CN109858274A - The method and apparatus that message is shown - Google Patents
The method and apparatus that message is shown Download PDFInfo
- Publication number
- CN109858274A CN109858274A CN201811475846.5A CN201811475846A CN109858274A CN 109858274 A CN109858274 A CN 109858274A CN 201811475846 A CN201811475846 A CN 201811475846A CN 109858274 A CN109858274 A CN 109858274A
- Authority
- CN
- China
- Prior art keywords
- message
- environment
- display
- information
- sensitive information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
This application provides a kind of message display method and equipment, the program may determine that in message whether contain sensitive information after receiving message first, it in the display environment for judging first message whether is first environment when comprising sensitive information, the first environment can refer to that the sensitive information in message is easy the environment of leakage, such as display message equipment be in crowd concentrate occasion, there are other people near equipment etc., if first environment, after then encrypting to the message, and show encrypted message.Since the content of message will not be directly displayed in this programme when being easy the first environment of leakage in sensitive information, a possibility that sensitive information is seen by other people is thereby reduced, the leakage of sensitive information is effectively prevented.
Description
Technical field
This application involves information technology field more particularly to a kind of method and apparatus that message is shown.
Background technique
With the continuous development of Internet technology, instant communication software provides many conveniences, people for the interaction of people
Communication is more and more carried out in the way of instant communication software etc..In actual scene, it may may require that between user
The sensitive information of some privacies of interaction, these sensitive informations are generally not desirable to be known by the third party.And in some specific fields
It closes in (such as having other people on the scene), is still directly in a conventional manner, such as notification bar if receive the message comprising sensitive information
Or dialog box mode directly shows message, is easy that other people is allowed to see these sensitive informations, so as to cause sensitivity letter
The leakage of breath.
Apply for content
The first purpose of the application is to provide a kind of method and apparatus that message is shown.
To achieve the above object, some embodiments of the present application provide a kind of method that message is shown, this method comprises:
Judge whether the first message received includes sensitive information;
If judging whether the display environment of first message is first environment comprising sensitive information;
If the display environment of the first message is first environment, the first message is handled, second is obtained and disappears
Breath;
Show the second message.
The embodiment of the present application also provides a kind of message display devices, wherein the equipment includes for storing computer journey
The memory that sequence instructs and the processor for executing computer program instructions, wherein when the computer program instructions are by this
When managing device execution, triggers the equipment and execute the message display method.
In addition, computer program instructions are stored thereon with the embodiment of the present application also provides a kind of computer-readable medium,
The computer-readable instruction can be executed by processor to realize the message display method.
In the scheme that some embodiments of the present application provide, it may determine that in message whether wrap first after receiving message
Contain sensitive information, in the display environment for judging first message whether has been first environment when comprising sensitive information, first ring
Border can refer to that the sensitive information in message is easy the environment of leakage, such as the equipment of display message is in the field that crowd concentrates
Close, there are other people near equipment etc., if first environment, then after being encrypted to the message, and show encrypted
Message.Since the content of message will not be directly displayed in this programme when being easy the first environment of leakage in sensitive information, by
This reduces a possibility that sensitive information is seen by other people, effectively prevents the leakage of sensitive information.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of process flow diagram for the method that message is shown provided by the embodiments of the present application;
Fig. 2 is the flow diagram for judge processing after receiving first message in the embodiment of the present application;
Fig. 3 is the flow diagram for judge processing after receiving first message in the application another kind embodiment;
Fig. 4 is the process flow for the whole process for carrying out encryption display to message in a kind of embodiment of the application and decrypting
Figure;
Fig. 5 is a kind of structural schematic diagram of equipment for realizing identifying code input provided by the embodiments of the present application;
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
In a typical configuration of this application, terminal, the equipment of service network include one or more processors
(CPU), input/output interface, network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media, can be by any side
Method or technology realize that information stores.Information can be computer readable instructions, data structure, the module of program or other numbers
According to.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM (CD-
ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storages
Equipment or any other non-transmission medium, can be used for storage can be accessed by a computing device information.
The embodiment of the present application provides a kind of method that message encryption is shown, this method can be easy in sensitive information
Secrecy processing is carried out to the message comprising sensitive information when the first environment of leakage, sensitive information is thereby reduced and is seen by other people
To a possibility that, effectively prevent the leakage of sensitive information.In actual scene, the equipment for executing this method can be all kinds of use
The terminal having a display function such as family equipment, including but not limited to computer, mobile phone, tablet computer, smartwatch.
Fig. 1 shows the process flow for the method that a kind of message provided by the embodiments of the present application is shown, this method can wrap
Include following processing step:
Step S101 judges whether the first message received includes sensitive information.
The first message can be the untreated origination message that equipment receives, such as user uses on mobile phone
Some instant messaging apply the received message from other users.Do not pass through after receiving first message and
Before display screen is shown to user, whether first determine whether wherein comprising sensitive information.Wherein, the sensitive information can be arbitrarily
The privacy information that user is not intended to other users that can be directly viewable judges whether in actual scene comprising sensitive information
Mode using machine learning or the modes such as keyword can be preset.
As a result, in some embodiments of the present application, when realizing the processing of this step S101, engineering can be first passed through
The mode of habit constructs the identification model of sensitive information, is then identified using the identification model to what is received, judges institute
State whether the first message received includes sensitive information.Wherein, the identification model can be in all kinds of machine learning algorithms
For carrying out the mathematical model of decision judgement, each algorithm is corresponding with respective identification model, and the machine learning algorithm can
To be arbitrarily to be suitable for algorithm of the scene, such as all kinds of decision Tree algorithms, neural network algorithm etc..
In addition, when realizing the processing of this step S101, also first obtaining user in other embodiments of the application and setting
Then whether the fixed keyword about sensitive information includes sensitive letter according to the first message that keyword judgement receives
Breath.For example, user can set the information such as keyword " password ", " pay code ", " amount of money ", " bill ", when what is received disappears
When in breath including these keywords, that is, determine this message for sensitive information.
Step S102, if judging whether the display environment of first message is first environment comprising sensitive information.
When the display environment to first message judges, it can use all kinds of detection modes to detect first message
Various information in the corresponding detection range of display environment, such as image information, audio-frequency information, thermoinduction information etc..In reality
In scene, the display environment of first message can be judged using one of or several combination, it is current to determine
Display environment whether be first environment.Wherein, the corresponding detection range of the display environment of first message can be according to actually answering
It is set with the demand of scene, such as when obtaining image information by the camera of mobile phone, can be front camera just
In the range of shooting angle is preset in face, when also acquiring audio-frequency information as passed through the microphone of mobile phone, can be the microphone can
The range of radio reception.
When being judged using image information, the equipment for executing message display method, which needs to have, can acquire image letter
The device of breath, such as camera etc. obtain the image in the corresponding detection range of display environment of first message by camera
After information, can first testing result of image information acquisition, and determine that described first disappears according to first testing result
The display environment of breath is first environment.Wherein, first testing result can be following any one or more combination:
In described image information include multiple facial images, i.e., before thering are multiple people to be in mobile phone screen when, it is believed that when
Preceding display environment is dangerous, is easy that other people is allowed to see the sensitive information in first message.
It include the corresponding facial image of non-pre-set user in described image information, wherein pre-set user can be to be set in advance
Fixed trust user, for example, user, user good friend etc. conversely, the non-pre-set user is to remove the default use
Other users except family, such as other strangers except user, good friend etc..In actual scene, people can be passed through
Face identifies the technology compared to determine identity corresponding to facial image, to judge that facial image included in image information is
It is no to belong to non-pre-set user.For example, when having other strangers before mobile phone screen, then it is assumed that current display environment is uneasy
Entirely, it is easy that stranger is allowed to see the sensitive information in first message, so as to cause sensitive information leakage.
The corresponding facial image of multiple facial images or non-pre-set user for including in described image information is towards described
The display position of one message determines the direction of facial image in image information by image recognition technology, if corresponding face figure
The direction of picture is not towards the display position (display screen of such as mobile phone) of first message, it may be considered that will not be to information security band
It influences, it is on the contrary, then it is assumed that current display environment is dangerous, is easy that other people is allowed to see the sensitive information in first message.
