CN106055996B - Multimedia information sharing method and mobile terminal - Google Patents

Multimedia information sharing method and mobile terminal Download PDF

Info

Publication number
CN106055996B
CN106055996B CN201610332646.9A CN201610332646A CN106055996B CN 106055996 B CN106055996 B CN 106055996B CN 201610332646 A CN201610332646 A CN 201610332646A CN 106055996 B CN106055996 B CN 106055996B
Authority
CN
China
Prior art keywords
preset
user
shielding
private data
multimedia information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610332646.9A
Other languages
Chinese (zh)
Other versions
CN106055996A (en
Inventor
璧靛浆
赵彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610332646.9A priority Critical patent/CN106055996B/en
Publication of CN106055996A publication Critical patent/CN106055996A/en
Application granted granted Critical
Publication of CN106055996B publication Critical patent/CN106055996B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a multimedia information sharing method, which belongs to the technical field of mobile communication and comprises the following steps: receiving an instruction of sharing multimedia information by a user; detecting privacy data in the multimedia information; when the private data are detected, displaying a shielding operation interface of the private data, and shielding the private data according to the operation of a user on the shielding operation interface; and sharing the multimedia information after the private data is shielded. The invention also discloses a corresponding mobile terminal. The multimedia information sharing method solves the problems that multimedia information sharing efficiency is low and private data in the multimedia information cannot be comprehensively protected in the prior art. By automatically detecting the private data and providing a quick shielding interface, the multimedia information sharing efficiency is improved; the method is suitable for different types of multimedia information, and can comprehensively protect the privacy data in the multimedia information.

