CN107256353A - Possesses the display methods of privacy protection function - Google Patents

Possesses the display methods of privacy protection function Download PDF

Info

Publication number
CN107256353A
CN107256353A CN201710441346.9A CN201710441346A CN107256353A CN 107256353 A CN107256353 A CN 107256353A CN 201710441346 A CN201710441346 A CN 201710441346A CN 107256353 A CN107256353 A CN 107256353A
Authority
CN
China
Prior art keywords
electronic equipment
possessing
privacy protection
display methods
protection function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710441346.9A
Other languages
Chinese (zh)
Inventor
谢文娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiyouwei Software Development Co Ltd
Original Assignee
Shanghai Aiyouwei Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiyouwei Software Development Co Ltd filed Critical Shanghai Aiyouwei Software Development Co Ltd
Priority to CN201710441346.9A priority Critical patent/CN107256353A/en
Publication of CN107256353A publication Critical patent/CN107256353A/en
Priority to PCT/CN2017/114621 priority patent/WO2018188358A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

This application discloses a kind of display methods for possessing privacy protection function, it is related to terminal display technology field, the display methods for possessing privacy protection function includes:Trigger signal is produced according to the action of electronic equipment;According to the trigger signal, start identifying procedure, to judge whether user possesses authority;If possessing authority, any action is not performed, if not possessing authority, the partial function of electronic equipment is locked, to protect privacy.The display methods for possessing privacy protection function that the application is provided; trigger signal is automatically generated according to the action of electronic equipment; when " visitor " can be transferred in electronic equipment; automatically it is authenticated flow; and the partial function of electronic equipment can be locked; when user is shared by electronic equipment progress content, play a part of protecting privacy.

Description

Possesses the display methods of privacy protection function
Technical field
The application is related to terminal display technology field, more particularly to a kind of display methods for possessing privacy protection function.
Background technology
Gradually popularization and increasingly perfect, life, study, the work weight of technology with intelligent terminal, use intelligence Can terminal frequency also more and more higher, this just proposes higher requirement to intelligent terminal in terms of secret protection.
At work, the photo or drawing scheme for seeing some about work can be shared to colleague or client using mobile phone, But other side left and right switch flaps when, it is more likely that next be oneself secret living photo, cause the leakage of privacy.
The content of the invention
In order to one of solve the above problems, this application provides a kind of display methods for possessing privacy protection function, including:
Trigger signal is produced according to the action of electronic equipment;
According to the trigger signal, start identifying procedure, to judge whether user possesses authority;If possessing authority, Do not perform any action then, if not possessing authority,
The partial function of electronic equipment is locked, to protect privacy.
In the above-mentioned technical solutions, further, in addition to:
Obtain advance signal;Only after advance signal is obtained, just trigger signal can be produced according to the action of electronic equipment.
In the above-mentioned technical solutions, further, triggering letter can be produced when the action of electronic equipment reaches following condition Number:The acceleration of electronic equipment exceedes setting value.
In the above-mentioned technical solutions, further, the identifying procedure includes iris authentication, finger print identifying, face authenticating In one or several kinds.
In the above-mentioned technical solutions, further, the partial function of locking electronic equipment includes forbidding switching display content.
In the above-mentioned technical solutions, further, locking electronic equipment partial function include forbid setting range it Outer switching display content.
In the above-mentioned technical solutions, further, setting range is the scope between screen top dead centre and lower dead center, locking During the partial function of electronic equipment, it can only drag screen and be rolled between top dead centre and lower dead center;The top dead centre and it is lower only Point is set by the user.
In the above-mentioned technical solutions, further, setting range includes selected some pictures, locks the portion of electronic equipment When dividing function, the selected picture of display is allowed hand over.
In the above-mentioned technical solutions, further, the advance signal is obtained by secondary or physical bond.
In the above-mentioned technical solutions, further, the partial function of locking electronic equipment includes the aobvious of locking set information Show function.
Compared to prior art, the display methods for possessing privacy protection function that the application is provided, according to electronic equipment Action automatically generates trigger signal, when " visitor " can be transferred in electronic equipment, flow is authenticated automatically, if user Do not possess authority, then lock the partial function of electronic equipment, share therefore, it is possible to carry out content using electronic equipment in user When, effectively protect privacy.
The additional aspect and advantage of the application will become obvious in following description section, or the practice for passing through the application Recognize.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the application embodiment or technical scheme of the prior art The accompanying drawing used required in embodiment or description of the prior art is briefly described, it should be apparent that, in describing below Accompanying drawing is some embodiments of the application, for those of ordinary skill in the art, before creative work is not paid Put, other accompanying drawings can also be obtained according to these accompanying drawings.
To more fully understand and illustrating some embodiments of the present application, below with reference to the description of accompanying drawing reference implementation example, In the drawings, same numeral numbering indicates corresponding part in the accompanying drawings.
Fig. 1 is the illustrative diagram of the Environment System provided according to some embodiments of the present application.
Fig. 2 is the exemplary cell schematic diagram of the electronic functionalities configuration shown in Fig. 1.
Fig. 3 is the exemplary stream of the display methods for possessing privacy protection function provided according to some embodiments of the present application Cheng Tu.
Fig. 4 is the exemplary stream of the display methods for possessing privacy protection function provided according to some embodiments of the present application Cheng Tu.
Embodiment
Description below with reference to accompanying drawing is had the right the application defined in requirement and its equivalent for ease of Integrated Understanding Various embodiments.These embodiments include various specific details in order to understand, but these be considered only as it is exemplary.Cause This, it will be appreciated by those skilled in the art that carrying out variations and modifications without departing from this to various embodiments described here The scope and spirit of application.In addition, briefly and to be explicitly described the application, the application will be omitted to known function and structure Description.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely can Understand and as one man understand the application.Therefore, for those skilled in the art, it is possible to understand that there is provided implement to the application is various The description of example is only the purpose to illustrate, rather than limitation appended claims and its application of Equivalent definitions.
Below in conjunction with the accompanying drawing in the application some embodiments, the technical scheme in the embodiment of the present application is carried out clear Chu, it is fully described by, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments. Based on the embodiment in the application, it is all that those of ordinary skill in the art are obtained under the premise of creative work is not made Other embodiment, belongs to the scope of the application protection.
It should be noted that the term used in the embodiment of the present application is the mesh for being only in description specific embodiment , and it is not intended to be limiting the application." one " of singulative used in the embodiment of the present application and appended claims, " one ", " one kind ", " described " and "the" are also intended to including most forms, unless context clearly shows that other implications.Also It should be appreciated that term "and/or" used herein refer to and comprising one or more phases bind list any of project or It is possible to combination.Expression " first ", " second ", " described the first " and " described the second " be used for modify respective element without examining Worry order or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.
Can be electronic equipment according to the terminal of the application some embodiments, the electronic equipment can include smart mobile phone, PC (PC, such as tablet personal computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device And one or more of combinations in wearable device etc. (VR).According to some embodiments of the present application, the wearable device Including type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type, (for example electronics takes Dress), decorated type (such as pad skin, tatooing or built in electronic device) in one or more of combinations.The application's In some embodiments, the electronic equipment can be flexible, be not limited to the said equipment, or can be above-mentioned various equipment One or more of combinations.In this application, term " user " may indicate that using electronic equipment people or use electronic equipment Equipment (such as artificial intelligence electronic equipment).
The embodiment of the present application provides a kind of display methods for possessing privacy protection function.For the ease of understanding that the application is real Example is applied, the embodiment of the present application is described in detail below with reference to accompanying drawing.
Fig. 1 is the illustrative diagram of the Environment System 100 provided according to some embodiments of the present application.Such as Fig. 1 Shown, Environment System 100 can include electronic equipment 110, network 120 and server 130 etc..Electronic equipment 110 can be with Including bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and physics Key 117 etc..In some embodiments of the present application, electronic equipment 110 can omit one or more elements, or can enter one Step includes one or more other elements.
Bus 111 can include circuit.The circuit can be with one or more element (examples in interconnection electronics 110 Such as, bus 111, processor 112, memory 113, input/output module 114, display 115 and communication module 116).It is described Realize communication (for example, obtaining and/or sending number between one or more elements that circuit can also be in electronic equipment 110 According to).
Processor 112 can include one or more coprocessors (Co-processor), application processor (AP, Application Processor) and communication processor (Communication Processor).As an example, processor 112 can perform the control and/or data processing with one or more elements of electronic equipment 110.For example, processor 12 can be with Start identifying procedure, to judge whether user possesses authority;Can with the partial function of locking device (for example display function or Person's screen drag function).
Memory 113 can be with data storage.The data can include other with one or more of electronic equipment 110 The related instruction of element or data.For example, the data can include the initial data of the before processing of processor 112, intermediate data And/or the data after processing.Memory 113 can include impermanent memory memory and/or permanent memory memory.
According to some embodiments of the present application, memory 113 can store software and/or program.Described program can be wrapped Include kernel, middleware, API (API, Application Programming Interface) and/or apply journey Sequence.At least a portion of the kernel, the middleware or the API can include operating system (0S, Operating System).As an example, the kernel can be controlled or managed for performing other programs (for example, middle Part, API and application program) in realize operation or function system resource (for example, bus 111, processor 112nd, memory 113 etc.).In addition, the kernel can provide interface.The interface can by the middleware, it is described should One or more elements of electronic equipment 110 are accessed with DLL or the application program to control or management system resource.
The middleware can as data transfer intermediate layer.The data transfer can allow API or Application program is with the kernel communication to exchange data.As an example, the middleware can be handled from the application program The one or more task requests obtained.For example, the middleware can be to one or more application assigned electronic equipments The priority of 110 system resource (for example, bus 111, processor 112, memory 113 etc.), and handle it is one or Multiple tasks are asked.The API can be that the application program is used to control from the kernel or the middleware The interface of function is provided.The API can also include one or more interfaces or function.The function can be used In security control, Control on Communication, document control, window control, text control, image procossing, signal transacting etc..
Input/output module 114 can send what is inputted from user or external equipment to the other elements of electronic equipment 110 Instruction or data.Input/output module 114 can also be defeated by the instruction of the other elements acquisition from electronic equipment 110 or data Go out to user or external equipment.
Display 115 can be with display content.The content can to user show all kinds (for example, text, image, Video, icon and/or symbol).Display 115 can include liquid crystal display (LCD, Liquid Crystal Display), Light emitting diode (LED, Light-Emitting Diode) display, Organic Light Emitting Diode (OLED, Organic Light Emitting Diode) display, Micro Electro Mechanical System (MEMS, Micro Electro Mechanical Systems) display Device or electric paper display etc., or several combinations.Display 115 can include touch-screen.In certain embodiments, display 115 can show virtual key.The touch-screen can obtain the input of the virtual key.Display 115 can be touched by described Touch screen and obtain input.The input can include touch input, gesture input, action input, close input, electronic pen or user The input (for example, hovering input) of body part.In certain embodiments, display 115 can show message registration.
Communication module 116 can configure the communication between equipment.In certain embodiments, network environment 100 can enter one Step includes electronic equipment 140.As an example, the communication between the equipment can include electronic equipment 110 and other equipment (example Such as, server 130 or electronic equipment 140) between communication.For example, communication module 116 can pass through radio communication or cable modem Letter is connected to network 120, realizes and communicates with other equipment (for example, server 130 or electronic equipment 140).
The radio communication can include microwave communication and/or satellite communication etc..The radio communication can include honeycomb Communication is (for example, global mobile communication (GSM, Global System for Mobile Communications), CDMA (CDMA, Code Division Multiple Access), 3G (Third Generation) Moblie (3G, The 3rd Generation Telecommunication), forth generation mobile communication (4G), the 5th third-generation mobile communication (5G)), Long Term Evolution (LTE, Long Term Evolution), Long Term Evolution upgrade version (LTE-A, LTE-Advanced), WCDMA (WCDMA, Wideband Code Division Multiple Access), UMTS (UMTS, Universal Mobile Telecommunications System), WiMAX (WiBro, Wireless Broadband) etc., or several combinations.According to some embodiments of the present application, the radio communication can include wireless local Net (WiFi, Wireless Fidelity), bluetooth, low-power consumption bluetooth (BLE, Bluetooth Low Energy), ZigBee protocol (ZigBee), near-field communication (NFC, Near Field Communication), magnetic safe transmission, radio frequency and body area network (BAN, Body Area Network) etc., or several combinations.According to some embodiments of the present application, the wire communication can include GLONASS (Glonass/GNSS, Global Navigation Satellite System), global positioning system System (GPS, Global Position System), Beidou navigation satellite system or Galileo (European GPS) Deng.The wire communication can include USB (USB, Universal Serial Bus), high-definition media interface (HDMI, High-Definition Multimedia Interface), proposed standard 232 (RS-232, Recommend Standard 232), and/or plain old telephone service (POTS, Plain Old Telephone Service) etc. in one Kind, or several combinations.
Secondary or physical bond 117 can be used for user mutual.Secondary or physical bond 117 can include one or more entity keys.In some realities Apply in example, user can be with the function of self-defined secondary or physical bond 117.As an example, secondary or physical bond 117 can be used for producing advance signal.
Network 120 can include communication network.The communication network can include computer network (for example, LAN (LAN, Local Area Network) or wide area network (WAN, Wide Area Network)), internet and/or telephone network Deng, or several combinations.Network 120 can be to the other equipment in Environment System 100 (for example, electronic equipment 110, clothes Business device 130, electronic equipment 140 etc.) send information.Described information can include the pattern template of cue mark and control panel Deng.
Server 130 can be by the other equipment in the connection Environment System 100 of network 120 (for example, electronic equipment 110th, electronic equipment 140 etc.).
Electronic equipment 140 can be identical or different with electronic equipment 110 type.According to some embodiments of the present application, The part or all of operation performed in electronic equipment 110 can be in another equipment or multiple equipment (for example, electronic equipment 140 And/or server 130) middle execution.In certain embodiments, when electronic equipment 110 be automatically or in response to request perform it is a kind of or When a variety of functions and/or service, electronic equipment 110 can ask other equipment (for example, electronic equipment 140 and/or server 130) perform function and/or service are substituted.In certain embodiments, electronic equipment 110 is in addition to perform function or service, further Perform relative one or more functions.In certain embodiments, other equipment is (for example, electronic equipment 140 and/or clothes Business device 130) asked function or other related one or more functions can be performed, implementing result can be sent to electricity Sub- equipment 110.Electronic equipment 110 can repeat result or further handle implementing result, to provide asked function Or service.As an example, electronic equipment 110 can use cloud computing, distributed computing technology and/or client-server end to calculate meter Calculate etc., or several combinations.
It should be noted that the description for Environment System 100 above, only for convenience of description, can not be this Shen It please be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system can Each element can be combined on the premise of without departing substantially from the principle, or constitutes subsystem and be connected with other elements, To implementing the various modifications and variations on the above method and systematic difference field progress form and details.For example, network environment System 100 may further include database.Such deformation, within the protection domain of the application.
Fig. 2 is the exemplary cell block diagram that the electronic functionalities provided according to some embodiments of the present application are configured.Such as Shown in Fig. 2, processor 112 can include processing module 200, and the processing module 200 can include acquiring unit 210, analysis Unit 220, control unit 230.
According to some embodiments of the present application, acquiring unit 210 can obtain information.Described information can include but not limit In word, picture, audio, video, action, gesture etc., or several combinations.In certain embodiments, acquiring unit 210 can be with Input information is obtained by input/output module 114, the touch-screen of display 115 and/or secondary or physical bond 117.As an example, obtaining Unit 210 is taken to obtain the input information (for example, advance signal) of electronic equipment 110.The input information can include it His equipment (for example, electronic equipment 140) and/or the input of user, for example, the input of key-press input, touch-control, gesture input, action Input, remote input, transmission input etc., or several combinations.Specifically, input information can include that user's body can be represented The information such as the fingerprint, iris, facial characteristics of part;Input information can also include user set normal indication range, it is described just Normal indication range is referred to other people normal displays and the scope for other people normal operatings, more than this normal display model Enclose, content does not show or do not performed that page turning, rolling etc. are operated.
In certain embodiments, acquiring unit 210 may further include sensor, and acquiring unit 210 can pass through institute State sensor and obtain information, for example, obtaining trigger signal by the sensor.The sensor can include but is not limited to light Dependent sensor, acoustic sensor, gas sensor, chemical sensor, voltage sensitive sensor, temp-sensitive sensor, fluid sensor, life Thing sensor, laser sensor, Hall sensor, intelligence sensor etc., or several combinations.
According to some embodiments of the present application, analytic unit 220 can be divided the information that acquiring unit 210 is obtained Analysis.In certain embodiments, analytic unit 220 has identification verification function, can analyze user's body of the acquisition of acquiring unit 21 Part information, to judge whether user possesses associated rights.
According to some embodiments of the present application, control unit 230 can be with control electronics.The control electronics can To perform action including control electronics 110.In certain embodiments, control unit 230 is according to the analysis of analytic unit 220 As a result, carry out control electronics 110 and perform action.For example, the user identity letter that analytic unit 220 is obtained to acquiring unit 210 Breath is analyzed, that is, starts identifying procedure, if the analysis result of analytic unit 210 is to judge that user does not possess authority, then Control unit 230 locks the partial function of electronic equipment, to protect privacy.
It should be noted that described above for the unit in processing module 200, only for convenience of description, can not be this Application is limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system, Unit may be combined on the premise of without departing substantially from the principle, or constitute submodule and connected with other units Connect, the various modifications and variations in form and details are carried out to the function of implementing above-mentioned module and unit.For example, electronic equipment 110 may further include sensor etc., and acquiring unit 210 can obtain information by sensor.In another example, processing unit 220 may further include division subelement etc..Such deformation, within the protection domain of the application.
Fig. 3 is the exemplary stream of the display methods for possessing privacy protection function provided according to some embodiments of the present application Cheng Tu.As shown in figure 3, flow 300 can be realized by processing module 200.
In step 310, trigger signal is produced according to the action of electronic equipment.The effect of the step mainly is, it is determined that opening The opportunity of the display methods described herein for possessing privacy protection function is moved, specifically, is handed over by electronic equipment to " visit When in visitor " hand, start the display methods for possessing privacy protection function, it is relatively more reasonable.Therefore, the step passes through electronic equipment Motion state judge electronic equipment is when to be transferred in " owner " hand in " visitor " hand.
Specifically, electronic equipment necessarily has acceleration presence when being transferred to " visitor " by " owner ", therefore, can Detect acceleration magnitude to judge by acceleration transducer, when the acceleration magnitude of electronic equipment exceedes setting value, then produce and touch Signal, start identifying procedure.
The setting value can be by user's sets itself and adjustment, according to setting value, and user can be by controlling transfer electronics to set Movement range when standby, to choose whether to carry out ensuing identifying procedure.
In step 320, according to the trigger signal, start identifying procedure, to judge whether user possesses authority.If Possess authority, then do not perform any action;If not possessing authority, 330 are performed.
The step is to judge whether electronic equipment user possesses associated rights, that is, judges the user of current electronic device Whether " owner " of electronic equipment, or whether in the trust list of setting.
Specifically, identifying procedure can be in cipher authentication, gesture authentication, iris authentication, finger print identifying, face authenticating One or several kinds.Wherein, preferably iris authentication, and iris authentication is set to backstage certification;Verification process need not appoint What is operated, and any display is there will not be, more for crypticity.
Certainly, this be only herein described identifying procedure some citings, it is described herein to possess privacy protection function Display methods, can also be using other identifying procedures, as long as being able to verify that the identity and authority of user.
If by identifying procedure, judging that the user of current equipment possesses authority (user of current device is " main People " or in the trust list that " owner " sets), then do not perform any action, user can be normally using electronic equipment Institute is functional.If by identifying procedure, judging that the user of current equipment does not possess authority, then step 330 is performed.
In step 330, the partial function of electronic equipment is locked, to protect privacy.
In certain embodiments, the partial function of locking electronic equipment, which refers to, forbids switching display content.Specifically, can be with It is locked out the display interface of current electronic device, it is impossible to screen is dragged or switched;Certain limit can also be locked out Interior display content.