The position for the corresponding facial image of multiple facial images or non-pre-set user for including in described image information and institute
The display position for stating first message is less than pre-determined distance.It is similar with the detection of direction, due to being more than certain preset value when distance
When, human eye will be difficult to see the content shown on screen clearly, therefore, the display of the position of corresponding facial image and the first message
When position is more than or equal to pre-determined distance, it is believed that information security will not be affected, it is on the contrary, then it is assumed that current display ring
Border is dangerous, is easy that other people is allowed to see the sensitive information in first message.
Such as Fig. 2 shows receive to carry out judging that the process of processing is shown after first message in a kind of embodiment of the application
It is intended to, includes the following steps:
Step S201 after receiving message, judges whether to directly display this comprising sensitive information if not including and disappear
Breath, without carrying out other judgement processing.
Step S202 judges whether there is more people before the equipment of display message when comprising sensitive information.Concrete mode can
To obtain the image information on equipment periphery by the camera of equipment, facial image is identified from described image information, if comprising
Multiple facial images can then determine more people before the equipment of display message, so that it is determined that the display environment of first message is
First environment;Conversely, if without more people display message equipment before, can be with the judgement of further progress step S203.
Step S203 judges whether the facial image before equipment is user, if it is not, the then display of first message
Environment is first environment.Two combinations in aforementioned first testing result are combined in the scheme of the present embodiment as a result, i.e., first
Judge whether then to judge whether comprising multiple facial images in described image information in described image information comprising non-default use
The corresponding facial image in family, this completes the judgements of the display environment of first message.
Furthermore Fig. 3 shows and receives the process that first message later judge processing in the application another kind embodiment
Schematic diagram includes the following steps:
Step S301 after receiving message, judges whether to directly display this comprising sensitive information if not including and disappear
Breath, without carrying out other judgement processing.
Step S302 judges whether there is more people before the equipment of display message when comprising sensitive information, if it is, after
It is continuous to execute step S303.
Whether step S303 judges the face of more people towards the position of device display screen.In actual scene, by then passing through
Camera shoots face, and the relative position of camera and display screen is fixed, therefore can be believed based on image
Being closed towards relationship, and then in the direction for calculating facial image and display screen between the facial image and cam lens in breath
System.If there is the position of facial orientation display screen, subsequent step S304 can be further executed.
Step S304 judges that facial image at a distance from display screen, if being less than preset distance, continues step S305.
Whether step S305, judgement meet in the facial image of aforementioned direction and distance comprising other people (i.e. non-trusted use
Family) facial image, if determining the display environment of first message for first environment comprising if.Here, those skilled in the art answer
It can understand that the concrete mode of above-mentioned judgement first environment is only for example, other existing or other ways for being likely to occur from now on are such as
It is applicable to the present invention, should also be included within the scope of protection of the present invention, and is incorporated herein by reference.Based on this,
Different Rule of judgment can be combined according to the demand of actual scene, to reach the experience of the optimal user under different scenes.
And when being judged using audio-frequency information, the equipment for executing message display method, which needs to have, can acquire audio
The device of information, such as microphone etc. obtain the sound in the corresponding detection range of display environment of first message by microphone
After frequency information, the second testing result is obtained according to the audio-frequency information, and determine described first according to second testing result
The display environment of message is first environment.
Wherein, it includes the corresponding vocal print feature of multiple users in the audio-frequency information that second testing result, which can be,
Such as by the vocal print feature in identification audio-frequency information, discovery contains the vocal print feature of multiple users, it is possible thereby to which determination is worked as
In preceding display environment other than user, other people are necessarily further comprised, it is thus possible to the leakage of sensitive information is caused,
It thereby determines that currently as first environment.Alternatively, second testing result is also possible in the audio-frequency information comprising non-default
The corresponding vocal print feature of user, it is similar with facial image, since the vocal print feature has preferable identification, can use
In the identity for determining user, it is possible thereby to compared by the identification of vocal print feature to determine identity corresponding to the vocal print feature,
To realize the judgement of display environment.