Description

Multimedia information sharing method and mobile terminal
Technical Field
The invention relates to the technical field of mobile communication, in particular to a multimedia information sharing method and a mobile terminal.
Background
With the popularization of social networks and intelligent terminals, more and more users share files such as pictures, documents, sound recordings and the like in the social networks. When the file sharing is carried out, the personal privacy of the user is also leaked inadvertently. In the prior art, in order to protect personal privacy data of a user, an option of editing a picture is generally provided when the picture is shared, and the picture may be subjected to a blurring process to protect the personal privacy of the user exposed in an image. However, in the privacy protection method for sharing pictures in the prior art, a user needs to manually trigger to enter a privacy protection function, and then manually browse the contents in the pictures to manually edit the pictures related to personal privacy one by one, which is complex in operation and causes low picture sharing efficiency. In addition, in the prior art, privacy protection can be performed only on the content of the picture to be shared, other privacy data carried by the picture cannot be comprehensively protected, and privacy protection cannot be performed on other types of multimedia information.
Therefore, the multimedia information sharing method in the prior art has the following defects: the user is required to manually participate in shielding the private data for many times, and the multimedia information sharing efficiency is low; the private data in the multimedia information cannot be fully protected.
Disclosure of Invention
The embodiment of the invention provides a multimedia information sharing method and a mobile terminal, and aims to solve the problems that multimedia information sharing efficiency is low and privacy data in multimedia information cannot be comprehensively protected in the prior art.
In a first aspect, an embodiment of the present invention provides a multimedia information sharing method, including: receiving an instruction of sharing multimedia information by a user; detecting privacy data in the multimedia information; when the private data are detected, displaying a shielding operation interface of the private data, and shielding the private data according to the operation of a user on the shielding operation interface; and sharing the multimedia information after the private data is shielded.
In a second aspect, an embodiment of the present invention further provides a mobile terminal, where the mobile terminal further includes:
the starting module is used for receiving an instruction of sharing the multimedia information by a user;
the privacy detection module is used for detecting privacy data in the multimedia information;
the privacy shielding module is used for displaying a shielding operation interface of the privacy data detected by the privacy detection module and shielding the privacy data according to the operation of a user on the shielding operation interface;
and the sharing module is used for sharing the multimedia information after the privacy data is shielded by the privacy shielding module.
In this way, in the embodiment of the invention, after receiving the instruction of sharing the multimedia information by the user, the privacy data in the multimedia information is automatically detected; when the private data are detected, displaying a shielding operation interface of the private data, and shielding the private data according to the operation of a user on the shielding operation interface; and finally, sharing the multimedia information after the private data is shielded, thereby solving the problems that the multimedia information sharing efficiency is low and the private data in the multimedia information can not be comprehensively protected. By automatically detecting the privacy data in the multimedia information and providing a quick shielding operation interface, the sharing efficiency of the multimedia information is improved; moreover, the method is suitable for different types of multimedia information, and can comprehensively protect the private data in the multimedia information.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a flowchart of a multimedia information sharing method according to a first embodiment of the present invention;
fig. 2 is a flowchart of a multimedia information sharing method according to a second embodiment of the present invention;
fig. 3 is a flowchart of a multimedia information sharing method according to a third embodiment of the present invention;
fig. 4 is a flowchart of a multimedia information sharing method according to a fourth embodiment of the present invention;
fig. 5 is a flowchart of a multimedia information sharing method according to a fifth embodiment of the present invention;
fig. 6 is one of the structural diagrams of a mobile terminal of the sixth embodiment of the present invention;
fig. 7 is a second block diagram of a mobile terminal according to a sixth embodiment of the present invention;
fig. 8 is a third structural diagram of a mobile terminal according to a sixth embodiment of the present invention;
fig. 9 is a fourth structural view of a mobile terminal according to a sixth embodiment of the present invention;
fig. 10 is a fifth structural view of a mobile terminal according to a sixth embodiment of the present invention;
fig. 11 is a sixth structural view of a mobile terminal according to a sixth embodiment of the present invention;
fig. 12 is a block diagram of a mobile terminal according to a seventh embodiment of the present invention;
fig. 13 is a block diagram of a mobile terminal according to an eighth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The first embodiment is as follows:
an embodiment of the present invention provides a multimedia information sharing method, as shown in fig. 1, the method includes steps 101 to 104.
Step 101, receiving an instruction of a user to share multimedia information.
In social software such as WeChat, QQ, or network-based sharing applications, there are often situations where a user shares multimedia information to other network users, and the multimedia information shared by the user includes: pictures, text, voice or video, etc. Usually, a user first selects a picture, a text, a sound recording or a video, and then clicks a menu or a button such as "share" or "share" to share the selected multimedia information to other users on the network through the server.
The method comprises the following steps that a mobile terminal receives an instruction of sharing multimedia information by a user, wherein the multimedia information carried by the instruction comprises: pictures, voice, text, etc. The instruction further comprises a user identifier of the sharer, a shared target address and the like. The embodiment of the invention does not limit the specific mode for receiving the instruction of the user for sharing the multimedia information, and the method in the prior art and other methods invented along with the development of science and technology can be adopted to receive the operation of the user for sharing the multimedia information.
Step 102, detecting privacy data in the multimedia information.
After an instruction of a user for sharing multimedia information is received, privacy data in the multimedia information to be shared are automatically detected according to a preset privacy protection strategy. In specific implementation, corresponding privacy protection strategies are preset for different multimedia information types. And when the privacy is detected, adopting a corresponding privacy protection strategy according to the type of the multimedia information to be shared.
And 103, when the private data are detected, displaying a shielding operation interface of the private data, and shielding the private data according to the operation of a user on the shielding operation interface.
According to a preset privacy protection strategy, after private data in multimedia information to be shared are detected, if the multimedia information is detected to contain the private data, a shielding operation interface of the detected private data is displayed, and a user is prompted to perform privacy shielding. The privacy data shielding operation interface is used for displaying the detected privacy data, displaying prompt information, editing multimedia information and the like.
And if the private data contained in the multimedia information is not detected, the multimedia file can be directly shared.
And if the multimedia information is detected to contain the privacy data, displaying a shielding operation interface of the detected privacy data, and prompting a user to perform privacy shielding. The user can also select to automatically shield the privacy through the shielding operation interface, or the user can manually shield the displayed privacy data.
The privacy data shielding operation interface is used for displaying the detected privacy data, prompting information, editing multimedia information and the like.
And step 104, sharing the multimedia information after the private data is shielded.
For the multimedia information with the privacy data shielded, the mobile terminal sends the multimedia information to a WeChat server or other network servers, and the server sends the multimedia information with the privacy data shielded to a target address or a user, such as a friend circle or a cloud.
According to the multimedia information sharing method, after an instruction of sharing multimedia information by a user is received, privacy data in the multimedia information are automatically detected; displaying a shielding operation interface of the private data, and shielding the private data according to the operation of a user on the shielding operation interface; and finally, sharing the multimedia information after the private data is shielded, and solving the problems that the multimedia information sharing efficiency is low and the private data in the multimedia information can not be comprehensively protected in the prior art. By automatically detecting the privacy data in the multimedia information and providing a quick shielding operation interface, the sharing efficiency of the multimedia information is improved; moreover, the method and the device are suitable for different types of multimedia information, and can comprehensively protect the privacy data in the multimedia information.
Example two:
referring to fig. 2, a second embodiment of the present invention provides a multimedia information sharing method, including steps 201 to 215.
Step 201, receiving an instruction of sharing a picture by a user.
Taking sharing multimedia information in WeChat application as an example, if a user selects a "share friend circle" option after selecting one or more pictures in an album of the mobile terminal, the mobile terminal will receive an instruction of the user to share pictures after the user clicks "send". The instructions include: the original picture to be shared also comprises a target address of the picture to be shared, a user identifier of a sharer and the like.
Step 202, detecting whether preset first type information is contained in the file parameters of the picture, and detecting whether preset second type information is contained in the picture content.
The preset first type information at least comprises: one or more of a shooting location, a shooting time, and a photographer name. The preset second type information at least comprises: one or more of an iris image, a fingerprint image, an identification card image, an account number image and a password image. After receiving an instruction of a user for sharing the picture, carrying out privacy data detection on the original picture to be shared. When the multimedia information to be shared is a picture, the detection of the privacy data of the picture comprises two aspects, namely file parameters of a picture file and picture content. The file parameters of the picture file include a plurality of fields: information fields of the picture such as shooting equipment, shooting place, shooting time, name of the photographer and equipment model. The picture content refers to information displayed by the picture.
In specific implementation, the detecting the privacy data in the multimedia information includes: and detecting whether preset first type information is contained in the file parameters of the picture, and detecting whether preset second type information is contained in the picture content.
For the file parameters, fields related to personal privacy data, which may need to be masked, are preset first, for example, the preset fields are: shooting time, shooting location, and photographer name. When the private data is detected, the preset field is detected in the file parameters of the picture, and if the preset field is detected to be assigned, the fact that the private data exists in the file parameters of the picture is confirmed.
For picture content, image categories that need to be masked and that may relate to private data are first preset, for example: fingerprint images, iris images, account number images, identification card images, and the like. Then, an identification model of the image of the type is established according to the image type to be detected, and then the picture content of the picture to be shared is identified by utilizing the pre-established identification model. In specific implementation, a large number of picture sample training template matching models or more complex 'magic' recognition models can be selected in advance. For example, a large number of fingerprint pictures are collected in advance to serve as training samples, the texture shapes, the texture quantity and the like of fingerprints are extracted to establish a fingerprint template matching model, when the picture to be shared needs to be detected to carry out privacy data, whether a fingerprint image exists in the picture to be shared is identified by using the pre-trained fingerprint template matching model, and if the identification is successful, the fact that the privacy data exists in the picture to be shared is confirmed. The iris image detection, the account number image detection and the identity card image detection can be performed in the same way or in other ways in the prior art, and the specific way of detecting the preset type image in the picture is not limited.
In specific implementation, after a preset image of the image type is identified by using a pre-established identification model, the identified image type and the area of the image type in the picture are recorded.
Step 203, determining whether the file parameters of the picture include preset first type information, if so, executing step 204, and if not, executing step 207.
And judging the detection result of the private data so as to display a shielding operation interface of the corresponding private data.
And 204, receiving an instruction of shielding the private data by a user when the file parameters of the picture contain preset first-class information.
After detecting a preset field in the file parameter of the picture and detecting a preset type image in the picture content, it may be detected that only the preset field in the exchangeable image file information contains privacy data, or only the privacy data of the preset image type is contained in the picture content, or both types of privacy data are detected. In specific implementation, as long as it is detected that the file parameters of the picture include the privacy data of the preset first-class information, whether the detected privacy information is masked or not is firstly prompted to the user, and a summary description of the detected privacy data, for example, a category, a number, a summary description, and the like of the privacy data, may also be displayed, and a privacy data list may also be displayed. In specific implementation, the user may be prompted by displaying a dialog box, a button, or the like to see whether to block the detected private data. In specific implementation, the instruction for shielding the private data of the user can be received by detecting the operation of the user on the prompt interface, and the instruction for shielding the private data, which is automatically sent by the mobile terminal according to the setting of the user, can also be detected.
