-01-21 | 深圳市中兴移动通信有限公司 | Multi-screen interaction method and device |
CN104680090A (en) * | 2015-02-06 | 2015-06-03 | 西安酷派软件科技有限公司 | Application hiding control method, device and mobile terminal |
CN105069374A (en) * | 2015-08-06 | 2015-11-18 | 上海斐讯数据通信技术有限公司 | Private data intercepting protection method and system |
Also Published As
Publication number | Publication date |
---|---|
CN105956486A (en) | 2016-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105956486B (en) | Long-range control method and device | |
CN105511686B (en) | Call processing method, device and terminal electronic device | |
CN104182313B (en) | Be delayed the method and apparatus taken pictures | |
CN105607834B (en) | Screen control method, device and terminal | |
CN106095220B (en) | Notification message reminding method and device | |
WO2017177595A1 (en) | Data migration method and device | |
CN107357505A (en) | The method, apparatus and computer-readable recording medium of screenshot capture | |
CN105516508A (en) | Method and device for activating virtual SIM card | |
CN104837154B (en) | The control method and device of wireless access points | |
CN104965732B (en) | Desktop starts method and device | |
CN105554255B (en) | Method of controlling operation thereof and device for terminal device | |
CN106528131A (en) | Application function display method and apparatus, and terminal device | |
CN109117229A (en) | Screen partition domain display methods and device | |
CN105426060B (en) | application control method and device | |
CN105426745B (en) | Information display method and device | |
CN105955684A (en) | Image display method and apparatus | |
CN109558229A (en) | Browser control method and device | |
CN106096442B (en) | Applications trigger method and device | |
CN106650569B (en) | Fingerprint input method and device | |
CN106101372B (en) | Using prompting setting method and device | |
CN105955635B (en) | Interface display method and device | |
CN106325621B (en) | Mobile terminal and touch-responsive method | |
CN107239236A (en) | Method for writing data and device | |
CN106775240A (en) | The triggering method of application program, device and terminal | |
CN106789554A (en) | The method and device of short message treatment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |