CN109858274A - The method and apparatus that message is shown - Google Patents

The method and apparatus that message is shown Download PDF

Info

Publication number
CN109858274A
CN109858274A CN201811475846.5A CN201811475846A CN109858274A CN 109858274 A CN109858274 A CN 109858274A CN 201811475846 A CN201811475846 A CN 201811475846A CN 109858274 A CN109858274 A CN 109858274A
Authority
CN
China
Prior art keywords
message
environment
display
information
sensitive information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811475846.5A
Other languages
Chinese (zh)
Inventor
徐学东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Carbon Blue Network Technology Co Ltd
Original Assignee
Shanghai Carbon Blue Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Carbon Blue Network Technology Co Ltd filed Critical Shanghai Carbon Blue Network Technology Co Ltd
Priority to CN201811475846.5A priority Critical patent/CN109858274A/en
Publication of CN109858274A publication Critical patent/CN109858274A/en
Pending legal-status Critical Current

Links

Abstract

This application provides a kind of message display method and equipment, the program may determine that in message whether contain sensitive information after receiving message first, it in the display environment for judging first message whether is first environment when comprising sensitive information, the first environment can refer to that the sensitive information in message is easy the environment of leakage, such as display message equipment be in crowd concentrate occasion, there are other people near equipment etc., if first environment, after then encrypting to the message, and show encrypted message.Since the content of message will not be directly displayed in this programme when being easy the first environment of leakage in sensitive information, a possibility that sensitive information is seen by other people is thereby reduced, the leakage of sensitive information is effectively prevented.