Step 205, displaying a shielding operation interface marked with the detected preset first-type information.
In specific implementation, after receiving an instruction of shielding the private data by a user, displaying a shielding operation interface marked with the detected preset first-class information. The privacy data shielding operation interface displays a list of detected preset field privacy data, and provides a single-selection or multi-selection frame for a user to select and determine the privacy data of one or more fields to be deleted; a "one-click clear" button or a full select button may also be provided for the user to delete all detected private data of the preset field.
And step 206, deleting the preset first type of information selected by the user through the shielding operation interface.
In specific implementation, the step of blocking the private data according to the operation of the user on the blocking operation interface specifically includes: and when the privacy data comprises preset first-class information, namely the preset field, deleting the preset first-class information selected by the user through the shielding operation interface. Namely, if the user selects the preset field in the file parameter to be shielded through the selection interface, deleting the preset field in the file parameter selected by the user.
Step 207, determining whether the picture content includes preset second type information, if yes, performing step 208, and if not, performing step 211.
And judging the detection result of the private data so as to display a shielding operation interface of the corresponding private data.
And step 208, receiving an instruction of shielding the privacy data by the user when the picture content contains preset second-type information.
After detecting a preset field in the file parameter of the picture and detecting a preset type image in the picture content, it may be detected that only the preset field in the file parameter contains privacy data, or only the privacy data containing the preset image type in the picture content, or both types of privacy data. In specific implementation, when it is detected that the picture content includes the privacy data of the preset second type of information, the user is first prompted whether to mask the detected privacy information, and a summary description of the detected privacy data, for example, a category, a number, a summary description, and the like of the privacy data, may also be displayed, and a privacy data list may also be displayed. In specific implementation, the user may be prompted by displaying a dialog box, a button, or the like to see whether to block the detected private data. In specific implementation, the instruction for shielding the private data of the user can be received by detecting the operation of the user on the prompt interface, and the instruction for shielding the private data, which is automatically sent by the mobile terminal according to the setting of the user, can also be detected.
Step 209, displaying a shielding operation interface marked with the detected preset second type information.
And when the picture content contains preset second-type information, receiving an instruction of shielding the privacy data by a user, and displaying a shielding operation interface marked with the detected preset second-type information. And for the condition that the privacy data is preset second-class information, namely the preset image class, after receiving an instruction of a user for shielding the privacy data, displaying a shielding operation interface marked with the preset class image area. After the pre-set type image is identified by the pre-established identification model, the identified image type and the area of the image type in the picture are recorded. Displaying a shielding operation interface for displaying and editing a picture to be shared; meanwhile, the image area where the identified preset image category is located is highlighted on the picture in a highlight or flickering mode and the like.
Through the shielding operation interface, a user can manually select an image area needing shielding, or select and shield the image areas where all detected preset image categories are located through a 'one-key clearing' button or a full selection button arranged on the shielding operation interface.
And step 210, performing fuzzy processing on the area where the preset second type of information selected by the user through the shielding operation interface is located.
In specific implementation, the step of blocking the private data according to the operation of the user on the blocking operation interface specifically includes: and when the privacy data comprise preset second-class information, namely the preset image type, performing fuzzy processing on the area where the preset second-class information selected by the user through the shielding operation interface is located. For example: and carrying out fuzzy processing on the region where one or more preset type images are manually selected by the user on the shielding operation interface, or carrying out fuzzy processing on the regions where all the preset type images are selected by the user through a preset button. In specific implementation, the blurring process on the area where the image is located includes: and setting a semi-transparent or non-transparent layer on the upper layer of the area where the image is located, or performing mosaic processing on the area where the image is located, and the like.
In step 211, it is determined whether the private data is masked, if yes, step 212 is executed, and if not, step 213 is executed.
Detecting a preset field in the file parameter of the picture, detecting a preset type image in the picture content, possibly detecting privacy data, or not detecting the privacy data, and determining the shared picture according to the shielding operation result of the user on the privacy data during specific implementation.
And 212, sharing the picture after the private data is shielded.
For the pictures with the privacy data shielded, the mobile terminal sends the pictures to a WeChat server or other network servers, and the pictures with the privacy data shielded are sent to a target address such as a friend circle or a cloud end by the server.
In step 213, the original picture is shared.
If the privacy data are not detected, the privacy data do not need to be shielded, the mobile terminal sends the original picture to a WeChat server or other network servers, and the server sends the picture with the privacy data shielded to a target address, such as a friend circle or a cloud.
According to the method and the device, the corresponding privacy data shielding operation interface is displayed according to the detected type of the privacy data, and the privacy data are quickly shielded. Therefore, it is necessary to judge the type of the detected private data. In specific implementation, it may be determined that the file parameters of the picture include preset first type information, and then it may be determined whether the content of the picture includes preset second type information; or judging whether the picture content contains the preset second type information or not, and then judging whether the file parameter of the picture contains the preset first type information, wherein the sequence of judging the privacy data is not limited by the invention. Meanwhile, the detection result of the private data may only include the preset first type of information, may also only include the preset second type of information, and may also include both the preset first type of information and the preset second type of information.
According to the multimedia information sharing method, a picture sharing instruction of a user is received, a preset field is automatically detected in a file parameter of the picture, and a preset category image is detected in picture content; after the private data are detected, displaying a shielding operation interface of the detected private data according to an instruction of shielding the private data by a user; finally, according to the operation of the user, deleting the preset field selected by the user through the shielding operation interface, and/or blurring the preset image area selected by the user on the shielding operation interface; and sharing the picture after the private data is shielded, so that the problem of low multimedia information sharing efficiency caused by the fact that a user needs to manually participate in shielding the private data for many times in the prior art is solved. By automatically detecting the privacy data in the multimedia information and displaying the shielding operation interface of the detected privacy data after the privacy data is detected, the user can quickly shield the privacy data, and the multimedia information sharing efficiency is improved.
Compared with the prior art that privacy shielding can only be carried out on the content of the picture, privacy data in the shared multimedia information can be comprehensively protected by respectively carrying out privacy detection on the content of the picture and file parameters.
Optionally, as shown in fig. 2, the multimedia information sharing method further includes: step 214 and step 215.
Step 214: a request to view an original picture is received.
Other users on the internet can send applications for viewing the original pictures after viewing the pictures which are shared by the sharers and shielded from the private data, and the server generates requests for viewing the original pictures according to the applications for viewing the original pictures and the user identifications of the users who initiate the applications and sends the requests to the sharers.
Step 215, after the user confirms to share the original picture, the picture before the privacy data is shielded is shared.
After the user confirms to share the original multimedia information, the method for sharing the multimedia information before the privacy data is shielded comprises the following steps: and after the user confirms to share the original picture, sharing the picture before the privacy data is shielded. After receiving the request for viewing the original picture sent by the server, the mobile terminal of the sharer can display the request for viewing the original picture and prompt the user to confirm whether the user initiating the request is allowed to view the original picture. And if the sharer allows the user who initiates the request to view the original picture, sending the original picture before the privacy data is shielded to the server, and further sending the original picture to the requester by the server.
According to the multimedia information sharing method, the picture before the privacy data is shielded is shared according to the request for viewing the original picture initiated by other users, so that not only is the personal privacy prevented from being leaked at will, but also the credit user is ensured to browse the original picture, and the interest of picture sharing is increased.
Example three:
referring to fig. 3, an embodiment of the present invention provides a multimedia information sharing method, including steps 301 to 306.
Step 301, receiving a command of a user to share characters.
Still taking sharing multimedia information in wechat applications as an example, if a user selects a "share to a circle of friends" option after selecting a segment of text or a word document, the mobile terminal will receive a command of the user to share text after the user clicks "send". The instructions include: the original words to be shared also include the target address of the shared words (such as the circle of friends of the user), the user identification of the sharer, and the like.
Step 302, detecting a preset keyword in the text.
First, keywords related to personal privacy data that may need to be masked are preset, such as: name, address, telephone number, password, bank card, etc. When the private data is detected, matching the preset keywords in the characters to be shared, and if the matching is successful, confirming that the characters to be shared contain the private data. Detecting all private data in characters to be shared
Step 303, receiving an instruction of shielding the private data from the user.
In specific implementation, as long as the private data is detected, a prompt interface is displayed in a display dialog box, a button and the like to prompt a user whether to shield the detected private data. An index of the detected private data, for example, a preset keyword detected, the number of times the keyword appears, a summary description, or the like, may also be displayed, and a list of the private data may also be displayed. In specific implementation, the instruction for shielding the private data of the user can be received by detecting the operation of the user on the prompt interface, and the instruction for shielding the private data, which is automatically sent by the mobile terminal according to the setting of the user, can also be detected.
And 304, displaying the shielding operation interface marked with the preset keywords.
And after receiving an instruction of a user for shielding the private data, displaying a shielding operation interface marked with the preset keywords. Displaying a shielding operation interface for displaying and editing characters to be shared; meanwhile, the detected preset keywords are highlighted on the shielding operation interface in the modes of highlighting, underlining, bolding and the like. The shielding operation interface can be provided with buttons such as single selection, multiple selection, full selection or one-key clearing. Through the shielding operation interface, a user can manually select the characters to be shielded, or select and shield all the detected preset characters through a 'one-key clearing' button or a full selection button arranged on the shielding operation interface. By masking the operation interface, the user can also input characters for replacing the detected keywords.
And 305, replacing the preset keywords selected by the user through the shielding operation interface with preset characters or characters input by the user.
The step of shielding the private data according to the operation of the user on the shielding operation interface comprises the following steps: and replacing the preset keywords selected by the user through the shielding operation interface with preset characters or characters input by the user.
In specific implementation, the preset character may be "a", "or"? And the symbols are equal, and the preset keywords selected by the user through the text editing interface are replaced by preset characters, such as replacing passwords by "". The user can also select the characters needing to be shielded through the text editing interface, and the characters for replacing the characters needing to be shielded are input through the text editing interface, so that the preset keywords selected by the user through the text editing interface are replaced by the characters input by the user.
And step 306, sharing the words after the private data is shielded.
For the words with the privacy data shielded, the mobile terminal sends the words to the WeChat server or other network servers, and the words with the privacy data shielded are sent to a target address such as a friend circle or a cloud end by the server.
According to the multimedia information sharing method, a command of a user for sharing characters is received, preset keywords are detected in the characters, and a shielding operation interface marked with the preset keywords is displayed according to the received command of the user for shielding the privacy data; the method and the device have the advantages that the preset keywords selected by the user through the shielding operation interface are replaced by the preset characters or characters input by the user, and the characters after the privacy data are shielded are shared, so that the problems that in the prior art, only privacy protection can be performed on picture contents, and the privacy data in the multimedia information cannot be comprehensively protected are solved, and various types of multimedia information to be shared can be comprehensively protected. Moreover, privacy detection is automatically started, and the detection efficiency is high.