For example, selected some pictures can be set, during the partial function of locking device, for selected some pictures, make User can switch display on screen;But for other pictures, user, which can not normally switch, to be browsed.
In another example, for can the content that shows of scroll-up/down, can set top dead centre and lower dead center, top dead centre and it is lower only Scope between point is setting range, during the partial function of locking device, can drag screen top dead centre and lower dead center it Between roll.Available for person's chat record of the communications applications such as wechat, or the content such as microblogging shares the interface of application.It is specific and Speech, top dead centre and lower dead center, for example, user sets top dead centre and lower dead center by finger line, are entered by user's sets itself And set bounds to be shared.
In certain embodiments, the partial function of locking electronic equipment refers to the display function of set information, even if some are selected In information can not normally show, can show or Fuzzy Processing for mess code.
Compared to prior art, the display methods for possessing privacy protection function that the application is provided, according to electronic equipment Action automatically generates trigger signal, when " visitor " can be transferred in electronic equipment, flow is authenticated automatically, if user Do not possess authority, then lock the partial function of electronic equipment, share therefore, it is possible to carry out content using electronic equipment in user When, effectively protect privacy.
Fig. 4 is the exemplary stream of the display methods for possessing privacy protection function provided according to some embodiments of the present application Cheng Tu.As shown in figure 4, flow 400 can be realized by processing module 200.
In step 410, advance signal is obtained, the purpose of the step is to reduce determination frequency.Because the application is to pass through The action of electronic equipment judges that electronic equipment is when to be transferred in " owner " hand in " visitor " hand, but many situations Under, although electronic equipment action meets decision condition (for example, acceleration exceedes setting value), not from " owner " hand In be transferred in " visitor " hand (for example, when " owner " hand-hold electronic equipments are run);Therefore, progress can be caused substantial amounts of Unnecessary identifying procedure, wastes the substantial amounts of operation of system.
In this regard, by setting advance signal, can effectively reduce unnecessary identifying procedure.I.e. user need to be grasped by inputting Make to produce advance signal, electronic equipment can just produce triggering letter only when obtaining advance signal according to the action of electronic equipment Number.The wherein input operation of user, can be completed by secondary or physical bond.
In step 420, trigger signal is produced according to the action of electronic equipment.The step is identical with step 310 described in Fig. 3, It will not be repeated here.
Its trigger signal has two necessary conditions, and one be that user has been actively entered advance signal, and another is electricity Sub- equipment automatically detects required movement state.Two necessary conditions are combined, and on the one hand can avoid the false touch of secondary or physical bond, separately On the one hand electronic equipment can be avoided to judge operating state when not needed.
In step 430, according to the trigger signal, start identifying procedure, to judge whether user possesses authority.If Possess authority, then do not perform any action;If not possessing authority, 440 are performed.The step and step 320 phase described in Fig. 3 Together, it will not be repeated here.
In step 440, the partial function of electronic equipment is locked, to protect privacy.The step and step 330 phase described in Fig. 3 Together, it will not be repeated here.
It is noted that the description for schematic diagram 300,400 above, only for convenience of description, can not limit the application System is within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system, Ke Neng On the premise of without departing substantially from the principle, all parts are combined, or constitute subassembly and are combined with miscellaneous part, to reality Apply the various modifications and variations in the function progress form and details of aforesaid operations and part.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can To carry out various change.
It should be noted that in this manual, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability is included, so that process, method, article or equipment including a series of key elements not only will including those Element, but also other key elements including being not expressly set out, or also include being this process, method, article or equipment Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Also there is other identical element in process, method, article or equipment including the key element.
Finally, in addition it is also necessary to explanation, a series of above-mentioned processing are not only included with order described here in temporal sequence The processing of execution, and the processing including performing parallel or respectively rather than in chronological order.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with Completed by the related hardware of computer program instructions, described program can be stored in a computer-readable recording medium, The program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can for magnetic disc, CD, read-only storage (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) Deng.
Above disclosed is only some preferred embodiments of the application, it is impossible to the right model of the application is limited with this Enclose, one of ordinary skill in the art will appreciate that all or part of flow of above-described embodiment is realized, and will according to the application right Made equivalent variations are sought, still falls within and invents covered scope
Finally it should be noted that:Various embodiments above is only to the technical scheme for illustrating the application, rather than its limitations;To the greatest extent The application is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from each embodiment technology of the application The scope of scheme.