Description

The method and apparatus that message is shown
Technical field
This application involves information technology field more particularly to a kind of method and apparatus that message is shown.
Background technique
With the continuous development of Internet technology, instant communication software provides many conveniences, people for the interaction of people Communication is more and more carried out in the way of instant communication software etc..In actual scene, it may may require that between user The sensitive information of some privacies of interaction, these sensitive informations are generally not desirable to be known by the third party.And in some specific fields It closes in (such as having other people on the scene), is still directly in a conventional manner, such as notification bar if receive the message comprising sensitive information Or dialog box mode directly shows message, is easy that other people is allowed to see these sensitive informations, so as to cause sensitivity letter The leakage of breath.
Apply for content
The first purpose of the application is to provide a kind of method and apparatus that message is shown.
To achieve the above object, some embodiments of the present application provide a kind of method that message is shown, this method comprises:
Judge whether the first message received includes sensitive information;
If judging whether the display environment of first message is first environment comprising sensitive information;
If the display environment of the first message is first environment, the first message is handled, second is obtained and disappears Breath;
Show the second message.
The embodiment of the present application also provides a kind of message display devices, wherein the equipment includes for storing computer journey The memory that sequence instructs and the processor for executing computer program instructions, wherein when the computer program instructions are by this When managing device execution, triggers the equipment and execute the message display method.
In addition, computer program instructions are stored thereon with the embodiment of the present application also provides a kind of computer-readable medium, The computer-readable instruction can be executed by processor to realize the message display method.
In the scheme that some embodiments of the present application provide, it may determine that in message whether wrap first after receiving message Contain sensitive information, in the display environment for judging first message whether has been first environment when comprising sensitive information, first ring Border can refer to that the sensitive information in message is easy the environment of leakage, such as the equipment of display message is in the field that crowd concentrates Close, there are other people near equipment etc., if first environment, then after being encrypted to the message, and show encrypted Message.Since the content of message will not be directly displayed in this programme when being easy the first environment of leakage in sensitive information, by This reduces a possibility that sensitive information is seen by other people, effectively prevents the leakage of sensitive information.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of process flow diagram for the method that message is shown provided by the embodiments of the present application;
Fig. 2 is the flow diagram for judge processing after receiving first message in the embodiment of the present application;
Fig. 3 is the flow diagram for judge processing after receiving first message in the application another kind embodiment;
Fig. 4 is the process flow for the whole process for carrying out encryption display to message in a kind of embodiment of the application and decrypting Figure;
Fig. 5 is a kind of structural schematic diagram of equipment for realizing identifying code input provided by the embodiments of the present application;
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
In a typical configuration of this application, terminal, the equipment of service network include one or more processors (CPU), input/output interface, network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media, can be by any side Method or technology realize that information stores.Information can be computer readable instructions, data structure, the module of program or other numbers According to.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM (CD- ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storages Equipment or any other non-transmission medium, can be used for storage can be accessed by a computing device information.
The embodiment of the present application provides a kind of method that message encryption is shown, this method can be easy in sensitive information Secrecy processing is carried out to the message comprising sensitive information when the first environment of leakage, sensitive information is thereby reduced and is seen by other people To a possibility that, effectively prevent the leakage of sensitive information.In actual scene, the equipment for executing this method can be all kinds of use The terminal having a display function such as family equipment, including but not limited to computer, mobile phone, tablet computer, smartwatch.
Fig. 1 shows the process flow for the method that a kind of message provided by the embodiments of the present application is shown, this method can wrap Include following processing step:
Step S101 judges whether the first message received includes sensitive information.
The first message can be the untreated origination message that equipment receives, such as user uses on mobile phone Some instant messaging apply the received message from other users.Do not pass through after receiving first message and Before display screen is shown to user, whether first determine whether wherein comprising sensitive information.Wherein, the sensitive information can be arbitrarily The privacy information that user is not intended to other users that can be directly viewable judges whether in actual scene comprising sensitive information Mode using machine learning or the modes such as keyword can be preset.
As a result, in some embodiments of the present application, when realizing the processing of this step S101, engineering can be first passed through The mode of habit constructs the identification model of sensitive information, is then identified using the identification model to what is received, judges institute State whether the first message received includes sensitive information.Wherein, the identification model can be in all kinds of machine learning algorithms For carrying out the mathematical model of decision judgement, each algorithm is corresponding with respective identification model, and the machine learning algorithm can To be arbitrarily to be suitable for algorithm of the scene, such as all kinds of decision Tree algorithms, neural network algorithm etc..
In addition, when realizing the processing of this step S101, also first obtaining user in other embodiments of the application and setting Then whether the fixed keyword about sensitive information includes sensitive letter according to the first message that keyword judgement receives Breath.For example, user can set the information such as keyword " password ", " pay code ", " amount of money ", " bill ", when what is received disappears When in breath including these keywords, that is, determine this message for sensitive information.
Step S102, if judging whether the display environment of first message is first environment comprising sensitive information.
When the display environment to first message judges, it can use all kinds of detection modes to detect first message Various information in the corresponding detection range of display environment, such as image information, audio-frequency information, thermoinduction information etc..In reality In scene, the display environment of first message can be judged using one of or several combination, it is current to determine Display environment whether be first environment.Wherein, the corresponding detection range of the display environment of first message can be according to actually answering It is set with the demand of scene, such as when obtaining image information by the camera of mobile phone, can be front camera just In the range of shooting angle is preset in face, when also acquiring audio-frequency information as passed through the microphone of mobile phone, can be the microphone can The range of radio reception.
When being judged using image information, the equipment for executing message display method, which needs to have, can acquire image letter The device of breath, such as camera etc. obtain the image in the corresponding detection range of display environment of first message by camera After information, can first testing result of image information acquisition, and determine that described first disappears according to first testing result The display environment of breath is first environment.Wherein, first testing result can be following any one or more combination:
In described image information include multiple facial images, i.e., before thering are multiple people to be in mobile phone screen when, it is believed that when Preceding display environment is dangerous, is easy that other people is allowed to see the sensitive information in first message.
It include the corresponding facial image of non-pre-set user in described image information, wherein pre-set user can be to be set in advance Fixed trust user, for example, user, user good friend etc. conversely, the non-pre-set user is to remove the default use Other users except family, such as other strangers except user, good friend etc..In actual scene, people can be passed through Face identifies the technology compared to determine identity corresponding to facial image, to judge that facial image included in image information is It is no to belong to non-pre-set user.For example, when having other strangers before mobile phone screen, then it is assumed that current display environment is uneasy Entirely, it is easy that stranger is allowed to see the sensitive information in first message, so as to cause sensitive information leakage.
The corresponding facial image of multiple facial images or non-pre-set user for including in described image information is towards described The display position of one message determines the direction of facial image in image information by image recognition technology, if corresponding face figure The direction of picture is not towards the display position (display screen of such as mobile phone) of first message, it may be considered that will not be to information security band It influences, it is on the contrary, then it is assumed that current display environment is dangerous, is easy that other people is allowed to see the sensitive information in first message.
The position for the corresponding facial image of multiple facial images or non-pre-set user for including in described image information and institute The display position for stating first message is less than pre-determined distance.It is similar with the detection of direction, due to being more than certain preset value when distance When, human eye will be difficult to see the content shown on screen clearly, therefore, the display of the position of corresponding facial image and the first message When position is more than or equal to pre-determined distance, it is believed that information security will not be affected, it is on the contrary, then it is assumed that current display ring Border is dangerous, is easy that other people is allowed to see the sensitive information in first message.
Such as Fig. 2 shows receive to carry out judging that the process of processing is shown after first message in a kind of embodiment of the application It is intended to, includes the following steps:
Step S201 after receiving message, judges whether to directly display this comprising sensitive information if not including and disappear Breath, without carrying out other judgement processing.
Step S202 judges whether there is more people before the equipment of display message when comprising sensitive information.Concrete mode can To obtain the image information on equipment periphery by the camera of equipment, facial image is identified from described image information, if comprising Multiple facial images can then determine more people before the equipment of display message, so that it is determined that the display environment of first message is First environment;Conversely, if without more people display message equipment before, can be with the judgement of further progress step S203.
Step S203 judges whether the facial image before equipment is user, if it is not, the then display of first message Environment is first environment.Two combinations in aforementioned first testing result are combined in the scheme of the present embodiment as a result, i.e., first Judge whether then to judge whether comprising multiple facial images in described image information in described image information comprising non-default use The corresponding facial image in family, this completes the judgements of the display environment of first message.
Furthermore Fig. 3 shows and receives the process that first message later judge processing in the application another kind embodiment Schematic diagram includes the following steps:
Step S301 after receiving message, judges whether to directly display this comprising sensitive information if not including and disappear Breath, without carrying out other judgement processing.
Step S302 judges whether there is more people before the equipment of display message when comprising sensitive information, if it is, after It is continuous to execute step S303.
Whether step S303 judges the face of more people towards the position of device display screen.In actual scene, by then passing through Camera shoots face, and the relative position of camera and display screen is fixed, therefore can be believed based on image Being closed towards relationship, and then in the direction for calculating facial image and display screen between the facial image and cam lens in breath System.If there is the position of facial orientation display screen, subsequent step S304 can be further executed.
Step S304 judges that facial image at a distance from display screen, if being less than preset distance, continues step S305.
Whether step S305, judgement meet in the facial image of aforementioned direction and distance comprising other people (i.e. non-trusted use Family) facial image, if determining the display environment of first message for first environment comprising if.Here, those skilled in the art answer It can understand that the concrete mode of above-mentioned judgement first environment is only for example, other existing or other ways for being likely to occur from now on are such as It is applicable to the present invention, should also be included within the scope of protection of the present invention, and is incorporated herein by reference.Based on this, Different Rule of judgment can be combined according to the demand of actual scene, to reach the experience of the optimal user under different scenes.
And when being judged using audio-frequency information, the equipment for executing message display method, which needs to have, can acquire audio The device of information, such as microphone etc. obtain the sound in the corresponding detection range of display environment of first message by microphone After frequency information, the second testing result is obtained according to the audio-frequency information, and determine described first according to second testing result The display environment of message is first environment.