When being judged using thermoinduction information, the equipment for executing message display method, which needs to have, can acquire thermal sensation
The device of information is answered, such as infrared inductor etc. obtains the corresponding detection of display environment of first message by infrared inductor
After thermoinduction information in range, judged whether in detection range according to thermoinduction information with the presence or absence of more people, thus to the
The display environment of one message is judged, when there are more people, determines the display environment of first message for first environment.
Step S103 handles the first message, obtains if the display environment of the first message is first environment
Take second message.According to different display demands, the processing of different modes can be carried out to first message, to obtain corresponding shape
The second message of formula.For example, it is desired to pre-set hiding prompting message can be transferred when hiding first message, this is hidden
Prompting message is hidden as second message, such as first message are as follows: " password is 123456 ", being hidden at this time to it can after handling
To show corresponding hiding prompting message: " former message has been hidden, and display please be clicked ".Alternatively, first message can also be encrypted, by
This can be substituted using corresponding Encryption Algorithm or directly using other preset characters, be generated about the close of first message
Text, the ciphertext are second message, by taking first message " password is 123456 " as an example, can be shown after it is encrypted
Show corresponding ciphertext " * * * * * * * * * ".Certainly, it in actual scene, can choose complete to the entire message comprising sensitive information
Portion is encrypted, and can also only be encrypted to the part of sensitive information, such as first message " password is 123456 ", can
Only to encrypt to the particular content of password, following ciphertext is obtained: " password is * * * * * * ".
Step S104 shows the second message, thus without when being easy the first environment of leakage in sensitive information
The content for directly displaying message, thereby reduces a possibility that sensitive information is seen by other people, effectively prevents sensitive information
Leakage.
User after viewing second message, if desired check it is untreated before first message, can be with
Corresponding operation is executed, so that the display of the available user's input of equipment triggers information, and is getting the display touching
After photos and sending messages, the first message is obtained according to the second message, and show the first message.Wherein, the display touching
Photos and sending messages can be the trigger action from user, such as can be and click specific button, the specific gesture of input etc..
In order to avoid other users can check first message by clicking specific button or the specific gesture of input,
It may include verification information in the display triggering information, thus needed in the trigger action of user comprising validation information
Operation, such as input password etc..But if the input frame for requiring pop-up password when needing to show first message every time allows use
Family inputs password, can greatly increase the use cost of user, user experience is caused to reduce.Therefore, the display triggers information
It can be user and information triggered based on the display that physiological characteristic information inputs, so that the verifying for including in display triggering information
Information is the physiological characteristic information, such as fingerprint, vocal print, facial image feature etc. of user.Thus, it is possible to utilize taking the photograph in equipment
As the realization fast verification such as head, microphone, fingerprint identification device, convenience degree when verifying is substantially increased, in protection user
While privacy, customer using cost is reduced, improves user experience.
Since the second message can use different forms, such as it can be the corresponding ciphertext of first message, it can also
To be the corresponding hiding prompting message of first message, therefore the first message is being obtained according to the second message, and show
When the first message, if the second message is the corresponding ciphertext of the first message, place is decrypted to the ciphertext
Reason, obtains the first message, and show the first message;It is hidden if the second message is that the first message is corresponding
Prompting message then obtains the corresponding first message of the hiding prompting message, and shows the first message.For example, when display
Be to hide prompting message: when " former message has been hidden, and display please be clicked ", user can click the hiding prompting message, at this time
Camera starting can be triggered, the facial image of user is obtained, recognition of face is carried out and completes verifying, if face verification passes through,
Equipment transfers the corresponding first message of the hiding prompting message of this " password is 123456 ", and is shown.
In other embodiments of the application, in addition to actively executing corresponding operation when needing to check by user,
It triggers equipment to show except first message, the environment of surrounding can also be detected automatically by equipment to realize the display of first message.
Equipment is shown after second message, it can be determined that whether the display environment of first message is first environment, can be in actual scene
Once judged every preset duration, such as 5s, 10s etc., can also be by user's actively triggering judgement, such as get use
After the display triggering information at family.Wherein, the mode of this judgement can use all kinds of detection modes equally to detect first and disappear
Various information in the corresponding detection range of the display environment of breath, such as image information, audio-frequency information, thermoinduction information etc., this
Place repeats no more.If the result judged is no, then it represents that current display environment not will cause the leakage of sensitive information, Ke Yigen
The first message is obtained according to the second message, and shows the first message.