Claims (10)

1. a kind of display methods for possessing privacy protection function, it is characterised in that including:
Trigger signal is produced according to the action of electronic equipment;
According to the trigger signal, start identifying procedure, to judge whether user possesses authority;If possessing authority, no Any action is performed, if not possessing authority,
The partial function of electronic equipment is locked, to protect privacy.
2. the display methods according to claim 1 for possessing privacy protection function, it is characterised in that also include:
Obtain advance signal;Only after advance signal is obtained, just trigger signal can be produced according to the action of electronic equipment.
3. the display methods according to claim 1 or 2 for possessing privacy protection function, it is characterised in that work as electronic equipment Action reach trigger signal can be produced during following condition:The acceleration of electronic equipment exceedes setting value.
4. the display methods according to claim 1 for possessing privacy protection function, it is characterised in that the identifying procedure bag Include the one or several kinds in iris authentication, finger print identifying, face authenticating.
5. the display methods according to claim 1 for possessing privacy protection function, it is characterised in that locking electronic equipment Partial function includes forbidding switching display content.
6. the display methods according to claim 5 for possessing privacy protection function, it is characterised in that locking electronic equipment Partial function includes forbidding the switching display content outside setting range.
7. the display methods according to claim 6 for possessing privacy protection function, it is characterised in that setting range is screen Scope between top dead centre and lower dead center, lock electronic equipment partial function when, can only drag screen top dead centre and under Rolled between stop;The top dead centre and lower dead center are set by the user.
8. the display methods according to claim 6 for possessing privacy protection function, it is characterised in that setting range includes choosing Fixed some pictures, when locking the partial function of electronic equipment, allow hand over the selected picture of display.
9. the display methods according to claim 2 for possessing privacy protection function, it is characterised in that the advance signal leads to Cross secondary or physical bond acquisition.
10. the display methods according to claim 1 for possessing privacy protection function, it is characterised in that locking electronic equipment Partial function include locking set information display function.
CN201710441346.9A 2017-04-14 2017-06-13 Possesses the display methods of privacy protection function Pending CN107256353A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710441346.9A CN107256353A (en) 2017-06-13 2017-06-13 Possesses the display methods of privacy protection function
PCT/CN2017/114621 WO2018188358A1 (en) 2017-04-14 2017-12-05 Secure communication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710441346.9A CN107256353A (en) 2017-06-13 2017-06-13 Possesses the display methods of privacy protection function

Publications (1)

Publication Number Publication Date
CN107256353A true CN107256353A (en) 2017-10-17

Family

ID=60023648

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710441346.9A Pending CN107256353A (en) 2017-04-14 2017-06-13 Possesses the display methods of privacy protection function

Country Status (1)

Country Link
CN (1) CN107256353A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018188358A1 (en) * 2017-04-14 2018-10-18 上海爱优威软件开发有限公司 Secure communication method and system
CN109344585A (en) * 2018-10-09 2019-02-15 广州三星通信技术研究有限公司 The method and apparatus of the access right of automatic setting electric terminal
CN109871674A (en) * 2017-12-04 2019-06-11 上海聚虹光电科技有限公司 VR or AR equipment subregion operating right management method
CN111026351A (en) * 2019-12-06 2020-04-17 联想(北京)有限公司 Display control method and device and electronic equipment
CN111460537A (en) * 2020-03-30 2020-07-28 维沃移动通信有限公司 Method for hiding page content and electronic equipment
WO2021218889A1 (en) * 2020-04-27 2021-11-04 Wai Hung Lee Networking device with privacy protection

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446957A (en) * 2008-09-08 2009-06-03 南京Lg新港显示有限公司 Apparatus and method for browsing file with privacy protection function
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
CN103678979A (en) * 2013-12-06 2014-03-26 三星电子(中国)研发中心 Method and device for intelligently hiding privacy data
CN103699825A (en) * 2012-09-27 2014-04-02 Lg电子株式会社 Display apparatus and method for operating the same
CN104021331A (en) * 2014-06-18 2014-09-03 北京金和软件股份有限公司 Information processing method applied to electronic device with human face identification function
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN105117628A (en) * 2015-07-30 2015-12-02 广东欧珀移动通信有限公司 File display control method, apparatus and corresponding mobile device in terminal
WO2016110061A1 (en) * 2015-01-06 2016-07-14 中兴通讯股份有限公司 Terminal unlocking method and device based on eye print recognition
CN106446634A (en) * 2016-09-26 2017-02-22 维沃移动通信有限公司 Method for privacy protection of mobile terminal and mobile terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101446957A (en) * 2008-09-08 2009-06-03 南京Lg新港显示有限公司 Apparatus and method for browsing file with privacy protection function
CN103699825A (en) * 2012-09-27 2014-04-02 Lg电子株式会社 Display apparatus and method for operating the same
CN103077339A (en) * 2012-12-28 2013-05-01 广东欧珀移动通信有限公司 Data protection method and device
CN103678979A (en) * 2013-12-06 2014-03-26 三星电子(中国)研发中心 Method and device for intelligently hiding privacy data
CN104021331A (en) * 2014-06-18 2014-09-03 北京金和软件股份有限公司 Information processing method applied to electronic device with human face identification function
WO2016110061A1 (en) * 2015-01-06 2016-07-14 中兴通讯股份有限公司 Terminal unlocking method and device based on eye print recognition
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN105117628A (en) * 2015-07-30 2015-12-02 广东欧珀移动通信有限公司 File display control method, apparatus and corresponding mobile device in terminal
CN106446634A (en) * 2016-09-26 2017-02-22 维沃移动通信有限公司 Method for privacy protection of mobile terminal and mobile terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018188358A1 (en) * 2017-04-14 2018-10-18 上海爱优威软件开发有限公司 Secure communication method and system
CN109871674A (en) * 2017-12-04 2019-06-11 上海聚虹光电科技有限公司 VR or AR equipment subregion operating right management method
CN109344585A (en) * 2018-10-09 2019-02-15 广州三星通信技术研究有限公司 The method and apparatus of the access right of automatic setting electric terminal
CN111026351A (en) * 2019-12-06 2020-04-17 联想(北京)有限公司 Display control method and device and electronic equipment
CN111460537A (en) * 2020-03-30 2020-07-28 维沃移动通信有限公司 Method for hiding page content and electronic equipment
WO2021218889A1 (en) * 2020-04-27 2021-11-04 Wai Hung Lee Networking device with privacy protection

Similar Documents

Publication Publication Date Title
CN107256353A (en) Possesses the display methods of privacy protection function
CN105723374B (en) The safety long-distance to device credential of the voucher generated using equipment is modified
EP2650808A1 (en) Method for integrating account management function in input method software
CN108986806A (en) Sound control method and system based on Sounnd source direction
CN107657953A (en) Sound control method and system
CN109636401A (en) A kind of method of payment and system based on the micro- expression of user
CN107609914A (en) A kind of intelligent menu design method and system
CN107704849A (en) The face identification method and system of double verification function
CN109492412A (en) The encryption storage method and system of file
CN109472122A (en) A kind of multimedia messages reminding method and system
Marsh et al. Defining and investigating device comfort
CN107315681A (en) Application program self-starting test system, medium and method
CN107423585A (en) The concealed application method and system of a kind of application
CN107506721A (en) A kind of more method for collecting iris and system
CN107341378A (en) For the method for the access right for setting application
CN107085678A (en) A kind of display methods and its terminal
CN107786979A (en) A kind of multiple terminals shared communication method and system
CN107734474A (en) The applied statistical method and system of bound phone number
CN107404484A (en) A kind of method, apparatus and system of mechanical release authority
CN107018153A (en) A kind of safe login method
CN107944245A (en) A kind of eyeball tracking iris unlocking method and system
CN107220531A (en) A kind of information processing method of convenient login
CN206908680U (en) Intelligent terminal with secure log function
CN108010519A (en) A kind of information search method and system
CN107704843A (en) A kind of simple eye iris verification method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171017