Optionally, as shown in fig. 3, the multimedia information sharing method further includes: step 307 and step 308.
Step 307: a request to view the original text is received.
Other users on the internet can send applications for viewing original text information after viewing the text shared by the sharer, and the server generates requests for viewing the original text information according to the applications for viewing the original text information and the user identification of the user initiating the applications, and sends the requests to the sharer.
And 308, sharing the characters before the privacy data is shielded after the user confirms to share the original characters.
After the user confirms to share the original multimedia information, the method for sharing the multimedia information before the privacy data is shielded comprises the following steps: and after the user confirms to share the original characters, sharing the characters before the privacy data is shielded. After receiving the request for viewing the original characters sent by the server, the mobile terminal of the sharer can display the request for viewing the original characters and prompt the user to confirm whether the user initiating the request is allowed to view the original characters. And if the sharer allows the user who initiates the request to view the original characters, sending the original characters before the privacy data is shielded to the server, and further sending the original characters to the requester by the server.
According to the multimedia information sharing method, a command of a user for sharing characters is received, preset keywords are detected in the characters, and a shielding operation interface marked with the preset keywords is displayed according to the received command of the user for shielding the privacy data; the method and the device have the advantages that the preset keywords selected by the user through the shielding operation interface are replaced by the preset characters or characters input by the user, and the characters after the privacy data are shielded are shared, so that the problems that in the prior art, only privacy protection can be performed on picture contents, and the privacy data in the multimedia information cannot be comprehensively protected are solved, and various types of multimedia information to be shared can be comprehensively protected. Moreover, privacy detection is automatically started, and the detection efficiency is high. The characters before the privacy data are shielded are shared according to the requests for checking the original characters initiated by other users, so that not only is the personal privacy prevented from being leaked at will, but also the credit user is ensured to browse the original characters, and the interest of character information sharing is increased.
Example four:
referring to fig. 4, an embodiment of the present invention provides a multimedia information sharing method, including steps 401 to 406.
Step 401, receiving a voice sharing instruction of a user.
Still taking sharing multimedia information in wechat applications as an example, if the user selects a section of voice or selects a "share friend circle" option after recording a section of voice, the mobile terminal will receive a voice sharing instruction from the user after the user clicks "send". The instructions include: the original voice to be shared also includes a target address of the voice to be shared (such as a friend circle of the user), a user identifier of the sharer, and the like.
Step 402, converting the voice into characters, and detecting preset keywords in the converted characters.
When the private data detection is performed on the voice, the voice is firstly converted into characters. The voice can be converted into the text by adopting the voice recognition technology in the prior art, and the details are not repeated herein. Then, the private data is detected in the converted text. When the method is specifically implemented, firstly, keywords related to the private data are preset, wherein the preset keywords comprise: name, address, identification card, account number, password, etc. When the voice is subjected to the privacy data detection, the voice is converted into characters, then preset keywords are matched in the converted characters, and if the matching is successful, the fact that the privacy data exist in the voice is confirmed.
Step 403, receiving an instruction of shielding the private data from the user.
And after the privacy data are detected, displaying a prompt interface for shielding the privacy data for a user to confirm whether the detected privacy information is shielded or not. The index of the private data associated with the detected preset keyword may also be displayed, including: the type (e.g., a preset keyword associated with the private data), the amount, etc. of the private data.
And step 404, displaying a shielding operation interface which identifies the voice time interval in which the private data is located.
And the voice time interval in which the private data is located is the detected voice time interval corresponding to the preset keyword. And after the user confirms that the detected privacy information is shielded, further displaying a shielding operation interface which marks the voice time interval in which the privacy data is positioned. When the voice is converted into the characters, the starting time and the ending time corresponding to each segment of characters can be obtained at the same time, and the starting time and the ending time in the voice corresponding to the detected preset keywords can be determined through further calculation. In this embodiment, when the masking operation interface is displayed, the detected preset keyword and the voice segment corresponding to the keyword are displayed in a list form, and buttons such as single selection, multiple selection, full selection and the like are provided for the user to select the voice period to be masked, and the voice period is replaced by the preset sound. During specific implementation, the shielding operation interface can also provide a recording button for the user to record again, so that the voice time interval needing to shield the privacy information can be replaced.
And step 405, replacing the voice time interval selected by the user through the shielding operation interface with preset voice or voice recorded by the user.
In specific implementation, the step of shielding the private data according to the editing operation of the user comprises the following steps: and replacing the voice time interval selected by the user through the shielding operation interface with preset voice or voice recorded by the user. For example, after the user selects to mask all speech segments containing private data, the selected speech segment is replaced with a "beep" tone. Or collecting the voice input by the user through the shielding operation interface, and replacing the selected voice time period with the voice input by the user.
And 406, sharing the voice after the privacy data is shielded.
The sharing of the multimedia information after the privacy data shielding further comprises: and sharing the voice after the privacy data are shielded. For the voice with the privacy data shielded, the mobile terminal sends the voice to a WeChat server or other network servers, and the server sends the voice with the privacy data shielded to a target address, such as a friend circle or a cloud.
According to the multimedia information sharing method, after an instruction of a user for sharing the voice information is received, the voice is automatically converted into the characters, preset keywords are detected in the converted characters, after the instruction of the user for shielding the privacy data is received, a shielding operation interface which marks the voice time interval where the privacy data is located is displayed, the privacy data is shielded according to the editing operation of the user, and the voice after the privacy data is shielded is shared. Moreover, privacy detection is automatically started, and the detection efficiency is high.
Optionally, as shown in fig. 4, the multimedia information sharing method further includes: step 407 and step 408.
Step 407: a request to listen to original speech is received.
Other users on the internet can send out an application for listening to the original voice after listening to the voice shared by the sharer, and the server generates a request for listening to the original voice information according to the application for listening to the original voice information and the user identification of the user who initiates the application, and sends the request to the sharer.
And step 408, after the user confirms to share the original voice, sharing the voice before the privacy data is shielded.
After the user confirms to share the original multimedia information, the method for sharing the multimedia information before the privacy data is shielded comprises the following steps: and after the user confirms to share the original voice, sharing the voice before the privacy data is shielded. After receiving the request for listening to the original voice sent by the server, the mobile terminal of the sharer can display the request for listening to the original voice and prompt the user to confirm whether the user initiating the request is allowed to listen to the original voice. And if the sharer allows the user initiating the request to listen to the original voice, sending the original voice before the privacy data is shielded to the server, and further sending the original voice to the requester by the server.
According to the multimedia information sharing method, after an instruction of a user for sharing the voice information is received, the voice is automatically converted into the characters, preset keywords are detected in the converted characters, after the instruction of the user for shielding the privacy data is received, a shielding operation interface which marks the voice time interval where the privacy data is located is displayed, the privacy data is shielded according to the editing operation of the user, and the voice after the privacy data is shielded is shared. Moreover, privacy detection is automatically started, and the detection efficiency is high. The voice before the privacy data is shielded is shared according to the request of listening to the original voice initiated by other users, so that not only is the personal privacy prevented from being leaked at will, but also the credit user is ensured to browse the original characters, and the interest of character information sharing is increased.
Example five:
an embodiment of the present invention provides a multimedia information sharing method, as shown in fig. 5, the method includes steps 501 to 505.
Step 501, receiving an instruction of sharing multimedia information by a user.
The method for receiving the instruction of sharing the multimedia information by the user refers to the relevant steps of the first embodiment, which are not described herein again.
The mobile terminal receives an instruction of a user for sharing multimedia information, wherein the multimedia information carried by the instruction comprises multiple types, such as: pictures, voice, text, etc.
Step 502, detecting privacy data in the multimedia information.
After an instruction of a user for sharing multimedia information is received, privacy data in the multimedia information to be shared are automatically detected according to a preset privacy protection strategy. In specific implementation, corresponding privacy protection strategies are preset for different multimedia information types. And when the privacy is detected, adopting a corresponding privacy protection strategy according to the type of the multimedia information to be shared. For different types of multimedia information, the specific method for detecting the private data in the multimedia information refers to embodiment two, embodiment three, and embodiment four, which are not described herein again.
In particular, the types of the detected private data include: the method includes the steps of presetting first-class information, presetting second-class information, presetting keywords and the like of the picture.
Step 503, when the private data is detected, receiving an instruction of shielding the private data by a user.
According to a preset privacy protection strategy, after private data in multimedia information to be shared are detected, if the multimedia information is detected to contain the private data, a user is prompted to confirm whether to shield the private information, the type, summary information and the like of the detected private data can be displayed, and an instruction of shielding the private data by the user is received by detecting the confirmation operation of the user on the prompt information. Or receiving an instruction of automatically sending the privacy data shielding data according to the preset setting of the user by the mobile terminal.
For example, after the user and the current mobile terminal set the detected meaning data, the mobile terminal automatically masks, and when the privacy data is detected, the mobile terminal automatically sends an instruction for masking the privacy data.
And step 504, adopting a preset operation matched with the type of the private data to shield the private data.
And after receiving an instruction of shielding the private data by a user, shielding the private data by adopting a preset operation matched with the type of the private data. The preset operation matched with the type of the private data comprises the following steps: deleting the preset first type of information, blurring the area where the preset second type of information is located, replacing the preset keywords with preset characters, and replacing one or more items in the voice time period containing the preset keywords with preset voice.
And if the private data contained in the multimedia information is not detected, the multimedia file can be directly shared.
When the method is specifically implemented, a user presets the type of the multimedia information, the type of the private data corresponding to each type of the multimedia information and the preset operation corresponding to each type of the private data, and after an instruction for shielding the private data is received, the private data is shielded by adopting the preset operation matched with the detected type of the private data. For example, when the picture content of the picture multimedia information is detected to contain the preset second type information, the area where the preset second type information is located is subjected to fuzzy processing; deleting the preset first type of information when detecting that the file parameter content of the picture multimedia information contains the preset first type of information; when detecting that the character multimedia information contains the preset keywords, replacing the preset keywords with the preset characters; when the voice multimedia information is detected to contain the preset keywords after being converted into the characters, the preset voice is used for replacing the voice time interval containing the preset keywords.
And 505, sharing the multimedia information with the privacy data shielded.
For the multimedia information with the privacy data shielded, the mobile terminal sends the multimedia information to a WeChat server or other network servers, and the server sends the multimedia information with the privacy data shielded to a target address or a user, such as a friend circle or a cloud.
According to the multimedia information sharing method, after an instruction of sharing multimedia information by a user is received, privacy data in the multimedia information are automatically detected; when the private data are detected, receiving an instruction of shielding the private data by a user; adopting a preset operation matched with the type of the private data to shield the private data; and finally, sharing the multimedia information after the private data is shielded, and solving the problems that the multimedia information sharing efficiency is low and the private data in the multimedia information can not be comprehensively protected in the prior art. The sharing efficiency of the multimedia information is improved by automatically detecting the privacy data in the multimedia information and automatically shielding the privacy data; the method and the device are suitable for different types of multimedia information, and the private data in the multimedia information can be comprehensively protected by shielding the private data through the preset operation matched with different types of the private data in the different types of multimedia information.
