The present application is a divisional application of an invention patent application entitled "a method and apparatus for displaying an information image" with application number 201510967595.2 filed on 21/12/2015.
Detailed Description
According to the existing information image using method, after a user triggers a display function on equipment, the information image can be displayed on an equipment screen until the user cancels the display manually or the equipment automatically enters a standby state, and the risk that the information image is maliciously acquired in the period is very high. Taking a mobile phone two-dimensional code payment scene as an example, many users are used to display a payment two-dimensional code on a mobile phone in advance when waiting for payment in line, or do not immediately perform a display canceling operation after payment is finished, and even the mobile phone with the payment two-dimensional code displayed on one side … … can be placed because of busy doing other things (such as packaging after shopping), which creates conditions for malicious users.
In order to solve the problems, the scheme provided by the application is that the user equipment is controlled to display the information image by using the user-defined key, and in practical application, the information image can be displayed on a screen of the user equipment when the user presses the user-defined key, otherwise, the information image can disappear immediately when the user leaves the user-defined key, and the use safety of the information image is improved by the mode.
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be described in detail below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all embodiments. All other embodiments that can be derived from the embodiments given herein by a person of ordinary skill in the art are intended to be within the scope of the present disclosure.
According to the information image display scheme, physical keys or touch virtual keys on the user equipment can be used as custom keys, and for the user equipment with a touch screen, virtual keys in an operating system interface or a specific application interface can also be used as custom keys. Certainly, in order to realize the display of the information image, the user equipment also needs to have a basic display function, and the specific form of the user equipment may be a composite device such as a mobile phone, a tablet computer, and a smart watch, and may also be a single-function device such as an electronic business card and an electronic tag, which is not limited in this application. In addition, the specific form of the information image can be a two-dimensional code, a one-dimensional bar code or a variable bar code, and the like, and the application scene can be payment, entrance guard, business card exchange and the like, which do not influence the implementation of the scheme of the application.
Fig. 1 is a flowchart of an information image display method provided in the present application, and the method may include the following steps:
s101, receiving an information image display instruction;
s102, determining an information image to be displayed according to the information image display instruction;
s103, detecting the pressing state of the predefined key;
s104, displaying the information image on the screen of the user equipment in the state that the predefined key is detected to be pressed,
and S105, not displaying the information image in the state that the pressing of the predefined key cannot be detected.
The following describes the above scheme by taking an application scenario of performing quick payment by using a mobile phone two-dimensional code (also called a two-dimensional bar code) as an example.
The mobile phone user needs to pre-designate one or more keys as a trigger password when the two-dimensional code is displayed, the keys can be physical keys or touch virtual keys on the mobile phone, or virtual keys in a touch screen operating system interface or a specific application interface, and the mobile phone side records and stores the key information.
According to S101, when the user wishes to pay using the two-dimensional code, a corresponding trigger operation is performed on the mobile phone, for example, functions such as "pay code", "pay on the surface", and the like are selected in a specific application, so as to issue an information image display instruction to the mobile phone, which corresponds to a payment operation instruction in this embodiment. Of course, the user may also implement the display triggering operation in other manners such as a gesture, a voice control, and the like, which is not limited in this application.
According to S102, after receiving the information image display instruction, the mobile phone determines a two-dimensional code image for payment. Here, a static two-dimensional code image generated in advance may be acquired, or a two-dimensional code image may be generated by live encoding.
The difference between the scheme of the application and the scheme of the prior art is that after the two-dimensional code image is determined, the two-dimensional code image is not immediately displayed on a screen of the mobile phone, but the mobile phone enters a 'trigger display' state, and in the state, whether other trigger conditions are met is further judged, and whether the two-dimensional code image is displayed is controlled.
The application utilizes the user-defined key as another trigger condition for displaying the two-dimensional code image. According to S103-S105, in the image triggering display state, the pressing state of the custom key is continuously detected, if the condition that the custom key is in the pressed state can be detected (if a plurality of keys are specified in advance, the plurality of keys can be required to be pressed simultaneously, or any key can be required to be pressed), the determined two-dimensional code image is displayed on the screen of the mobile phone, otherwise, if the condition that the custom key is not detected to be pressed, the two-dimensional code image is not displayed.