Fig. 4 shows the processing stream for carrying out the whole process of encryption display and decryption in a kind of embodiment of the application to message
Cheng Tu, comprising the following steps:
Step S401 after receiving message, judges whether comprising sensitive information.It can be direct if not including sensitive information
Display.If needing to be implemented step S402 comprising sensitive information.
Step S402 needs to handle the message comprising sensitive information, such as added when being in first environment
It is close, to show the corresponding ciphertext of this message, only to prevent other irrelevant personnel from seeing the message comprising sensitive information.
Step S403, when user needs to show the corresponding message of ciphertext, using recognition of face or the side of fingerprint recognition
Formula is verified, if unverified, informs that user decrypts failure.If being proved to be successful, S404 is thened follow the steps.
Step S404 is decrypted ciphertext using corresponding mode according to the mode of encryption, obtains the original of message
Text.
The original text of message is shown to user by step S405.
Based on the same inventive concept, a kind of message display device is additionally provided in the embodiment of the present application, the equipment is corresponding
Method be message display method in previous embodiment, and its principle solved the problems, such as is similar to this method.The equipment packet
Include the memory for storing computer program instructions and the processor for executing computer program instructions, wherein when the meter
When calculation machine program instruction is executed by the processor, triggers the equipment and execute message display method above-mentioned.Its specific implementation can
To include but is not limited to the terminal with touch screen such as computer, mobile phone, tablet computer, smartwatch.
Fig. 5 shows a kind of structure of the equipment for the method and/or technology scheme being adapted to carry out in the embodiment of the present application,
The equipment 500 include central processing unit (CPU, Central Processing Unit) 501, can according to be stored in only
It reads the program in memory (ROM, Read Only Memory) 502 or is loaded into random access storage from storage section 508
Program in device (RAM, Random Access Memory) 503 and execute various movements appropriate and processing.In RAM 503
In, also it is stored with various programs and data needed for system operatio.CPU 501, ROM 502 and RAM503 pass through bus 504
It is connected with each other.Input/output (I/O, Input/Output) interface 505 is also connected to bus 504.
I/O interface 505 is connected to lower component: including the defeated of keyboard, mouse, touch screen, microphone, infrared sensor etc.
Enter part 506;Including such as cathode-ray tube (CRT, Cathode Ray Tube), liquid crystal display (LCD, Liquid
Crystal Display), the output par, c 507 of light-emitting diode display, OLED display etc. and loudspeaker etc.;Including hard disk, light
The storage section 508 of the one or more computer-readable medium such as disk, disk, semiconductor memory;And including such as LAN
The communications portion 509 of the network interface card of (local area network, Local Area Network) card, modem etc..Communications portion
509 execute communication process via the network of such as internet.
Particularly, the method in the embodiment of the present application and/or embodiment may be implemented as computer software programs.Example
Such as, embodiment of the disclosure includes a kind of computer program product comprising carries computer on a computer-readable medium
Program, the computer program include the program code for method shown in execution flow chart.It is central in the computer program
When processing unit (CPU) 501 executes, the above-mentioned function of limiting in the present processes is executed.
It should be noted that computer-readable medium described herein can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer-readable medium for example can be --- but it is unlimited
In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates
The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires
Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory
(EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or
The above-mentioned any appropriate combination of person.In this application, computer-readable medium, which can be, any includes or storage program has
Shape medium, the program can be commanded execution system, device or device use or in connection.
And in this application, computer-readable signal media may include passing in a base band or as carrier wave a part
The data-signal broadcast, wherein carrying computer-readable program code.The data-signal of this propagation can use a variety of shapes
Formula, including but not limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media may be used also
To be any computer-readable medium other than computer readable storage medium, which can send, propagate
Either transmission is for by the use of instruction execution system, device or device or program in connection.It is computer-readable
The program code for including on medium can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc.
Deng or above-mentioned any appropriate combination.
The calculating of the operation for executing the application can be write with one or more programming languages or combinations thereof
Machine program code, described program design language include object oriented program language-such as Java, Smalltalk, C+
+, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can
Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package,
Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part.
In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN)
Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service
Provider is connected by internet).
Flowchart or block diagram in attached drawing shows the equipment according to the various embodiments of the application, method and computer program
The architecture, function and operation in the cards of product.In this regard, each box in flowchart or block diagram can represent
A part of a part of one module, program segment or code, the module, program segment or code is used for comprising one or more
The executable instruction of logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
Function can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated actually may be used
To be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that
, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with executing
The dedicated systems for hardware of defined functions or operations realizes, or can use specialized hardware and computer instruction
Combination is to realize.
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be
Included in equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying equipment.Above-mentioned calculating
Machine readable medium carries one or more computer-readable instruction, the computer-readable instruction can be executed by processor with
Realize the method and/or technology scheme of multiple embodiments of aforementioned the application.
In conclusion equipment can provide a user one for inputting in the scheme that some embodiments of the present application provide
Then the dummy keyboard of preset characters obtains user and presses the input operation of the first character in the dummy keyboard, and is based on
The input operates corresponding first character and inserts identifying code in form page, due to user by the dummy keyboard of the offer only
The preset characters that can be inputted, forbidden character will not inadvertently be inputted by ensuring that, be avoided because inputting forbidden character
Caused by identifying code mistake, while input when be pressed in the dummy keyboard based on user the first character input behaviour
Make, compared to the input operation pressed and lifted, response speed faster, can be improved the efficiency of identifying code input.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt
With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In some embodiments
In, the software program of the application can be executed by processor to realize above step or function.Similarly, the software of the application
Program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory, magnetic or
CD-ROM driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, for example,
As the circuit cooperated with processor thereby executing each step or function.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie
In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This
Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple
Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table
Show title, and does not indicate any particular order.
Claims (12)
1. a kind of method that message is shown, wherein this method comprises:
Judge whether the first message received includes sensitive information;
If judging whether the display environment of first message is first environment comprising sensitive information;
If the display environment of the first message is first environment, the first message is handled, obtains second message;
Show the second message.
2. according to the method described in claim 1, wherein, judging whether the first message received includes sensitive information, comprising:
The identification model of sensitive information is constructed by way of machine learning;
It is identified using the identification model to what is received, whether the first message received described in judgement includes sensitive letter
Breath.
3. according to the method described in claim 1, wherein, judging whether the first message received includes sensitive information, comprising:
Obtain the keyword set by user about sensitive information;
It whether include sensitive information according to the first message that keyword judgement receives.
4. according to the method described in claim 1, wherein, judging whether the display environment of first message is first environment, comprising:
According to image information, audio-frequency information and/or the thermoinduction information in the corresponding detection range of the display environment of first message,
Whether the display environment for judging the first message is first environment.
5. according to the method described in claim 4, wherein, according to the figure in the corresponding detection range of the display environment of first message
As information judges whether the display environment of the first message is first environment, comprising:
According to the first testing result of image information acquisition in the corresponding detection range of the display environment of first message, and according to institute
It states the first testing result and determines that the display environment of the first message is first environment, wherein first testing result includes
Any one or more combination below:
It include multiple facial images in described image information;
It include the corresponding facial image of non-pre-set user in described image information;
The corresponding facial image of multiple facial images or non-pre-set user for including in described image information disappears towards described first
The display position of breath;
The position for the corresponding facial image of multiple facial images or non-pre-set user for including in described image information and described the
The display position of one message is less than pre-determined distance.
6. according to the method described in claim 4, wherein, according to the sound in the corresponding detection range of the display environment of first message
Frequency information judges whether the display environment of the first message is first environment, comprising:
The second testing result is obtained according to the audio-frequency information in the corresponding detection range of the display environment of first message, and according to institute
It states the second testing result and determines that the display environment of the first message is first environment, wherein second testing result includes
Following any one:
It include the corresponding vocal print feature of multiple users in the audio-frequency information;
It include the corresponding vocal print feature of non-pre-set user in the audio-frequency information.
7. according to the method described in claim 1, wherein, the second message is the corresponding ciphertext of the first message or institute
State the corresponding hiding prompting message of first message.
8. method according to any one of claim 1 to 7, wherein after showing the second message, further includes:
The display for obtaining user's input triggers information;
After getting display triggering information, the first message is obtained according to the second message, and shows described the
One message.
9. according to the method described in claim 8, wherein, the display for obtaining user's input triggers information, comprising:
It obtains user and information is triggered based on the display that physiological characteristic information inputs.
10. method according to any one of claim 1 to 7, wherein after showing the second message, further includes:
Whether the display environment for judging first message is first environment;
If it has not, obtaining the first message according to the second message, and show the first message.
11. a kind of message display device, wherein the equipment includes memory for storing computer program instructions and for holding
The processor of row computer program instructions, wherein when the computer program instructions are executed by the processor, trigger the equipment
Method described in any one of perform claim requirement 1 to 10.
12. a kind of computer-readable medium, is stored thereon with computer program instructions, the computer-readable instruction can be processed
Device is executed to realize the method as described in any one of claims 1 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811475846.5A CN109858274A (en) | 2018-12-04 | 2018-12-04 | The method and apparatus that message is shown |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811475846.5A CN109858274A (en) | 2018-12-04 | 2018-12-04 | The method and apparatus that message is shown |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109858274A true CN109858274A (en) | 2019-06-07 |
Family
ID=66890638
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811475846.5A Pending CN109858274A (en) | 2018-12-04 | 2018-12-04 | The method and apparatus that message is shown |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109858274A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111291396A (en) * | 2020-02-06 | 2020-06-16 | 北京字节跳动网络技术有限公司 | Form data processing method and device, electronic equipment and storage medium |
CN111859900A (en) * | 2020-07-14 | 2020-10-30 | 维沃移动通信有限公司 | Message display method and device and electronic equipment |
CN111935349A (en) * | 2020-08-07 | 2020-11-13 | 闻泰通讯股份有限公司 | Terminal-based information display method and device, terminal and storage medium |
CN112104785A (en) * | 2020-09-18 | 2020-12-18 | 维沃移动通信有限公司 | Information display method and device |
WO2021217899A1 (en) * | 2020-04-30 | 2021-11-04 | 深圳壹账通智能科技有限公司 | Method, apparatus, and device for encrypting display information, and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014210126A (en) * | 2013-04-22 | 2014-11-13 | 任天堂株式会社 | Information processing system, information processing devices, information processing program, and information processing method |
CN104837113A (en) * | 2015-03-31 | 2015-08-12 | 努比亚技术有限公司 | Privacy information display method and terminal |
CN105303091A (en) * | 2015-10-23 | 2016-02-03 | 广东小天才科技有限公司 | Eyeball tracking technology based privacy protection method and system |
CN106355068A (en) * | 2016-08-31 | 2017-01-25 | 维沃移动通信有限公司 | Individual security information displaying method and device |
CN106548081A (en) * | 2016-10-28 | 2017-03-29 | 努比亚技术有限公司 | A kind of end message display packing and device |
CN106960147A (en) * | 2017-04-11 | 2017-07-18 | 广东小天才科技有限公司 | A kind of method for protecting privacy and device, user equipment |
CN107992730A (en) * | 2017-11-28 | 2018-05-04 | 宇龙计算机通信科技(深圳)有限公司 | A kind of screen message guard method and device |
CN108090382A (en) * | 2017-12-29 | 2018-05-29 | 阿里巴巴集团控股有限公司 | Show the method and apparatus of sensitive information |
CN108111667A (en) * | 2016-11-25 | 2018-06-01 | 北京搜狗科技发展有限公司 | A kind of communication information encryption method, device and electronic equipment |
-
2018
- 2018-12-04 CN CN201811475846.5A patent/CN109858274A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014210126A (en) * | 2013-04-22 | 2014-11-13 | 任天堂株式会社 | Information processing system, information processing devices, information processing program, and information processing method |
CN104837113A (en) * | 2015-03-31 | 2015-08-12 | 努比亚技术有限公司 | Privacy information display method and terminal |