Example six:
referring to fig. 6, an embodiment of the present invention provides a mobile terminal, where the mobile terminal 60 includes: an initiation module 610, a privacy detection module 620, a privacy masking module 630, and a sharing module 640.
The starting module 610 is configured to receive an instruction of sharing multimedia information by a user.
In social software such as WeChat, QQ, or network-based sharing applications, there are often situations where a user shares multimedia information to other network users, and the multimedia information shared by the user includes: pictures, text, voice or video, etc. Usually, a user first selects a picture, a text, a sound recording or a video, and then clicks a menu or a button such as "share" or "share" to share the selected multimedia information to other users on the network through the server.
The method comprises the following steps that a mobile terminal receives an instruction of sharing multimedia information by a user, wherein the multimedia information carried by the instruction comprises: pictures, voice, text, etc. The instruction further comprises a user identifier of the sharer, a shared target address and the like. The embodiment of the invention does not limit the specific mode for receiving the instruction of the user for sharing the multimedia information, and the method in the prior art and other methods invented along with the development of science and technology can be adopted to receive the operation of the user for sharing the multimedia information.
The privacy detecting module 620 is configured to detect privacy data in the multimedia information received by the starting module 610.
After an instruction of a user for sharing multimedia information is received, privacy data in the multimedia information to be shared are automatically detected according to a preset privacy protection strategy. In specific implementation, corresponding privacy protection strategies are preset for different multimedia information types. During privacy detection, according to the type of the multimedia information to be shared, a corresponding privacy protection strategy is adopted to detect privacy data in the multimedia information carried by the instruction received by the starting module 610.
The privacy shielding module 630 is configured to, when the privacy data is detected, display a shielding operation interface of the privacy data detected by the privacy detection module 620, and shield the privacy data according to an operation of a user on the shielding operation interface.
According to a preset privacy protection strategy, after the privacy data in the multimedia information to be shared are detected, if the privacy data are detected to be contained in the multimedia information by the privacy detection module 620, a shielding operation interface of the detected privacy data is displayed, and a user is prompted to perform privacy shielding. The privacy data shielding operation interface is used for displaying the detected privacy data, prompt information, multimedia information editing and the like.
If the privacy detection module 620 does not detect that the multimedia information contains the privacy data, the multimedia file can be directly shared.
If the privacy detection module 620 detects that the multimedia information contains the privacy data, a shielding operation interface of the detected privacy data is displayed, and a user is prompted to perform privacy shielding. The user can select to automatically shield the privacy through the shielding operation interface, or the user can manually shield the displayed privacy data. The privacy data shielding operation interface is used for displaying the detected privacy data, prompt information, multimedia information editing and the like.
The sharing module 640 is configured to share the multimedia information after the privacy data is shielded by the privacy shielding module 630.
For the multimedia information with the privacy data shielded, the mobile terminal sends the multimedia information to a WeChat server or other network servers, and the server sends the multimedia information with the privacy data shielded to a target address or a user, such as a friend circle or a cloud.
According to the mobile terminal provided by the embodiment of the invention, after an instruction of sharing multimedia information by a user is received, privacy data in the multimedia information is automatically detected; when the private data are detected, receiving an instruction of shielding the private data by a user, displaying a shielding operation interface of the private data, and shielding the private data according to the operation of the user on the shielding operation interface; and finally, sharing the multimedia information after the private data is shielded, thereby solving the problems that the multimedia information sharing efficiency is low and the private data in the multimedia information can not be comprehensively protected. By automatically detecting the privacy data in the multimedia information and providing a quick shielding interface, the sharing efficiency of the multimedia information is improved; moreover, the method is suitable for different types of multimedia information, and can comprehensively protect the private data in the multimedia information.
Referring to fig. 7, optionally, when the multimedia information is a picture, the privacy detection module 620 includes:
a first detecting unit 6201, configured to detect whether the file parameters of the picture include preset first type information, and detect whether the content of the picture includes preset second type information.
The preset first type information at least comprises: one or more of a shooting location, a shooting time, and a photographer name. The preset second type information at least comprises: one or more of an iris image, a fingerprint image, an identification card image, an account number image and a password image.
Accordingly, as shown in fig. 7, the privacy-mask module 630 includes:
a first instruction obtaining unit 6301, configured to receive an instruction for shielding the private data by a user when a file parameter of the picture includes preset first-type information.
The first display unit 6302 is configured to display a shielding operation interface identified with the preset keyword.
The first shielding unit 6303 is configured to delete the preset first type of information selected by the user through the shielding operation interface.
Optionally, as shown in fig. 7, the privacy-mask module 630 includes:
a second instruction obtaining unit 6304, configured to receive an instruction for shielding the private data by the user when the picture content includes preset second type information.
The second display unit 6305 is configured to display a shielding operation interface marked with the detected preset second type of information.
The second shielding unit 6306 is configured to perform fuzzy processing on an area where the preset second type of information selected by the user through the shielding operation interface is located.
According to the mobile terminal provided by the embodiment of the invention, by receiving an instruction of a user for sharing a picture, a preset field is automatically detected in a file parameter of the picture, and a preset category image is detected in the content of the picture; after the private data are detected, displaying a shielding operation interface of the detected private data according to an instruction of shielding the private data by a user; finally, according to the operation of the user, deleting the preset field selected by the user through the shielding operation interface, and/or blurring the preset image area selected by the user on the shielding operation interface; and sharing the picture after the private data is shielded, so that the problem of low multimedia information sharing efficiency caused by the fact that a user needs to manually participate in shielding the private data for many times in the prior art is solved. By automatically detecting the privacy data in the multimedia information and displaying the shielding operation interface of the detected privacy data after the privacy data is detected, the user can quickly shield the privacy data, and the multimedia information sharing efficiency is improved.
Compared with the prior art that privacy shielding can only be carried out on the content of the picture, privacy data in the shared multimedia information can be comprehensively protected by respectively carrying out privacy detection on the content of the picture and file parameters.
Optionally, as shown in fig. 8, when the multimedia information is a text, the privacy detecting module 630 further includes:
a second detecting unit 6202, configured to detect a preset keyword in the text.
Accordingly, the privacy masking module 630 further comprises:
a third instruction obtaining unit 6307, configured to receive an instruction of masking the private data by a user.
And a third display unit 6308, configured to display a shielding operation interface identified with the preset keyword.
The third shielding unit 6309 is configured to replace the preset keyword selected by the user through the shielding operation interface with a preset character or a character input by the user.
According to the mobile terminal provided by the embodiment of the invention, a command of a user for sharing characters is received, then a preset keyword is detected in the characters, and a shielding operation interface marked with the preset keyword is displayed according to the received command of the user for shielding the privacy data; the method and the device have the advantages that the preset keywords selected by the user through the shielding operation interface are replaced by the preset characters or characters input by the user, and the characters after the privacy data are shielded are shared, so that the problems that in the prior art, only privacy protection can be performed on picture contents, and the privacy data in the multimedia information cannot be comprehensively protected are solved, and various types of multimedia information to be shared can be comprehensively protected. Moreover, privacy detection is automatically started, and the detection efficiency is high.
Optionally, as shown in fig. 9, when the multimedia information is a voice, the privacy detecting module 620 further includes:
a third detecting unit 6203, configured to convert the voice into a text, and detect a preset keyword in the converted text.
Accordingly, the privacy masking module 630 further comprises:
a fourth instruction obtaining unit 6310, configured to receive an instruction of masking the private data by a user.
The fourth display unit 6311 is configured to display a masking operation interface indicating a voice period in which the private data is located, where the voice period in which the private data is located is the detected voice corresponding to the preset keyword.
The fourth shielding unit 6312 is configured to replace the voice period selected by the user through the shielding operation interface with a preset voice or a voice recorded by the user.
According to the mobile terminal provided by the embodiment of the invention, after an instruction of sharing voice information by a user is received, the voice is automatically converted into characters, preset keywords are detected in the converted characters, after the instruction of shielding the privacy data by the user is received, a shielding operation interface identifying the voice time interval in which the privacy data is located is displayed, the privacy data is shielded according to the editing operation of the user, and the voice after shielding the privacy data is shared, so that the problem that only privacy protection can be performed on picture content in the prior art, and the privacy data in multimedia information cannot be comprehensively protected is solved, and various types of multimedia information to be shared can be comprehensively protected. Moreover, privacy detection is automatically started, and the detection efficiency is high.
Optionally, as shown in fig. 10, the privacy masking module 630 further includes:
a fifth instruction obtaining unit 6313, configured to receive an instruction of shielding the private data by a user.
A fifth masking unit 6314, configured to mask the private data by using a preset operation matching the type of the private data.
The preset operation matched with the type of the private data comprises the following steps: deleting the preset first type of information, blurring the area where the preset second type of information is located, replacing the preset keywords with preset characters, and replacing one or more items in the voice time period containing the preset keywords with preset voice.
According to the mobile terminal provided by the embodiment of the invention, after an instruction of sharing multimedia information by a user is received, privacy data in the multimedia information is automatically detected; when the private data are detected, receiving an instruction of shielding the private data by a user; adopting a preset operation matched with the type of the private data to shield the private data; and finally, sharing the multimedia information after the private data is shielded, and solving the problems that the multimedia information sharing efficiency is low and the private data in the multimedia information can not be comprehensively protected in the prior art. The sharing efficiency of the multimedia information is improved by automatically detecting the privacy data in the multimedia information and automatically shielding the privacy data; the method and the device are suitable for different types of multimedia information, and the private data in the multimedia information can be comprehensively protected by shielding the private data through the preset operation matched with different types of the private data in the different types of multimedia information.
In a specific implementation, the privacy detection module 620 may only include: one of the first detecting unit 6201, the second detecting unit 6202, and the third detecting unit 6203 may also include a plurality of units; correspondingly, the privacy mask module 630 may also include: one or more groups of the first, second, third, fourth and fifth instruction acquisition units, and corresponding display units and shielding units.
Optionally, as shown in fig. 11, the mobile terminal 60 further includes:
a request receiving module 650 for receiving a request to view the original multimedia information.
The original information sharing module 660 is configured to share the multimedia information before the privacy data is shielded after the user confirms to share the original multimedia information.
According to the mobile terminal provided by the embodiment of the invention, after an instruction of sharing multimedia information by a user is received, privacy data in the multimedia information is automatically detected; when the private data are detected, receiving an instruction of shielding the private data by a user, displaying a shielding operation interface of the private data, and shielding the private data according to the operation of the user on the shielding operation interface; and finally, sharing the multimedia information after the private data is shielded, thereby solving the problems that the multimedia information sharing efficiency is low and the private data in the multimedia information can not be comprehensively protected. By automatically detecting the privacy data in the multimedia information and providing a quick shielding interface, the sharing efficiency of the multimedia information is improved; moreover, the method is suitable for different types of multimedia information, and can comprehensively protect the private data in the multimedia information. According to the method, the multimedia information before the privacy data is shielded is shared according to the requests for viewing the original multimedia information initiated by other users, so that not only is the personal privacy prevented from being leaked at will, but also the credit granting user is ensured to browse the original multimedia information, and the interest of multimedia information sharing is increased.