According to the scheme, the display time of the two-dimensional code image can be skillfully controlled by using the user-defined key. In practical application, when the mobile phone is in an image triggering display state, once the user is detected to press the self-defined key, the display of the two-dimensional code image can be triggered, otherwise, when the user cannot be detected to press the self-defined key, the two-dimensional code image cannot be displayed on the mobile phone screen. Through this kind of mode, on the one hand can shorten the effective show of two-dimensional code image for a long time, reduce the possibility that the image was maliciously obtained, even if in the information image show period, because the user is handheld device always, and can control only will the finger press on self-defining button when sweeping the sign indicating number, sweep the sign indicating number equipment this moment and press close to and keep off in cell-phone screen the place ahead, under this kind of condition, no matter utilize camera or manual candid photograph all are difficult to implement.
In addition, the user-defined key is used as a user verification mechanism in the scheme of the application, so that the current operator of the user equipment can be effectively confirmed to be a legal user, and the loss caused by the operation of the user equipment by an illegal user is avoided.
Fig. 2 is a schematic diagram of a specific implementation scenario in which the scheme of the present application is applied to merchant payment, and a user designates a "volume down" key of a mobile phone as a self-defined key in advance. When the user selects the 'pay on the counter' function in the Payment treasure application, the two-dimensional code image is not immediately displayed on the screen of the mobile phone. When code scanning payment is needed, after a user presses a 'volume reduction' key with a finger, a two-dimensional code image is triggered to be displayed on a mobile phone screen. After the code scanning interaction is finished, the user finger leaves the volume reduction key, and the two-dimensional code image displayed on the mobile phone screen disappears.
It can be understood that the term "not displaying an information image" in the present application refers to not displaying an image carrying actual information to be transmitted, and therefore the actual display manner is not limited to displaying a blank area. For example, in one embodiment of the present application, a dummy image may be displayed on the screen of the user device during the "no information image is displayed". As shown in fig. 3, the pseudo image may adopt a similar style as the real image, but does not carry valid information to be transmitted, such as an account number and a password in a payment scenario, a name and a contact way in a business card exchange scenario, and the like, so that even if the pseudo image is maliciously acquired, no actual loss is caused. According to actual requirements, other functional information may be further added to the pseudo image, for example, the following may be set: when the pseudo-image is scanned, some kind of alarm mechanism is triggered to remind the user that someone is using the pseudo-image, please note the safety of personal information.
In addition, when the information image is not displayed, some prompting information may be displayed to prompt the user to input the custom key information, for example, displaying a word such as "please press and hold the custom key". Of course, the user may be prompted by sound, vibration, or the like, and the present application does not need to be limited to a specific output mode of the prompting information.
For the case of using the virtual keys of the user interface as the self-defining keys, a virtual keyboard for inputting the self-defining key information can be displayed on the screen without displaying the information image, and the corresponding input style of the keyboard can be characters, graphs, color blocks and the like. In another embodiment, for a virtual key implemented on a user interface, the virtual key may be in an invisible state when a user needs to press a custom key, as shown in fig. 4, the custom virtual key specified by the user is actually a certain area of a touch screen, in a key specifying stage, an area corresponding to the key may be displayed to the user, and in an actual use stage, when the pressing state of the custom key is detected, the actual shape and contour of the key may not be displayed on a screen of user equipment.
It is also possible to output some sort of prompt information after the information image is displayed to inform the user that the image has been correctly displayed, considering that the user himself may be difficult to see during the actual display of the information image. In combination with the actual situation of the user equipment, the prompting modes that can be selected here include sound, vibration, flash light indication and the like, and the mode of triggering the equipment vibration to realize the prompting is a more appropriate scheme in consideration of factors such as environmental noise interference and confidentiality, and certainly, the application does not need to limit the specific output mode of the prompting information.
In an embodiment of the application, it may be further configured to stop detecting the pressing state of the custom key, that is, to exit from the image triggering display state, when it cannot be detected that the duration of the pressed custom key exceeds a preset threshold (for example, 20 seconds, 30 seconds, and the like). Thereby further improving security and reducing power consumption of the user equipment.
Corresponding to the above method embodiment, the present application further provides an information image display apparatus, as shown in fig. 5, the apparatus may include:
a display instruction receiving module 110, configured to receive an information image display instruction;
an information image determining module 120, configured to determine an information image to be displayed according to an information image display instruction;
a detection control module 130, configured to detect a pressing state of a predefined key;
and the display control module 140 is configured to display the information image on a screen of the user equipment in a state where the predefined key is detected to be pressed, and otherwise, not display the information image.
In an embodiment of the present application, the display control module 140 may be specifically configured to: and when the information image is not displayed, displaying a pseudo image which does not carry effective information on a screen of the user equipment.
In an embodiment of the present application, the detection control module 130 may further be configured to: and if the fact that the pressed time of the predefined key exceeds a preset time threshold value cannot be detected, stopping detecting the pressed state of the predefined key.
Referring to fig. 6, in an embodiment of the present application, the information image display apparatus may further include:
the first prompting module 150 is configured to output first prompting information to prompt the user to press a predefined key if the information image is not displayed. For example, the first prompt information is output in a screen display manner.
Referring to fig. 6, in an embodiment of the present application, the information image display apparatus may further include:
the second prompting module 160 is configured to output a second prompting message after the information image is displayed, so as to prompt the user that the information image is correctly displayed. For example, the second prompting message is output in a manner that triggers a vibration of the user device.
It should be understood that the first prompting module 150 and the second prompting module 160 may be configured in the apparatus at the same time as shown in fig. 6 or may be configured in the apparatus separately as two independent modules, and therefore the structure shown in fig. 6 should not be construed as limiting the present application.
Based on the image display device, the application also provides a barcode payment device, which is applied to user equipment, and is characterized in that the device comprises:
the payment operation instruction receiving module is used for receiving a payment operation instruction;
the payment bar code determining module is used for determining a bar code image for payment according to the payment operation instruction;
the detection control module is used for detecting the pressing state of the predefined key;
and the payment bar code display control module is used for displaying the bar code image on a screen of user equipment in a state that the predefined key is detected to be pressed, and otherwise, not displaying the bar code image.
It can be understood that the barcode payment apparatus is an implementation of the image display apparatus in a specific application environment, and therefore, the specific implementation principle and the structural schematic diagram of the barcode payment apparatus can be referred to the foregoing embodiment of the image display apparatus and the descriptions of fig. 5 and fig. 6, and a repeated description is not repeated in this embodiment.
In addition, the implementation process of the functions and actions of each module in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
The device provided by the present application can be applied to devices such as a mobile phone, a tablet computer, and a smart watch, and as shown in fig. 7, for a schematic diagram of a hardware structure of a device for configuring the device provided by the present application, the device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 are communicatively coupled to each other within the device via bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solution provided in the present Application.
The Memory 1020 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random access Memory), a static storage device, a dynamic storage device, or the like. The memory 1020 may store an operating system and other application programs, and when the technical solution provided by the present application is implemented by software or firmware, the relevant program codes are stored in the memory 1020 and called to be executed by the processor 1010.
The input/output interface 1030 is used for connecting an input/output module to input and output information. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1050 includes a path that transfers information between various components of the device, such as processor 1010, memory 1020, input/output interface 1030, and communication interface 1040.
It should be noted that although the above-mentioned device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040 and the bus 1050, in a specific implementation, the device may also include other components necessary for normal operation. Furthermore, it will be understood by those skilled in the art that the apparatus described above may also include only the components necessary to implement the solution of the present application, and not necessarily all of the components shown in the figures.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described apparatus embodiments are merely illustrative, and the modules described as separate components may or may not be physically separate, and the functions of the modules may be implemented in one or more software and/or hardware when implementing the solution of the present application. And part or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is directed to embodiments of the present application and it is noted that numerous modifications and adaptations may be made by those skilled in the art without departing from the principles of the present application and are intended to be within the scope of the present application.