Wherein, it includes the corresponding vocal print feature of multiple users in the audio-frequency information that second testing result, which can be, Such as by the vocal print feature in identification audio-frequency information, discovery contains the vocal print feature of multiple users, it is possible thereby to which determination is worked as In preceding display environment other than user, other people are necessarily further comprised, it is thus possible to the leakage of sensitive information is caused, It thereby determines that currently as first environment.Alternatively, second testing result is also possible in the audio-frequency information comprising non-default The corresponding vocal print feature of user, it is similar with facial image, since the vocal print feature has preferable identification, can use In the identity for determining user, it is possible thereby to compared by the identification of vocal print feature to determine identity corresponding to the vocal print feature, To realize the judgement of display environment.
When being judged using thermoinduction information, the equipment for executing message display method, which needs to have, can acquire thermal sensation The device of information is answered, such as infrared inductor etc. obtains the corresponding detection of display environment of first message by infrared inductor After thermoinduction information in range, judged whether in detection range according to thermoinduction information with the presence or absence of more people, thus to the The display environment of one message is judged, when there are more people, determines the display environment of first message for first environment.
Step S103 handles the first message, obtains if the display environment of the first message is first environment Take second message.According to different display demands, the processing of different modes can be carried out to first message, to obtain corresponding shape The second message of formula.For example, it is desired to pre-set hiding prompting message can be transferred when hiding first message, this is hidden Prompting message is hidden as second message, such as first message are as follows: " password is 123456 ", being hidden at this time to it can after handling To show corresponding hiding prompting message: " former message has been hidden, and display please be clicked ".Alternatively, first message can also be encrypted, by This can be substituted using corresponding Encryption Algorithm or directly using other preset characters, be generated about the close of first message Text, the ciphertext are second message, by taking first message " password is 123456 " as an example, can be shown after it is encrypted Show corresponding ciphertext " * * * * * * * * * ".Certainly, it in actual scene, can choose complete to the entire message comprising sensitive information Portion is encrypted, and can also only be encrypted to the part of sensitive information, such as first message " password is 123456 ", can Only to encrypt to the particular content of password, following ciphertext is obtained: " password is * * * * * * ".
Step S104 shows the second message, thus without when being easy the first environment of leakage in sensitive information The content for directly displaying message, thereby reduces a possibility that sensitive information is seen by other people, effectively prevents sensitive information Leakage.
User after viewing second message, if desired check it is untreated before first message, can be with Corresponding operation is executed, so that the display of the available user's input of equipment triggers information, and is getting the display touching After photos and sending messages, the first message is obtained according to the second message, and show the first message.Wherein, the display touching Photos and sending messages can be the trigger action from user, such as can be and click specific button, the specific gesture of input etc..
In order to avoid other users can check first message by clicking specific button or the specific gesture of input, It may include verification information in the display triggering information, thus needed in the trigger action of user comprising validation information Operation, such as input password etc..But if the input frame for requiring pop-up password when needing to show first message every time allows use Family inputs password, can greatly increase the use cost of user, user experience is caused to reduce.Therefore, the display triggers information It can be user and information triggered based on the display that physiological characteristic information inputs, so that the verifying for including in display triggering information Information is the physiological characteristic information, such as fingerprint, vocal print, facial image feature etc. of user.Thus, it is possible to utilize taking the photograph in equipment As the realization fast verification such as head, microphone, fingerprint identification device, convenience degree when verifying is substantially increased, in protection user While privacy, customer using cost is reduced, improves user experience.
Since the second message can use different forms, such as it can be the corresponding ciphertext of first message, it can also To be the corresponding hiding prompting message of first message, therefore the first message is being obtained according to the second message, and show When the first message, if the second message is the corresponding ciphertext of the first message, place is decrypted to the ciphertext Reason, obtains the first message, and show the first message;It is hidden if the second message is that the first message is corresponding Prompting message then obtains the corresponding first message of the hiding prompting message, and shows the first message.For example, when display Be to hide prompting message: when " former message has been hidden, and display please be clicked ", user can click the hiding prompting message, at this time Camera starting can be triggered, the facial image of user is obtained, recognition of face is carried out and completes verifying, if face verification passes through, Equipment transfers the corresponding first message of the hiding prompting message of this " password is 123456 ", and is shown.
In other embodiments of the application, in addition to actively executing corresponding operation when needing to check by user, It triggers equipment to show except first message, the environment of surrounding can also be detected automatically by equipment to realize the display of first message. Equipment is shown after second message, it can be determined that whether the display environment of first message is first environment, can be in actual scene Once judged every preset duration, such as 5s, 10s etc., can also be by user's actively triggering judgement, such as get use After the display triggering information at family.Wherein, the mode of this judgement can use all kinds of detection modes equally to detect first and disappear Various information in the corresponding detection range of the display environment of breath, such as image information, audio-frequency information, thermoinduction information etc., this Place repeats no more.If the result judged is no, then it represents that current display environment not will cause the leakage of sensitive information, Ke Yigen The first message is obtained according to the second message, and shows the first message.
Fig. 4 shows the processing stream for carrying out the whole process of encryption display and decryption in a kind of embodiment of the application to message Cheng Tu, comprising the following steps:
Step S401 after receiving message, judges whether comprising sensitive information.It can be direct if not including sensitive information Display.If needing to be implemented step S402 comprising sensitive information.
Step S402 needs to handle the message comprising sensitive information, such as added when being in first environment It is close, to show the corresponding ciphertext of this message, only to prevent other irrelevant personnel from seeing the message comprising sensitive information.
Step S403, when user needs to show the corresponding message of ciphertext, using recognition of face or the side of fingerprint recognition Formula is verified, if unverified, informs that user decrypts failure.If being proved to be successful, S404 is thened follow the steps.
Step S404 is decrypted ciphertext using corresponding mode according to the mode of encryption, obtains the original of message Text.
The original text of message is shown to user by step S405.
Based on the same inventive concept, a kind of message display device is additionally provided in the embodiment of the present application, the equipment is corresponding Method be message display method in previous embodiment, and its principle solved the problems, such as is similar to this method.The equipment packet Include the memory for storing computer program instructions and the processor for executing computer program instructions, wherein when the meter When calculation machine program instruction is executed by the processor, triggers the equipment and execute message display method above-mentioned.Its specific implementation can To include but is not limited to the terminal with touch screen such as computer, mobile phone, tablet computer, smartwatch.
Fig. 5 shows a kind of structure of the equipment for the method and/or technology scheme being adapted to carry out in the embodiment of the present application, The equipment 500 include central processing unit (CPU, Central Processing Unit) 501, can according to be stored in only It reads the program in memory (ROM, Read Only Memory) 502 or is loaded into random access storage from storage section 508 Program in device (RAM, Random Access Memory) 503 and execute various movements appropriate and processing.In RAM 503 In, also it is stored with various programs and data needed for system operatio.CPU 501, ROM 502 and RAM503 pass through bus 504 It is connected with each other.Input/output (I/O, Input/Output) interface 505 is also connected to bus 504.
I/O interface 505 is connected to lower component: including the defeated of keyboard, mouse, touch screen, microphone, infrared sensor etc. Enter part 506;Including such as cathode-ray tube (CRT, Cathode Ray Tube), liquid crystal display (LCD, Liquid Crystal Display), the output par, c 507 of light-emitting diode display, OLED display etc. and loudspeaker etc.;Including hard disk, light The storage section 508 of the one or more computer-readable medium such as disk, disk, semiconductor memory;And including such as LAN The communications portion 509 of the network interface card of (local area network, Local Area Network) card, modem etc..Communications portion 509 execute communication process via the network of such as internet.
Particularly, the method in the embodiment of the present application and/or embodiment may be implemented as computer software programs.Example Such as, embodiment of the disclosure includes a kind of computer program product comprising carries computer on a computer-readable medium Program, the computer program include the program code for method shown in execution flow chart.It is central in the computer program When processing unit (CPU) 501 executes, the above-mentioned function of limiting in the present processes is executed.
It should be noted that computer-readable medium described herein can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer-readable medium for example can be --- but it is unlimited In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or The above-mentioned any appropriate combination of person.In this application, computer-readable medium, which can be, any includes or storage program has Shape medium, the program can be commanded execution system, device or device use or in connection.
And in this application, computer-readable signal media may include passing in a base band or as carrier wave a part The data-signal broadcast, wherein carrying computer-readable program code.The data-signal of this propagation can use a variety of shapes Formula, including but not limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media may be used also To be any computer-readable medium other than computer readable storage medium, which can send, propagate Either transmission is for by the use of instruction execution system, device or device or program in connection.It is computer-readable The program code for including on medium can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. Deng or above-mentioned any appropriate combination.
The calculating of the operation for executing the application can be write with one or more programming languages or combinations thereof Machine program code, described program design language include object oriented program language-such as Java, Smalltalk, C+ +, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package, Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part. In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN) Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service Provider is connected by internet).
Flowchart or block diagram in attached drawing shows the equipment according to the various embodiments of the application, method and computer program The architecture, function and operation in the cards of product.In this regard, each box in flowchart or block diagram can represent A part of a part of one module, program segment or code, the module, program segment or code is used for comprising one or more The executable instruction of logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box Function can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated actually may be used To be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that , the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with executing The dedicated systems for hardware of defined functions or operations realizes, or can use specialized hardware and computer instruction Combination is to realize.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be Included in equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying equipment.Above-mentioned calculating Machine readable medium carries one or more computer-readable instruction, the computer-readable instruction can be executed by processor with Realize the method and/or technology scheme of multiple embodiments of aforementioned the application.
In conclusion equipment can provide a user one for inputting in the scheme that some embodiments of the present application provide Then the dummy keyboard of preset characters obtains user and presses the input operation of the first character in the dummy keyboard, and is based on The input operates corresponding first character and inserts identifying code in form page, due to user by the dummy keyboard of the offer only The preset characters that can be inputted, forbidden character will not inadvertently be inputted by ensuring that, be avoided because inputting forbidden character Caused by identifying code mistake, while input when be pressed in the dummy keyboard based on user the first character input behaviour Make, compared to the input operation pressed and lifted, response speed faster, can be improved the efficiency of identifying code input.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In some embodiments In, the software program of the application can be executed by processor to realize above step or function.Similarly, the software of the application Program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory, magnetic or CD-ROM driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, for example, As the circuit cooperated with processor thereby executing each step or function.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table Show title, and does not indicate any particular order.

Claims (12)

1. a kind of method that message is shown, wherein this method comprises:
Judge whether the first message received includes sensitive information;
If judging whether the display environment of first message is first environment comprising sensitive information;
If the display environment of the first message is first environment, the first message is handled, obtains second message;
Show the second message.
2. according to the method described in claim 1, wherein, judging whether the first message received includes sensitive information, comprising:
The identification model of sensitive information is constructed by way of machine learning;
It is identified using the identification model to what is received, whether the first message received described in judgement includes sensitive letter Breath.
3. according to the method described in claim 1, wherein, judging whether the first message received includes sensitive information, comprising:
Obtain the keyword set by user about sensitive information;
It whether include sensitive information according to the first message that keyword judgement receives.
4. according to the method described in claim 1, wherein, judging whether the display environment of first message is first environment, comprising:
According to image information, audio-frequency information and/or the thermoinduction information in the corresponding detection range of the display environment of first message, Whether the display environment for judging the first message is first environment.
5. according to the method described in claim 4, wherein, according to the figure in the corresponding detection range of the display environment of first message As information judges whether the display environment of the first message is first environment, comprising:
According to the first testing result of image information acquisition in the corresponding detection range of the display environment of first message, and according to institute It states the first testing result and determines that the display environment of the first message is first environment, wherein first testing result includes Any one or more combination below:
It include multiple facial images in described image information;
It include the corresponding facial image of non-pre-set user in described image information;
The corresponding facial image of multiple facial images or non-pre-set user for including in described image information disappears towards described first The display position of breath;
The position for the corresponding facial image of multiple facial images or non-pre-set user for including in described image information and described the The display position of one message is less than pre-determined distance.
6. according to the method described in claim 4, wherein, according to the sound in the corresponding detection range of the display environment of first message Frequency information judges whether the display environment of the first message is first environment, comprising:
The second testing result is obtained according to the audio-frequency information in the corresponding detection range of the display environment of first message, and according to institute It states the second testing result and determines that the display environment of the first message is first environment, wherein second testing result includes Following any one:
It include the corresponding vocal print feature of multiple users in the audio-frequency information;
It include the corresponding vocal print feature of non-pre-set user in the audio-frequency information.
7. according to the method described in claim 1, wherein, the second message is the corresponding ciphertext of the first message or institute State the corresponding hiding prompting message of first message.
8. method according to any one of claim 1 to 7, wherein after showing the second message, further includes:
The display for obtaining user's input triggers information;
After getting display triggering information, the first message is obtained according to the second message, and shows described the One message.
9. according to the method described in claim 8, wherein, the display for obtaining user's input triggers information, comprising:
It obtains user and information is triggered based on the display that physiological characteristic information inputs.
10. method according to any one of claim 1 to 7, wherein after showing the second message, further includes:
Whether the display environment for judging first message is first environment;
If it has not, obtaining the first message according to the second message, and show the first message.
11. a kind of message display device, wherein the equipment includes memory for storing computer program instructions and for holding The processor of row computer program instructions, wherein when the computer program instructions are executed by the processor, trigger the equipment Method described in any one of perform claim requirement 1 to 10.
12. a kind of computer-readable medium, is stored thereon with computer program instructions, the computer-readable instruction can be processed Device is executed to realize the method as described in any one of claims 1 to 10.
CN201811475846.5A 2018-12-04 2018-12-04 The method and apparatus that message is shown Pending CN109858274A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811475846.5A CN109858274A (en) 2018-12-04 2018-12-04 The method and apparatus that message is shown

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811475846.5A CN109858274A (en) 2018-12-04 2018-12-04 The method and apparatus that message is shown

Publications (1)

Publication Number Publication Date
CN109858274A true CN109858274A (en) 2019-06-07

Family

ID=66890638

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811475846.5A Pending CN109858274A (en) 2018-12-04 2018-12-04 The method and apparatus that message is shown

Country Status (1)

Country Link
CN (1) CN109858274A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291396A (en) * 2020-02-06 2020-06-16 北京字节跳动网络技术有限公司 Form data processing method and device, electronic equipment and storage medium
CN111859900A (en) * 2020-07-14 2020-10-30 维沃移动通信有限公司 Message display method and device and electronic equipment
CN111935349A (en) * 2020-08-07 2020-11-13 闻泰通讯股份有限公司 Terminal-based information display method and device, terminal and storage medium
CN112104785A (en) * 2020-09-18 2020-12-18 维沃移动通信有限公司 Information display method and device
WO2021217899A1 (en) * 2020-04-30 2021-11-04 深圳壹账通智能科技有限公司 Method, apparatus, and device for encrypting display information, and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014210126A (en) * 2013-04-22 2014-11-13 任天堂株式会社 Information processing system, information processing devices, information processing program, and information processing method
CN104837113A (en) * 2015-03-31 2015-08-12 努比亚技术有限公司 Privacy information display method and terminal
CN105303091A (en) * 2015-10-23 2016-02-03 广东小天才科技有限公司 Eyeball tracking technology based privacy protection method and system
CN106355068A (en) * 2016-08-31 2017-01-25 维沃移动通信有限公司 Individual security information displaying method and device
CN106548081A (en) * 2016-10-28 2017-03-29 努比亚技术有限公司 A kind of end message display packing and device
CN106960147A (en) * 2017-04-11 2017-07-18 广东小天才科技有限公司 A kind of method for protecting privacy and device, user equipment
CN107992730A (en) * 2017-11-28 2018-05-04 宇龙计算机通信科技(深圳)有限公司 A kind of screen message guard method and device
CN108090382A (en) * 2017-12-29 2018-05-29 阿里巴巴集团控股有限公司 Show the method and apparatus of sensitive information
CN108111667A (en) * 2016-11-25 2018-06-01 北京搜狗科技发展有限公司 A kind of communication information encryption method, device and electronic equipment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014210126A (en) * 2013-04-22 2014-11-13 任天堂株式会社 Information processing system, information processing devices, information processing program, and information processing method
CN104837113A (en) * 2015-03-31 2015-08-12 努比亚技术有限公司 Privacy information display method and terminal
CN105303091A (en) * 2015-10-23 2016-02-03 广东小天才科技有限公司 Eyeball tracking technology based privacy protection method and system
CN106355068A (en) * 2016-08-31 2017-01-25 维沃移动通信有限公司 Individual security information displaying method and device
CN106548081A (en) * 2016-10-28 2017-03-29 努比亚技术有限公司 A kind of end message display packing and device
CN108111667A (en) * 2016-11-25 2018-06-01 北京搜狗科技发展有限公司 A kind of communication information encryption method, device and electronic equipment
CN106960147A (en) * 2017-04-11 2017-07-18 广东小天才科技有限公司 A kind of method for protecting privacy and device, user equipment
CN107992730A (en) * 2017-11-28 2018-05-04 宇龙计算机通信科技(深圳)有限公司 A kind of screen message guard method and device
CN108090382A (en) * 2017-12-29 2018-05-29 阿里巴巴集团控股有限公司 Show the method and apparatus of sensitive information

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291396A (en) * 2020-02-06 2020-06-16 北京字节跳动网络技术有限公司 Form data processing method and device, electronic equipment and storage medium
CN111291396B (en) * 2020-02-06 2023-07-14 北京字节跳动网络技术有限公司 Form data processing method and device, electronic equipment and storage medium
WO2021217899A1 (en) * 2020-04-30 2021-11-04 深圳壹账通智能科技有限公司 Method, apparatus, and device for encrypting display information, and storage medium
CN111859900A (en) * 2020-07-14 2020-10-30 维沃移动通信有限公司 Message display method and device and electronic equipment
CN111859900B (en) * 2020-07-14 2023-09-08 维沃移动通信有限公司 Message display method and device and electronic equipment
CN111935349A (en) * 2020-08-07 2020-11-13 闻泰通讯股份有限公司 Terminal-based information display method and device, terminal and storage medium
CN112104785A (en) * 2020-09-18 2020-12-18 维沃移动通信有限公司 Information display method and device
CN112104785B (en) * 2020-09-18 2021-08-03 维沃移动通信有限公司 Information display method and device

Similar Documents

Publication Publication Date Title
CN109858274A (en) The method and apparatus that message is shown
US10607035B2 (en) Method of displaying content on a screen of an electronic processing device
US10467387B2 (en) Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content
CN105981398B (en) Content security method and electronic device for providing content security function
CN112287372B (en) Method and apparatus for protecting clipboard privacy
CN105281907B (en) Encrypted data processing method and device
CN108880791A (en) Cryptographic key protection method, terminal and computer readable storage medium
KR102474243B1 (en) A Method and Apparatus For Providing a Secure Mode for User Device
US11943256B2 (en) Link detection method and apparatus, electronic device, and storage medium
CN106453052A (en) Message interaction method and apparatus thereof
TWI761843B (en) Access control method and device, electronic device and storage medium
JP6163610B2 (en) Forgery prevention verification method, apparatus, program, and recording medium
KR101768813B1 (en) System for providing remote consulting service and security solution thereof
CN110765434A (en) Identity authentication method and device, electronic equipment and storage medium
KR102144509B1 (en) Proximity communication method and apparatus
CN111368232A (en) Password sharing reflux method and device, electronic equipment and storage medium
CN106648583A (en) Information processing method and terminal
US20150319617A1 (en) Methods and devices for providing information in voice service
CN111177770B (en) Sensitive information protection method, mobile equipment and storage device
EP3486828B1 (en) Electronic device including display and method of encrypting information
CN116756750A (en) Medical sensitive data acquisition desensitization method
CN114124462B (en) Verification code transmission method and device, electronic equipment and storage medium
CN108696355B (en) Method and system for preventing head portrait of user from being embezzled
US20210083874A1 (en) Blockchain Token Holding Social Event History
US20220350928A1 (en) Information processing system, information processing method, program, and user interface

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190607

RJ01 Rejection of invention patent application after publication