Example seven:
fig. 12 is a block diagram of a mobile terminal according to another embodiment of the present invention. The mobile terminal 1200 shown in fig. 12 includes: at least one processor 1201, memory 1202, at least one network interface 1204, and a user interface 1203. Various components in mobile terminal 1200 are coupled together by bus system 1205. It is understood that bus system 1205 is used to enable connected communication between these components. Bus system 1205 includes, in addition to a data bus, a power bus, a control bus, and a status signal bus. But for clarity of illustration the various buses are labeled as bus system 1205 in figure 12.
The user interface 1203 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball, touch pad, touch screen, or touch pad, among others.
It is to be understood that the memory 1202 in embodiments of the present invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a Read-only memory (ROM), a programmable Read-only memory (PROM), an erasable programmable Read-only memory (erasabprom, EPROM), an electrically erasable programmable Read-only memory (EEPROM), or a flash memory. The volatile memory may be a Random Access Memory (RAM) which functions as an external cache. By way of example, but not limitation, many forms of RAM are available, such as static random access memory (staticiram, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (syncronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (DDRSDRAM ), Enhanced Synchronous DRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and direct memory bus RAM (DRRAM). The memory 1202 of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 1202 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 12021 and application programs 12022.
The operating system 12021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application 12022 contains various applications such as a media player (MediaPlayer), a Browser (Browser), an input method, and the like, and is used to implement various application services. A program implementing a method according to an embodiment of the present invention may be included in the application 12022.
In the embodiment of the present invention, the program or the instruction stored in the memory 1202 may be called, specifically, a program or an instruction stored in the application program 12022. An operation of the user using the application program, for example, a touch gesture of setting a designated area image by the user is detected through the touch screen in the user interface 1203. The processor 1201 is configured to receive an instruction of a user to share multimedia information; detecting privacy data in the multimedia information; when the private data are detected, displaying a shielding operation interface of the private data, and shielding the private data according to the operation of a user on the shielding operation interface; and sharing the multimedia information after the private data is shielded.
The method disclosed by the embodiment of the invention can be applied to the processor 1201 or implemented by the processor 1201. The processor 1201 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor 1201. The processor 1201 may be a general-purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 1202, and the processor 1201 reads the number of times of use of the application program by the user in the memory 1202, and completes the steps of the method in combination with the hardware thereof.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Optionally, the processor 1201 is configured to: and when the multimedia information is a picture, detecting whether preset first-class information is contained in the file parameters of the picture, and detecting whether preset second-class information is contained in the content of the picture.
Further, the processor 1201 is configured to: when the file parameters of the pictures contain preset first-class information, receiving an instruction of shielding the private data by a user; displaying a shielding operation interface marked with the detected preset first-class information; and deleting the preset first type of information selected by the user through the shielding operation interface.
Further, the processor 1201 is configured to: when the picture content contains preset second-type information, receiving an instruction of shielding the privacy data by a user; displaying a shielding operation interface marked with the detected preset second type information; and carrying out fuzzy processing on the area where the preset second type of information selected by the user through the shielding operation interface is located.
Optionally, the processor 1201 is configured to: and when the multimedia information is a character, detecting a preset keyword in the character.
Further, the processor 1201 is configured to: receiving an instruction of shielding the private data by a user; displaying a shielding operation interface marked with the preset keywords; and replacing the preset keywords selected by the user through the shielding operation interface with preset characters or characters input by the user.
Optionally, the processor 1201 is configured to: and when the multimedia information is voice, converting the voice into characters, and detecting preset keywords in the characters obtained by conversion.
Further, the processor 1201 is configured to: receiving an instruction of shielding the private data by a user; displaying a shielding operation interface marked with a voice time period in which the private data is located, wherein the voice time period in which the private data is located comprises detected voice corresponding to the preset keyword; and replacing the voice time interval selected by the user through the shielding operation interface with preset voice or voice recorded by the user.
Optionally, the processor 1201 is configured to: receiving an instruction of shielding the private data by a user; and shielding the private data by adopting a preset operation matched with the type of the private data.
The preset operation matched with the type of the private data comprises the following steps: deleting the preset first type of information, blurring the area where the preset second type of information is located, replacing the preset keywords with preset characters, and replacing one or more items in the voice time period containing the preset keywords with preset voice.
Optionally, the processor 1201 is configured to: receiving a request for viewing original multimedia information; and after the user confirms to share the original multimedia information, sharing the multimedia information before the privacy data is shielded.
The preset first type information at least comprises: one or more of a shooting location, a shooting time, and a photographer name.
The preset second type information at least comprises: one or more of an iris image, a fingerprint image, an identification card image, an account number image and a password image.
The mobile terminal 1200 can implement the processes implemented by the mobile terminal in the foregoing embodiments, and details are not repeated here to avoid repetition.
According to the mobile terminal 1200 of the embodiment of the invention, through the modules, the private data in the multimedia information is automatically detected, and a quick shielding interface is provided, so that the sharing efficiency of the multimedia information is improved; moreover, the mobile terminal is suitable for different types of multimedia information, and can comprehensively protect the privacy data in the multimedia information.
Example eight:
fig. 13 is a schematic structural diagram of a mobile terminal according to another embodiment of the present invention. Specifically, the mobile terminal in fig. 13 may be a smart phone, a tablet computer, a Personal Digital Assistant (PDA), or a vehicle-mounted computer.
The mobile terminal in fig. 13 includes a Radio Frequency (RF) circuit 1310, a memory 1320, an input unit 1330, a display unit 1340, a processor 1360, a photographing component, an audio circuit 1370, a wifi (wireless fidelity) module 1380, and a power supply 1390.
The input unit 1330 may be used to receive numeric or character information input by a user and generate signal inputs related to user settings and function control of the mobile terminal, among others. Specifically, in the embodiment of the present invention, the input unit 1330 may include a touch panel 1331. Touch panel 1331, also referred to as a touch screen, can collect touch operations by a user (e.g., operations performed by the user on touch panel 1331 using a finger, a stylus, or any other suitable object or accessory) and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 1331 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 1360, and receives and executes commands sent from the processor 1360. In addition, the touch panel 1331 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to touch panel 1331, input unit 1330 may include other input devices 1332, where other input devices 1332 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
Among other things, the display unit 1340 may be used to display information input by a user or information provided to the user and various menu interfaces of the mobile terminal 1300. The display unit 1340 may include a display panel 1341, and optionally, the display panel 1341 may be configured in the form of an LCD or an organic light-emitting diode (OLED), or the like.
It should be noted that touch panel 1331 may overlay display panel 1341 to form a touch display screen, and when the touch display screen detects a touch operation thereon or nearby, the touch display screen is transmitted to processor 1360 to determine the type of touch event, and then processor 1360 provides corresponding visual output on the touch display screen according to the type of touch event.
The touch display screen comprises an application program interface display area and a common control display area. The arrangement modes of the application program interface display area and the common control display area are not limited, and can be an arrangement mode which can distinguish two display areas, such as vertical arrangement, left-right arrangement and the like. The application interface display area may be used to display an interface of an application. Each interface may contain at least one interface element such as an icon and/or widget desktop control for an application. The application interface display area may also be an empty interface that does not contain any content. The common control display area is used for displaying controls with high utilization rate, such as application icons like setting buttons, interface numbers, scroll bars, phone book icons and the like.
The processor 1360 is a control center of the mobile terminal 1300, connects various parts of the entire smartphone by using various interfaces and lines, and performs various functions of the mobile terminal 1300 and processes data by running or executing software programs and/or modules stored in the first memory 1321 and calling data stored in the second memory 1322, thereby integrally monitoring the mobile terminal 1300. Optionally, processor 1360 may include one or more processing units.
In an embodiment of the present invention, the processor 1360 is configured to receive a command from a user to share multimedia information by calling a software program and/or a module stored in the first memory 1321 and/or data stored in the second memory 1322; detecting privacy data in the multimedia information; when the private data are detected, displaying a shielding operation interface of the private data, and shielding the private data according to the operation of a user on the shielding operation interface; and sharing the multimedia information after the private data is shielded.
Optionally, the processor 1360 is configured to: and when the multimedia information is a picture, detecting whether preset first-class information is contained in the file parameters of the picture, and detecting whether preset second-class information is contained in the content of the picture.
Further, the processor 1360 is configured to: when the file parameters of the pictures contain preset first-class information, receiving an instruction of shielding the private data by a user; displaying a shielding operation interface marked with the detected preset first-class information; and deleting the preset first type of information selected by the user through the shielding operation interface.
Further, the processor 1360 is configured to: when the picture content contains preset second-type information, receiving an instruction of shielding the privacy data by a user; displaying a shielding operation interface marked with the detected preset second type information; and carrying out fuzzy processing on the area where the preset second type of information selected by the user through the shielding operation interface is located.
Optionally, the processor 1360 is configured to: and when the multimedia information is a character, detecting a preset keyword in the character.
Further, the processor 1360 is configured to: receiving an instruction of shielding the private data by a user; displaying a shielding operation interface marked with the preset keywords; and replacing the preset keywords selected by the user through the shielding operation interface with preset characters or characters input by the user.
Optionally, the processor 1360 is configured to: and when the multimedia information is voice, converting the voice into characters, and detecting preset keywords in the characters obtained by conversion.
Further, the processor 1360 is configured to: receiving an instruction of shielding the private data by a user; displaying a shielding operation interface marked with a voice time period in which the private data is located, wherein the voice time period in which the private data is located comprises detected voice corresponding to the preset keyword; and replacing the voice time interval selected by the user through the shielding operation interface with preset voice or voice recorded by the user.
Optionally, the processor 1360 is configured to: receiving an instruction of shielding the private data by a user; and shielding the private data by adopting a preset operation matched with the type of the private data.
The preset operation matched with the type of the private data comprises the following steps: deleting the preset first type of information, blurring the area where the preset second type of information is located, replacing the preset keywords with preset characters, and replacing one or more items in the voice time period containing the preset keywords with preset voice.
Optionally, the processor 1360 is configured to: receiving a request for viewing original multimedia information; and after the user confirms to share the original multimedia information, sharing the multimedia information before the privacy data is shielded.
The preset first type information at least comprises: one or more of a shooting location, a shooting time, and a photographer name.
The preset second type information at least comprises: one or more of an iris image, a fingerprint image, an identification card image, an account number image and a password image.
Therefore, the mobile terminal of the embodiment automatically detects the privacy data in the multimedia information through the module, and provides a quick shielding interface, so that the sharing efficiency of the multimedia information is improved; moreover, the mobile terminal is suitable for different types of multimedia information, and can comprehensively protect the privacy data in the multimedia information.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the mobile terminal described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the embodiment of the mobile terminal, since it is basically similar to the embodiment of the method, the description is relatively simple, and for relevant points, reference may be made to part of the description of the embodiment of the method.