CN105303091A (en) * | 2015-10-23 | 2016-02-03 | 广东小天才科技有限公司 | Eyeball tracking technology based privacy protection method and system |
CN106355068A (en) * | 2016-08-31 | 2017-01-25 | 维沃移动通信有限公司 | Individual security information displaying method and device |
CN106548081A (en) * | 2016-10-28 | 2017-03-29 | 努比亚技术有限公司 | A kind of end message display packing and device |
CN108111667A (en) * | 2016-11-25 | 2018-06-01 | 北京搜狗科技发展有限公司 | A kind of communication information encryption method, device and electronic equipment |
CN106960147A (en) * | 2017-04-11 | 2017-07-18 | 广东小天才科技有限公司 | A kind of method for protecting privacy and device, user equipment |
CN107992730A (en) * | 2017-11-28 | 2018-05-04 | 宇龙计算机通信科技(深圳)有限公司 | A kind of screen message guard method and device |
CN108090382A (en) * | 2017-12-29 | 2018-05-29 | 阿里巴巴集团控股有限公司 | Show the method and apparatus of sensitive information |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111291396A (en) * | 2020-02-06 | 2020-06-16 | 北京字节跳动网络技术有限公司 | Form data processing method and device, electronic equipment and storage medium |
CN111291396B (en) * | 2020-02-06 | 2023-07-14 | 北京字节跳动网络技术有限公司 | Form data processing method and device, electronic equipment and storage medium |
WO2021217899A1 (en) * | 2020-04-30 | 2021-11-04 | 深圳壹账通智能科技有限公司 | Method, apparatus, and device for encrypting display information, and storage medium |
CN111859900A (en) * | 2020-07-14 | 2020-10-30 | 维沃移动通信有限公司 | Message display method and device and electronic equipment |
CN111859900B (en) * | 2020-07-14 | 2023-09-08 | 维沃移动通信有限公司 | Message display method and device and electronic equipment |
CN111935349A (en) * | 2020-08-07 | 2020-11-13 | 闻泰通讯股份有限公司 | Terminal-based information display method and device, terminal and storage medium |
CN112104785A (en) * | 2020-09-18 | 2020-12-18 | 维沃移动通信有限公司 | Information display method and device |
CN112104785B (en) * | 2020-09-18 | 2021-08-03 | 维沃移动通信有限公司 | Information display method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109858274A (en) | The method and apparatus that message is shown | |
US10607035B2 (en) | Method of displaying content on a screen of an electronic processing device | |
US10467387B2 (en) | Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content | |
CN105981398B (en) | Content security method and electronic device for providing content security function | |
CN112287372B (en) | Method and apparatus for protecting clipboard privacy | |
CN105281907B (en) | Encrypted data processing method and device | |
CN108880791A (en) | Cryptographic key protection method, terminal and computer readable storage medium | |
KR102474243B1 (en) | A Method and Apparatus For Providing a Secure Mode for User Device | |
US11943256B2 (en) | Link detection method and apparatus, electronic device, and storage medium | |
CN106453052A (en) | Message interaction method and apparatus thereof | |
TWI761843B (en) | Access control method and device, electronic device and storage medium | |
JP6163610B2 (en) | Forgery prevention verification method, apparatus, program, and recording medium | |
KR101768813B1 (en) | System for providing remote consulting service and security solution thereof | |
CN110765434A (en) | Identity authentication method and device, electronic equipment and storage medium | |
KR102144509B1 (en) | Proximity communication method and apparatus | |
CN111368232A (en) | Password sharing reflux method and device, electronic equipment and storage medium | |
CN106648583A (en) | Information processing method and terminal | |
US20150319617A1 (en) | Methods and devices for providing information in voice service | |
CN111177770B (en) | Sensitive information protection method, mobile equipment and storage device | |
EP3486828B1 (en) | Electronic device including display and method of encrypting information | |
CN116756750A (en) | Medical sensitive data acquisition desensitization method | |
CN114124462B (en) | Verification code transmission method and device, electronic equipment and storage medium | |
CN108696355B (en) | Method and system for preventing head portrait of user from being embezzled | |
US20210083874A1 (en) | Blockchain Token Holding Social Event History | |
US20220350928A1 (en) | Information processing system, information processing method, program, and user interface |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190607 |
|
RJ01 | Rejection of invention patent application after publication |