Claims (18)

1. A multimedia information sharing method is characterized by comprising the following steps:
receiving an instruction of sharing multimedia information by a user;
detecting privacy data in the multimedia information;
when the private data are detected, displaying a shielding operation interface of the private data, and shielding the private data according to the operation of a user on the shielding operation interface;
sharing the multimedia information after the private data is shielded;
when the multimedia information is a picture, the step of detecting the privacy data in the multimedia information comprises the following steps:
detecting whether preset first-class information is contained in the file parameters of the picture and detecting whether preset second-class information is contained in the picture content, wherein the preset first-class information at least comprises the following steps: one or more of shooting place, shooting time and name of the photographer, wherein the preset second type information at least comprises: one or more of an iris image, a fingerprint image, an identification card image, an account number image and a password image;
when the private data are detected, displaying a shielding operation interface of the private data, and shielding the private data according to the operation of a user on the shielding operation interface, wherein the step of shielding the private data comprises the following steps:
when the file parameters of the pictures contain preset first-class information, receiving an instruction of shielding the private data by a user;
displaying a shielding operation interface marked with the detected preset first-class information;
and deleting the preset first type of information selected by the user through the shielding operation interface.
2. The method according to claim 1, wherein when the private data is detected, a blocking operation interface of the private data is displayed, and according to the operation of a user on the blocking operation interface, the step of blocking the private data comprises:
when the picture content contains preset second-type information, receiving an instruction of shielding the privacy data by a user;
displaying a shielding operation interface marked with the detected preset second type information;
and carrying out fuzzy processing on the area where the preset second type of information selected by the user through the shielding operation interface is located.
3. The method of claim 1, wherein when the multimedia information is text, the step of detecting the privacy data in the multimedia information comprises:
and detecting preset keywords in the characters.
4. The method according to claim 3, wherein the step of displaying a mask operation interface of the private data when the private data is detected, and masking the private data according to the operation of the user on the mask operation interface comprises:
receiving an instruction of shielding the private data by a user;
displaying a shielding operation interface marked with the preset keywords;
and replacing the preset keywords selected by the user through the shielding operation interface with preset characters or characters input by the user.
5. The method of claim 1, wherein when the multimedia information is voice, the step of detecting the privacy data in the multimedia information comprises:
and converting the voice into characters, and detecting preset keywords in the converted characters.
6. The method according to claim 5, wherein the step of displaying a mask operation interface of the private data when the private data is detected, and masking the private data according to the operation of the user on the mask operation interface comprises:
receiving an instruction of shielding the private data by a user;
displaying a shielding operation interface marked with a voice time period in which the private data is located, wherein the voice time period in which the private data is located comprises detected voice corresponding to the preset keyword;
and replacing the voice time interval selected by the user through the shielding operation interface with preset voice or voice recorded by the user.
7. The method according to any one of claims 1 to 6, wherein the step of displaying a mask operation interface of the private data when the private data is detected, and masking the private data according to the operation of a user on the mask operation interface comprises:
receiving an instruction of shielding the private data by a user;
and shielding the private data by adopting a preset operation matched with the type of the private data.
8. The method according to claim 7, wherein the preset operation matched with the type of the private data comprises: deleting the preset first type of information, blurring the area where the preset second type of information is located, replacing the preset keywords with preset characters, and replacing one or more items in the voice time period containing the preset keywords with preset voice.
9. The method according to any one of claims 1 to 6, wherein the step of sharing the multimedia information after the privacy-masked data further comprises:
receiving a request for viewing original multimedia information;
and after the user confirms to share the original multimedia information, sharing the multimedia information before the privacy data is shielded.
10. A mobile terminal, comprising:
the starting module is used for receiving an instruction of sharing the multimedia information by a user;
the privacy detection module is used for detecting privacy data in the multimedia information received by the starting module;
the privacy shielding module is used for displaying a shielding operation interface of the privacy data detected by the privacy detection module when the privacy data are detected, and shielding the privacy data according to the operation of a user on the shielding operation interface;
the sharing module is used for sharing the multimedia information after the privacy data is shielded by the privacy shielding module;
wherein, when the multimedia information is a picture, the privacy detection module comprises:
a first detecting unit, configured to detect whether a file parameter of the picture includes preset first type information and detect whether a content of the picture includes preset second type information, where the preset first type information at least includes: one or more of shooting place, shooting time and name of the photographer, wherein the preset second type information at least comprises: one or more of an iris image, a fingerprint image, an identification card image, an account number image and a password image;
wherein the privacy masking module comprises:
the first instruction acquisition unit is used for receiving an instruction of shielding the private data by a user when the file parameters of the picture contain preset first-class information;
the first display unit is used for displaying a shielding operation interface marked with the detected preset first-class information;
and the first shielding unit is used for deleting the preset first type of information selected by the user through the shielding operation interface.
11. The mobile terminal of claim 10, wherein the privacy-mask module comprises:
the second instruction acquisition unit is used for receiving an instruction of shielding the private data by a user when the picture content contains preset second-type information;
the second display unit is used for displaying a shielding operation interface marked with the detected preset second type information;
and the second shielding unit is used for carrying out fuzzy processing on the area where the preset second type of information selected by the user through the shielding operation interface is located.
12. The mobile terminal of claim 10, wherein when the multimedia information is text, the privacy detection module further comprises:
and the second detection unit is used for detecting preset keywords in the characters.
13. The mobile terminal of claim 12, wherein the privacy-mask module further comprises:
the third instruction acquisition unit is used for receiving an instruction of shielding the private data by a user;
the third display unit is used for displaying the shielding operation interface marked with the preset keywords;
and the third shielding unit is used for replacing the preset keywords selected by the user through the shielding operation interface with preset characters or characters input by the user.
14. The mobile terminal of claim 10, wherein when the multimedia information is voice, the privacy detection module further comprises:
and the third detection unit is used for converting the voice into characters and detecting preset keywords in the converted characters.
15. The mobile terminal of claim 14, wherein the privacy-mask module further comprises:
the fourth instruction acquisition unit is used for receiving an instruction of shielding the private data by a user;
the fourth display unit is used for displaying a shielding operation interface which identifies a voice time period in which the private data are located, wherein the voice time period in which the private data are located is the detected voice corresponding to the preset keyword;
and the fourth shielding unit is used for replacing the voice time interval selected by the user through the shielding operation interface with preset voice or voice recorded by the user.
16. The mobile terminal of any of claims 10 to 15, wherein the privacy-mask module further comprises:
a fifth instruction acquisition unit, configured to receive an instruction for shielding the private data by a user;
and the fifth shielding unit is used for shielding the private data by adopting a preset operation matched with the type of the private data.
17. The mobile terminal according to any of claims 16, wherein the preset operation matching the type of the private data comprises: deleting the preset first type of information, blurring the area where the preset second type of information is located, replacing the preset keywords with preset characters, and replacing one or more items in the voice time period containing the preset keywords with preset voice.
18. The mobile terminal according to any of claims 10 to 15, further comprising:
the request receiving module is used for receiving a request for viewing original multimedia information;
and the original information sharing module is used for sharing the multimedia information before the privacy data is shielded after the user confirms to share the original multimedia information.
CN201610332646.9A 2016-05-18 2016-05-18 Multimedia information sharing method and mobile terminal Active CN106055996B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610332646.9A CN106055996B (en) 2016-05-18 2016-05-18 Multimedia information sharing method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610332646.9A CN106055996B (en) 2016-05-18 2016-05-18 Multimedia information sharing method and mobile terminal

Publications (2)

Publication Number Publication Date
CN106055996A CN106055996A (en) 2016-10-26
CN106055996B true CN106055996B (en) 2021-03-16

Family

ID=57176523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610332646.9A Active CN106055996B (en) 2016-05-18 2016-05-18 Multimedia information sharing method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106055996B (en)

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603381B (en) * 2016-11-24 2020-06-02 北京小米移动软件有限公司 Method and device for processing chat information
CN106708361A (en) * 2016-11-28 2017-05-24 努比亚技术有限公司 Information processing method and mobile terminal
CN106529339A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Picture display method, device and terminal
CN106791024A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Voice messaging player method, device and terminal
CN107145798A (en) * 2017-05-03 2017-09-08 广州市千钧网络科技有限公司 The display methods and system of a kind of login account
CN109033928A (en) * 2017-06-09 2018-12-18 北京小米移动软件有限公司 Prevent the image processing method and device of information leakage
CN107682541B (en) * 2017-09-27 2021-02-05 努比亚技术有限公司 Audio control method for screen projection, mobile terminal and storage medium
CN107742077B (en) * 2017-10-09 2020-01-03 武汉斗鱼网络科技有限公司 Method and device for preventing information leakage in live game
CN108111711A (en) * 2017-12-27 2018-06-01 上海闻泰电子科技有限公司 The method and device that safety of image is shared
CN108390865B (en) * 2018-01-30 2021-03-02 南京航空航天大学 Fine-grained access control method based on privacy drive
CN110162283A (en) * 2018-02-13 2019-08-23 北京三星通信技术研究有限公司 Method, the method for shared information and the user equipment of shared external connection display equipment
CN108509533B (en) * 2018-03-15 2019-08-16 平安科技(深圳)有限公司 Control method, device, equipment and the computer storage medium of screenshotss sharing files
CN108256513A (en) * 2018-03-23 2018-07-06 中国科学院长春光学精密机械与物理研究所 A kind of intelligent video analysis method and intelligent video record system
CN110557499B (en) * 2018-06-01 2021-08-17 Oppo广东移动通信有限公司 Information processing method and device and mobile terminal
CN108986009A (en) * 2018-06-11 2018-12-11 北京三快在线科技有限公司 Generation method, device and the electronic equipment of picture
CN109151338B (en) * 2018-07-10 2021-06-25 Oppo广东移动通信有限公司 Image processing method and related product
CN109522740B (en) * 2018-10-16 2021-04-20 易保互联医疗信息科技(北京)有限公司 Health data privacy removal processing method and system
CN109993207B (en) * 2019-03-01 2022-10-25 华南理工大学 Image privacy protection method and system based on target detection
CN110177040A (en) * 2019-05-31 2019-08-27 维沃移动通信有限公司 Picture sharing method and mobile terminal
CN110262735A (en) * 2019-06-17 2019-09-20 深圳传音控股股份有限公司 The processing method and mobile terminal of screenshot
CN110708574B (en) * 2019-10-23 2022-01-21 上海连尚网络科技有限公司 Method and device for publishing information
CN110784676B (en) * 2019-10-28 2023-10-03 深圳传音控股股份有限公司 Data processing method, terminal device and computer readable storage medium
CN110929287B (en) * 2019-11-21 2023-01-10 深圳传音控股股份有限公司 Picture processing method and device
CN111277807A (en) * 2020-01-14 2020-06-12 广东小天才科技有限公司 Projection implementation method, wearable device, display device and storage medium
CN111326142A (en) * 2020-01-21 2020-06-23 青梧桐有限责任公司 Text information extraction method and system based on voice-to-text and electronic equipment
CN111353170A (en) * 2020-02-27 2020-06-30 北京北信源软件股份有限公司 File privacy information processing method and device, electronic equipment and storage medium
US11615205B2 (en) 2020-05-28 2023-03-28 Bank Of America Corporation Intelligent dynamic data masking on display screens based on viewer proximity
CN114580006A (en) * 2020-11-30 2022-06-03 京东方科技集团股份有限公司 Resource access control method and electronic equipment
CN117939247A (en) * 2020-12-08 2024-04-26 北京字节跳动网络技术有限公司 Multimedia data processing method and device and electronic equipment
CN112887590B (en) * 2021-01-11 2022-12-27 北京小米移动软件有限公司 Image processing method, device and storage medium
CN112818390A (en) * 2021-01-26 2021-05-18 支付宝(杭州)信息技术有限公司 Data information publishing method, device and equipment based on privacy protection
CN112887799B (en) * 2021-03-11 2023-07-25 北京小米移动软件有限公司 Image resource sharing method, device and medium
CN112989410A (en) * 2021-03-15 2021-06-18 读书郎教育科技有限公司 Method for protecting privacy of scanning pen
CN113360938A (en) * 2021-05-20 2021-09-07 维沃移动通信有限公司 Data transmission method and device and electronic equipment
CN113393471A (en) * 2021-05-26 2021-09-14 中国联合网络通信集团有限公司 Image processing method and device
CN113191701B (en) * 2021-07-02 2021-09-28 深圳市知酷信息技术有限公司 User management system based on internet document sharing space
CN114040048A (en) * 2021-09-24 2022-02-11 荣耀终端有限公司 Privacy protection method and electronic equipment
WO2024020980A1 (en) * 2022-07-29 2024-02-01 广州视源电子科技股份有限公司 Data transmission method and apparatus, and conference system, wireless screen transmitter and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021350A (en) * 2014-05-13 2014-09-03 小米科技有限责任公司 Privacy-information hiding method and device
CN104484612A (en) * 2014-11-19 2015-04-01 中电长城(长沙)信息技术有限公司 Sensitive information shielding method and system for remote desktop applications
US20150287164A1 (en) * 2014-04-04 2015-10-08 Blackberry Limited System and method for electronic device display privacy

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150287164A1 (en) * 2014-04-04 2015-10-08 Blackberry Limited System and method for electronic device display privacy
CN104021350A (en) * 2014-05-13 2014-09-03 小米科技有限责任公司 Privacy-information hiding method and device
CN104484612A (en) * 2014-11-19 2015-04-01 中电长城(长沙)信息技术有限公司 Sensitive information shielding method and system for remote desktop applications

Also Published As

Publication number Publication date
CN106055996A (en) 2016-10-26

Similar Documents

Publication Publication Date Title
CN106055996B (en) Multimedia information sharing method and mobile terminal
CN106327185B (en) Starting method of payment application and mobile terminal
CN107678644B (en) Image processing method and mobile terminal
CN105224195B (en) Terminal operation method and device
CN105068723B (en) Information processing method and electronic equipment
CN106445363B (en) Payment interface starting method and mobile terminal
US20150040035A1 (en) Social Network Interaction
CN106055195A (en) Operating method for folder and mobile terminal
CN112804445B (en) Display method and device and electronic equipment
WO2017128522A1 (en) Method, device, and terminal for processing touch-control operation
CN104809174A (en) Opening method of terminal application
US11899778B2 (en) Password verification method, password setting method, and mobile terminal
CN107959789B (en) Image processing method and mobile terminal
WO2018107727A1 (en) Method and device for information processing, and terminal
CN111857498B (en) Data interaction method and device and electronic equipment
CN106201204A (en) The method and apparatus starting application function
CN104808899A (en) Terminal
CN106874787B (en) Image viewing method and mobile terminal
CN107066864B (en) Application icon display method and device
CN115795429A (en) Application interface management method and device, electronic equipment and readable storage medium
CN115543176A (en) Information processing method and device and electronic equipment
CN114020391A (en) Information display method and device, electronic equipment and readable storage medium
CN108073425A (en) A kind of application program launching method and mobile terminal
CN106502515B (en) Picture input method and mobile terminal
WO2018094567A1 (en) Input method and terminal device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant