CN114528581A - Safety display method and electronic equipment - Google Patents

Safety display method and electronic equipment Download PDF

Info

Publication number
CN114528581A
CN114528581A CN202011224998.5A CN202011224998A CN114528581A CN 114528581 A CN114528581 A CN 114528581A CN 202011224998 A CN202011224998 A CN 202011224998A CN 114528581 A CN114528581 A CN 114528581A
Authority
CN
China
Prior art keywords
image
layer
electronic device
screen
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011224998.5A
Other languages
Chinese (zh)
Inventor
蒋华
武晓芳
陈晓晓
孟繁瑞
施元昌
陈晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202011224998.5A priority Critical patent/CN114528581A/en
Publication of CN114528581A publication Critical patent/CN114528581A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1454Digital output to display device ; Cooperation and interconnection of the display device with other functional units involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays, e.g. teledisplay
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformations in the plane of the image
    • G06T3/04Context-preserving transformations, e.g. by using an importance map

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Controls And Circuits For Display Device (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application discloses a safety display method and electronic equipment, relates to the field of communication, solves the problem that in the prior art, user experience is poor due to the fact that a user editing process is complex when user privacy information is protected, and improves user experience. The specific scheme is as follows: the first electronic equipment displays a first image; the method comprises the steps that first electronic equipment receives first operation of a user, wherein the first operation is used for acquiring a first image; responding to a first operation of a user, if the first electronic device determines that a first image layer in the first image comprises the safety identification, replacing or covering the first image layer with a first preset image layer by the first electronic device, and generating a second image.

Description

Safety display method and electronic equipment
Technical Field
The embodiment of the application relates to the field of communication, in particular to a safety display method and electronic equipment.
Background
In order to facilitate user communication, when the electronic device is used, the user can share the interface of the electronic device with other users through operations such as screen capture, screen recording, screen sharing, screen projection and the like. However, when the interface is shared by the above operations, a copyright problem may be involved or user privacy may be revealed. Generally, in order to avoid revealing the privacy of the user or others, the user can use an editing tool to blur or mosaic the information related to the privacy and then send out the information, but by adopting the method, the editing process of the user is complicated, and the user experience is poor.
Disclosure of Invention
The embodiment of the application provides a secure display method and electronic equipment, which can protect user privacy information and improve user experience.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect of an embodiment of the present application, a secure display method is provided, where the method includes: the first electronic equipment displays a first image; the first electronic equipment receives a first operation of a user, wherein the first operation is used for acquiring a first image displayed by the first electronic equipment; responding to a first operation of a user, if the first electronic device determines that a first image layer in the first image comprises the safety identification, replacing or covering the first image layer with a first preset image layer by the first electronic device, and generating a second image. Based on the scheme, when the first electronic device determines that the layer in the first image includes the security identifier, the layer including the security identifier is replaced or covered by the first preset layer, so that the layer including the security identifier is not displayed in the generated second image, and privacy or copyright of a user can be protected. In addition, the scheme can generate the second image without displaying the privacy or copyright of the user without editing by the user, so that the user experience is improved.
It can be understood that, when the first electronic device covers the first layer with the first preset layer, the multiple layers of the first image may be synthesized with the first preset layer, and during synthesis, the first preset layer is located on the first layer, so that the first layer may be covered by the first preset layer. Although the generated second image still includes the first layer, because the first layer is covered by the first preset layer, the generated second image does not display the first layer, that is, the first layer is invisible to the user, so that it can be ensured that the generated second image does not display user privacy information or copyright information.
Alternatively, the first image may be a whole image displayed on the display screen of the first display device, or may be a partial image displayed on the display screen of the first electronic device.
Optionally, the security identifier may be preconfigured by a third party application or system. For example, the third-party application may configure the security identifier for the layer related to the user privacy information in advance. For another example, the third-party application may configure the security identifier for the layer related to the copyright in advance. Optionally, the security identifier may be layoutparams.
With reference to the first aspect, in a possible implementation manner, the replacing, by the first electronic device, the first layer with a first preset layer and generating a second image includes: the first electronic equipment replaces the first layer with a first preset layer; the first electronic device synthesizes a second layer in the first image with the first preset layer to generate a second image; the second layer does not include the security identifier. Based on the scheme, when the first electronic device generates the second image, the first preset image layer is adopted to replace the first image layer in the first image, and then the second image layer which does not include the safety identification in the first image is synthesized with the first preset image layer to obtain the second image. Therefore, the generated second image does not include the first image layer any more, so that the copyright can be protected if the first image layer relates to the copyright, and the privacy of the user can be protected if the first image layer includes user privacy information.
With reference to the first aspect and the foregoing possible implementation manner, in another possible implementation manner, the first preset image layer includes prompt information, where the prompt information is used to prompt a user that the first image includes security information. Based on the scheme, the user can understand the reason that the second image is different from the first image through the prompt message of the first preset image layer, and the user experience is improved.
Optionally, the prompt information in the first preset layer may be text information such as "screen capture prohibited for secure interface", "screen recording prohibited for secure interface", and the like, and may also be animation or icon prompt information, and the specific content and type of the prompt information are not limited in the present application.
With reference to the first aspect and the possible implementation manners described above, in another possible implementation manner, the first operation includes a screen capture operation, a screen recording operation, a screen projection operation, or a screen sharing operation. Based on the scheme, when the first electronic device receives screen capturing operation, screen recording operation, screen projecting operation or screen sharing operation of a user, in response to the operation, the first electronic device further determines whether a first layer in the first image includes a security identifier, and when the first electronic device determines that the first layer in the first image includes the security identifier, the first electronic device replaces or covers the first layer with a first preset layer and generates a second image, so that the generated second image does not display the layer including the security identifier, and privacy or copyright of the user can be protected.
With reference to the first aspect and the foregoing possible implementation manners, in another possible implementation manner, when the first operation is a screen capture operation or a screen recording operation, the method further includes: the first electronic device displays the second image. Based on the scheme, under the condition that the operation input by the user is screen capture operation or screen recording operation, the first electronic equipment replaces or covers the first image layer in the first image to generate a second image, and the processed second image is displayed on the display screen. It is understood that the second image displayed by the first electronic device does not relate to copyright or private information, and the privacy or copyright of the user can be protected.
With reference to the first aspect and the foregoing possible implementation manners, in another possible implementation manner, in a case that the first operation is a screen projection operation or a screen sharing operation, the method further includes: and the first electronic equipment transmits the second image to second electronic equipment. Based on the scheme, under the condition that the operation input by the user is screen projection operation or screen sharing operation, the first electronic device replaces or covers the first image layer in the first image to generate a second image, and sends the second image to the second electronic device, so that the second image can be displayed after the second electronic device receives the second image. Therefore, in a screen projection or screen sharing scene, the second image displayed by the second electronic device is different from the first image displayed by the first electronic device, and therefore it is ensured that the safety information cannot be leaked.
With reference to the first aspect and the foregoing possible implementation manners, in another possible implementation manner, the method further includes: the first electronic equipment receives a second operation of the user, and the second operation is used for starting the safety switch control; responding to a second operation of a user, filtering a third layer in the second image by the electronic equipment, and generating a third image; the third layer comprises pop-up window prompt information. Based on the scheme, the popup prompt message of the first electronic device can be further filtered by opening the safety switch control, so that the popup prompt messages such as the short message prompt message or the application notification message of the user can not be seen by other users, and the privacy information of the user can be better protected.
With reference to the first aspect and the foregoing possible implementation manners, in another possible implementation manner, when the first operation is a screen capture operation or a screen recording operation, the method further includes: the first electronic device displays the third image. Based on the scheme, under the condition that the operation input by the user is screen capture operation or screen recording operation, the first electronic equipment displays the processed third image on the display screen. It can be understood that the third image displayed by the first electronic device does not relate to copyright or privacy information, and does not include popup prompt information, so that the privacy or copyright of the user can be better protected.
With reference to the first aspect and the foregoing possible implementation manners, in another possible implementation manner, in a case that the first operation is a screen projection operation or a screen sharing operation, the method further includes: and the first electronic equipment transmits the third image to second electronic equipment. Based on the scheme, under the condition that the operation input by the user is screen projection operation or screen sharing operation, the first electronic device sends the third image to the second electronic device, so that the second electronic device can display the third image after receiving the third image. Therefore, in a screen projection or screen sharing scene, the third image displayed by the second electronic device is different from the first image displayed by the first electronic device, so that the third image displayed by the second electronic device is ensured not to relate to copyright or privacy information and does not include popup prompt information, and the privacy or the copyright of a user can be better protected.
In a second aspect of the embodiments of the present application, a secure display method is provided, where the method includes: the first electronic equipment displays a first image; the first electronic equipment receives a first operation of a user, wherein the first operation is used for acquiring a first image displayed by the first electronic equipment; responding to a first operation of a user, if the first electronic device determines that a first control in a first image comprises a safety identification, the first electronic device covers the first control by adopting a second preset layer, and a fourth image is generated. Based on the scheme, when the first electronic device determines that the control in the first image comprises the safety identification, the second preset image layer is adopted to cover the control comprising the safety identification, so that the generated fourth image does not display the control comprising the safety identification, privacy of a user can be protected more finely, and user experience is improved. In addition, according to the scheme, the fourth image which does not display the privacy or the copyright of the user can be generated without editing by the user, so that the user experience is improved. The scheme can process the safety control, so that the information of the control can not be seen by other users, the safety of the users is protected, and the user experience is further improved due to the fact that the safety processing area is smaller.
With reference to the second aspect, in a possible implementation manner, the generating, by the first electronic device, a fourth image by covering the first control with a second preset layer includes: the first electronic equipment acquires the position information of the first control in the first image; based on the position information, the first electronic device adopts a second preset layer to cover the area where the first control is located, and a fourth image is generated. Based on the scheme, the second preset layer is adopted to cover the first control comprising the safety identification, so that the generated fourth image does not display the first control, namely the first control is invisible to the user, the generated fourth image can be ensured not to display the information of the first control, namely the user privacy information can be protected without manual editing of the user, and the user experience is improved. And the safety processing area is smaller, so that the user experience is further improved.
With reference to the second aspect and the possible implementation manner, in another possible implementation manner, the second preset layer includes prompt information, where the prompt information is used to prompt a user that the first control includes security information. Based on the scheme, the user can understand the reason that the fourth image is different from the first image through the prompt message of the second preset image layer, and the user experience is improved.
Optionally, the prompt information in the second preset layer may be text information such as "screen capture prohibited for the security control", "screen recording prohibited for the security control", and the like, and may also be animation or icon prompt information, and the specific content and type of the prompt information are not limited in the present application.
With reference to the second aspect and the possible implementation manners described above, in another possible implementation manner, the first operation includes a screen capture operation, a screen recording operation, a screen projection operation, or a screen sharing operation. Based on the scheme, when the first electronic device receives screen capturing operation, screen recording operation, screen projecting operation or screen sharing operation of a user, in response to the operation, the first electronic device further determines whether the first control in the first image includes the security identifier, and under the condition that the first electronic device determines that the first control in the first image includes the security identifier, the first electronic device covers the first control with the second preset layer and generates the fourth image, so that the generated fourth image does not display the layer including the security identifier, and privacy of the user can be protected.
With reference to the second aspect and the foregoing possible implementation manners, in another possible implementation manner, in a case that the first operation is a screen capture operation or a screen recording operation, the method further includes: the first electronic device displays the fourth image. Based on the scheme, under the condition that the operation input by the user is screen capture operation or screen recording operation, the first electronic device generates a fourth image after covering and processing the first control in the fourth image, and displays the processed fourth image on the display screen. It can be understood that the fourth image displayed by the first electronic device does not display control information, and the privacy of the user can be protected.
With reference to the second aspect and the foregoing possible implementation manners, in another possible implementation manner, in a case that the first operation is a screen projection operation or a screen sharing operation, the method further includes: and the first electronic equipment transmits the fourth image to second electronic equipment. Based on the scheme, under the condition that the operation input by the user is screen projection operation or screen sharing operation, the first electronic device generates a fourth image after covering and processing the first control in the first image, and sends the fourth image to the second electronic device, so that the second electronic device can display the fourth image after receiving the fourth image. Therefore, in a screen projection or screen sharing scene, the fourth image displayed by the second electronic device is different from the first image displayed by the first electronic device, and therefore it is ensured that the safety information cannot be leaked.
With reference to the second aspect and the foregoing possible implementation manners, in another possible implementation manner, the method further includes: the first electronic equipment receives a second operation of the user, and the second operation is used for starting the safety switch control; responding to a second operation of a user, filtering a third layer in the fourth image by the electronic equipment, and generating a fifth image; the third layer comprises pop-up window prompt information. Based on the scheme, the popup prompt message of the first electronic device can be further filtered by opening the safety switch control, and therefore the generated fifth image does not include the popup prompt message, so that the popup prompt message such as a short message prompt message or an application notification message of a user can not be seen by other users, and the privacy information of the user can be better protected.
With reference to the second aspect and the foregoing possible implementation manners, in another possible implementation manner, in a case that the first operation is a screen capture operation or a screen recording operation, the method further includes: the first electronic device displays the fifth image. Based on the scheme, when the operation input by the user is screen capture operation or screen recording operation, the first electronic device displays the processed fifth image on the display screen. It can be understood that the fifth image displayed by the first electronic device does not relate to copyright or privacy information, and does not include pop-up information, so that the privacy or copyright of the user can be better protected.
With reference to the second aspect and the foregoing possible implementation manners, in another possible implementation manner, in a case that the first operation is a screen projection operation or a screen sharing operation, the method further includes: and the first electronic equipment transmits the fifth image to second electronic equipment. Based on the scheme, under the condition that the operation input by the user is screen projection operation or screen sharing operation, the first electronic device sends the fifth image to the second electronic device, so that the second electronic device can display the fifth image after receiving the fifth image. Therefore, in a screen projection or screen sharing scene, the fifth image displayed by the second electronic device is different from the first image displayed by the first electronic device, so that the fifth image displayed by the second electronic device is ensured not to relate to copyright or privacy information, and the popup prompt information is not included, so that the privacy or the copyright of a user can be better protected.
In a third aspect of the embodiments of the present application, there is provided a secure display method, including: the first electronic equipment displays a first image; the first electronic equipment receives a first operation of a user, wherein the first operation is used for acquiring a first image displayed by the first electronic equipment; under the condition that first electronic equipment determines that a safety switch control is not started, responding to the first operation, and if the first electronic equipment determines that a first image layer in the first image comprises a safety identification, replacing or covering the first image layer by the first electronic equipment through a first preset image layer to generate a second image; under the condition that first electronic equipment determines that a security switch control is started, responding to the first operation, and if the first electronic equipment determines that a first layer in the first image comprises a security identifier, replacing or covering the first layer with a first preset layer, and filtering a third layer to generate a third image; the third layer comprises pop-up window prompt information. Based on the scheme, after the first electronic device receives the first operation of the user, whether the safety switch control is started or not is further determined, and under the condition that the safety switch control is not started, if the first electronic device determines that the layer in the first image comprises the safety identification, the layer comprising the safety identification is replaced or covered by adopting the first preset layer, so that the layer comprising the safety identification is not displayed in the generated second image, and the privacy or the copyright of the user can be protected. In addition, the scheme can generate the second image without displaying the privacy or copyright of the user without editing by the user, so that the user experience is improved. Under the condition that the safety switch control is determined to be started, if the first electronic device determines that the layer in the first image comprises the safety identification, the layer comprising the safety identification is replaced or covered by adopting a first preset layer, and the third layer is filtered, so that the generated third image neither displays the layer comprising the safety identification nor displays popup prompt information, the privacy information of a user can be further protected, and the user experience is improved.
With reference to the third aspect, in a possible implementation manner, the first operation includes a screen capture operation, a screen recording operation, a screen projection operation, or a screen sharing operation. Based on the scheme, when the first electronic device receives screen capturing operation, screen recording operation, screen projecting operation or screen sharing operation of a user, the first electronic device further determines whether the security switch control is started, and if the first electronic device determines that the layer in the first image includes the security identifier, the first electronic device replaces or covers the first layer by adopting a first preset layer and generates a second image under the condition that the security switch control is not started, so that the layer including the security identifier is not displayed in the generated second image, and privacy or copyright of the user can be protected. Under the condition that the safety switch control is determined to be opened, if the first electronic device determines that the layer in the first image comprises the safety identification, the layer comprising the safety identification is replaced or covered by the first preset layer, and the third layer is filtered, so that the generated third image neither displays the layer comprising the safety identification nor displays pop-up window prompt information, and therefore privacy information of a user can be further protected, and user experience is improved.
In a fourth aspect of the embodiments of the present application, a secure display method is provided, where the method includes: the first electronic equipment displays a first image; the first electronic equipment receives a first operation of a user, wherein the first operation is used for acquiring a first image displayed by the first electronic equipment; responding to the first operation when first electronic equipment determines that a safety switch control is not started, and if the first electronic equipment determines that a first control in the first image comprises a safety identification, covering the first control by the first electronic equipment through a second preset layer to generate a fourth image; under the condition that first electronic equipment determines that a safety switch control is started, responding to the first operation, and if the first electronic equipment determines that a first control in the first image comprises a safety identification, replacing or covering the first image layer with a second preset image layer by the first electronic equipment, and filtering a third image layer to generate a fifth image; the third layer comprises pop-up window prompt information. Based on the scheme, after the first electronic device receives the first operation of the user, whether the safety switch control is started or not is further determined, and under the condition that the safety switch control is not started, if the first electronic device determines that the control in the first image comprises the safety identification, the control comprising the safety identification is covered by adopting the second preset layer, so that the control comprising the safety identification is not displayed in the generated fourth image, and the privacy of the user can be protected. In addition, according to the scheme, the fourth image which does not display the privacy or the copyright of the user can be generated without editing by the user, so that the user experience is improved. Under the condition that the safety switch control is determined to be started, if the first electronic device determines that the control in the first image comprises the safety identification, the control comprising the safety identification is covered by adopting the second preset layer, and the third layer is filtered, so that the generated fifth image neither displays the control comprising the safety identification nor displays popup prompt information, and therefore privacy information of a user can be further protected, and user experience is improved.
With reference to the fourth aspect, in a possible implementation manner, the first operation includes a screen capture operation, a screen recording operation, a screen projection operation, or a screen sharing operation. Based on the scheme, when the first electronic device receives screen capturing operation, screen recording operation, screen projecting operation or screen sharing operation of a user, the first electronic device further determines whether the safety switch control is started, and under the condition that the safety switch control is not started, if the first electronic device determines that the control in the first image comprises the safety identification, the second preset layer is adopted to cover the control comprising the safety identification, so that the control comprising the safety identification is not displayed in the generated fourth image, and the privacy of the user can be protected. In addition, according to the scheme, the fourth image which does not display the privacy or copyright of the user can be generated without editing by the user, so that the user experience is improved. Under the condition that the safety switch control is determined to be started, if the first electronic device determines that the control in the first image comprises the safety identification, the control comprising the safety identification is covered by adopting the second preset layer, and the third layer is filtered, so that the generated fifth image neither displays the control comprising the safety identification nor displays popup prompt information, and therefore privacy information of a user can be further protected, and user experience is improved.
In a fifth aspect of embodiments herein, there is provided an electronic device comprising a memory for storing a computer program; a transceiver for receiving or transmitting a radio signal; a processor configured to execute the computer program, so that the electronic device implements the secure display method according to any of the above aspects.
A sixth aspect of the embodiments of the present application provides a computer-readable storage medium, having computer program code stored thereon, which, when executed by a processor, implements the secure display method according to any one of the above aspects.
A seventh aspect of the embodiments of the present application provides a chip system, where the chip system includes a processor and a memory, where the memory stores computer program codes; the computer program code, when executed by the processor, implements a secure display method as in any of the above aspects. The chip system may be formed by a chip, and may also include a chip and other discrete devices.
In an eighth aspect of the embodiments of the present application, there is provided a computer program product which, when run on a computer, enables the secure display method according to any one of the above aspects.
Drawings
Fig. 1 is a scene schematic diagram of a display method according to an embodiment of the present application;
fig. 2 is a schematic view of a scene of another display method according to an embodiment of the present disclosure;
fig. 3 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present disclosure;
fig. 3a is a schematic software framework diagram of an electronic device according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a security display method according to an embodiment of the present application;
fig. 5 is a first schematic application diagram of a security display method according to an embodiment of the present disclosure;
fig. 6 is a schematic flowchart of another security display method according to an embodiment of the present application;
fig. 7 is a schematic application diagram of a security display method according to an embodiment of the present application;
fig. 8 is a schematic application diagram three of a security display method according to an embodiment of the present application;
fig. 9 is a schematic flowchart of another security display method provided in an embodiment of the present application;
fig. 10 is a schematic application diagram of a security display method according to an embodiment of the present application;
fig. 11 is a schematic flowchart of another security display method provided in an embodiment of the present application;
fig. 12 is a schematic application diagram of a security display method according to an embodiment of the present application;
fig. 13 is a sixth schematic application diagram of a security display method according to an embodiment of the present application;
fig. 14 is a schematic flowchart of another security display method provided in an embodiment of the present application;
fig. 15 is a schematic flowchart of another security display method provided in an embodiment of the present application;
fig. 16 is a seventh application diagram of a security display method according to an embodiment of the present application;
fig. 17 is an application schematic diagram eight of a security display method according to an embodiment of the present application;
fig. 18 is a schematic diagram nine illustrating an application of a security display method according to an embodiment of the present application;
fig. 19 is a schematic flowchart of another security display method provided in the embodiment of the present application;
fig. 20 is a schematic application diagram ten of a security display method according to an embodiment of the present application;
fig. 21 is a schematic flowchart of another security display method provided in the embodiment of the present application;
fig. 22 is a block diagram of an electronic device according to an embodiment of the present application;
fig. 23 is a block diagram of another electronic device according to an embodiment of the present disclosure;
fig. 24 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. In this application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a and b, a and c, b and c, or a and b and c, wherein a, b and c can be single or multiple. In addition, for the convenience of clearly describing the technical solutions of the embodiments of the present application, in the embodiments of the present application, the words "first", "second", and the like are used to distinguish the same items or similar items with basically the same functions and actions, and those skilled in the art can understand that the words "first", "second", and the like do not limit the quantity and execution order. For example, in the embodiment of the present application, "a first" in a first preset layer and "a second" in a second preset layer are only used to distinguish different preset layers. The descriptions of the first, second, etc. appearing in the embodiments of the present application are only for illustrating and differentiating the objects, and do not represent the order or the particular limitation of the number of the devices in the embodiments of the present application, and do not constitute any limitation to the embodiments of the present application.
It is noted that, in the present application, words such as "exemplary" or "for example" are used to mean exemplary, illustrative, or descriptive. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present relevant concepts in a concrete fashion.
First, the nouns to which this application relates will be briefly described.
Screenshots (Screen shots or Screen grams) may also be referred to as screenshots or screenshots. A screenshot is an image captured by the electronic device that is displayed on a screen or other display device. The screen capture mode can be various, for example, the user can capture the screen of the display interface of the mobile phone by simultaneously pressing the volume reduction key ("-") and the screen locking key of the mobile phone. For another example, the user can also capture a screen of the display interface of the mobile phone through the screen capture control of the system. As another example, a user may screen-capture a display interface of a computer via screen capture software.
The recording screen, i.e. the recording screen, is an interface video displayed by the electronic device. The screen can be recorded through screen recording software. For example, the operation process of a certain application in the electronic device can be recorded through the screen recording software.
And the screen projection is to project the application running on the first electronic equipment to the second electronic equipment so as to display and run the application on the second electronic equipment. When the screen projection function is used, a communication connection is established between the first electronic device and the second electronic device, and the communication connection may be a wired connection (for example, a data transmission line connection or the like) or a wireless connection (for example, a bluetooth connection or a wireless fidelity (WiFi) connection or the like). For example, the mobile phone and the notebook computer are connected with the same WiFi, the mobile phone runs the Tencent video application to play the video, and in a screen projection scene, the mobile phone can send information to the notebook computer through the WiFi, so that the video can be played on the notebook computer. Generally, the content of the screen shot is audio and video resources in the form of streaming media.
Optionally, in the screen projection scene, since the interface of the application is projected, the interface displayed by the second electronic device may be different from the interface displayed by the first electronic device. For example, after a video played on a mobile phone is projected to a television, a user may browse an album or other applications, and the television may continue to play the projected video, so that an interface displayed on the mobile phone is inconsistent with an interface displayed on a notebook computer.
And screen sharing, namely synchronously displaying the interface of the first electronic equipment on the second electronic equipment. When the screen sharing function is used, a communication connection is established between the first electronic device and the second electronic device. For example, the first electronic device and the second electronic device are connected to the same wireless local area network. Generally, the content shared by the screen is not limited, and various contents such as web pages, games, offices, videos, and the like can be shared to other devices. Optionally, in a screen sharing scene, an interface displayed by the first electronic device is shared, so that when the first electronic device triggers an operation, an interface responding to the operation is synchronously displayed on the second electronic device, that is, the interface displayed by the second electronic device is identical to the interface displayed by the first electronic device.
Electronic devices have many designs and capabilities that facilitate user interaction, such as screen capture, screen recording, screen sharing, and screen projection. When the electronic equipment is used, a user can share the display interface of the electronic equipment or the display interface of an application to other users through screen capture, screen recording, screen sharing or screen projection operation. However, when the interface is shared through the above operations, the interface may include information related to user privacy, such as a head portrait of a friend or a contact, a name of a person, and a password of a user account, and the privacy of the user may be leaked or other privacy may be leaked if the user directly shares the information, so that a moral risk or a legal risk is brought to the user. Generally, in order to avoid revealing the privacy of the user or others, the user can use an editing tool to blur or mosaic the information related to the privacy and then send out the information. However, when the method is adopted, the user editing process is complicated, and the user experience is poor.
In order to solve the above problem, according to a display method, a security identifier (layout params. flag _ SECURE) is configured on an interface by a third-party application, and when an operating system bottom layer performs image display synthesis, if the security identifier is identified, the interface is filtered.
As shown in fig. 1 (a), the mobile phone runs a first application, a display interface of the first application includes a "person", the "person" relates to copyright, and the first application configures a security identifier on the display interface in advance. In a screen capture scene, the mobile phone receives a screen capture operation of a user, and in response to the screen capture operation, after recognizing that the display interface of the first application includes the security identifier, the display interface of the first application is filtered, as shown in (b) in fig. 1, a screen capture picture has no content in the screen capture scene. In a screen projection or screen sharing scene, the mobile phone receives a screen projection or screen sharing operation of a user, and in response to the operation, after recognizing that the display interface of the first application includes the security identifier, the mobile phone filters the display interface of the first application and sends a filtered image to the notebook computer, as shown in (c) of fig. 1, in the screen projection or screen sharing scene, the interface displayed by the notebook computer has no content.
The display method can lead the user to be unable to understand the way of layer isolation, and possibly complain about the product.
In another display method, after the electronic equipment recognizes the safety identification, the operations of screen capturing, screen recording and the like are prevented. For example, after the electronic device recognizes the security identifier, the prompt message is displayed, and the screen capture or recording is stopped at the same time.
As shown in fig. 2 (a), the mobile phone runs a first application, a display interface of the first application is a "person", the "person" relates to copyright, and the first application configures a security identifier on the display interface in advance. In a screen recording scene, when a control policy is in effect, a screen recording function called from a user interface or a background program is intercepted by the system, as shown in (b) of fig. 2, in the screen recording scene, the mobile phone prevents screen recording operation, and displays a prompt message "security policy prohibits screen recording" on a display interface of the first application.
Although the user understands the reason, the control granularity is too strict, any interface prohibits screen recording or screen capturing operation during the effective period of the policy, and in the screen recording process of the user, the security interface may be only a part of the operation process, and if the screen recording operation is completely prevented, the user experience is poor. And by adopting the method, a user cannot accurately know which interface can be recorded and which interface can not be recorded.
In order to protect the privacy or copyright of a user and improve the user experience, the embodiment of the application provides the safety display method.
In an embodiment of the application, the first electronic device and the second electronic device each include a display screen. The first electronic device and the second electronic device may include, but are not limited to, a mobile phone, a tablet computer, a desktop computer, a laptop computer, a handheld computer, a notebook computer, a Personal Computer (PC), an ultra-mobile personal computer (UMPC), a netbook, and a device including a display screen, such as a cellular phone, a smart watch, a smart bracelet, a telephone watch, a smart camera, a Personal Digital Assistant (PDA), an Augmented Reality (AR)/Virtual Reality (VR) device, a television, a projection device, or a motion sensing game machine in a human-computer interaction scenario, and the embodiment of the present application does not particularly limit the specific form of the electronic device.
Please refer to fig. 3, which is a schematic structural diagram of an electronic device 100 according to an embodiment of the present disclosure. As shown in fig. 3, the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a button 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identity Module (SIM) card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It is to be understood that the illustrated structure of the embodiment of the present invention does not specifically limit the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units, such as: the processor 110 may include an Application Processor (AP), a modem processor, a Graphics Processing Unit (GPU), an Image Signal Processor (ISP), a controller, a memory, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processing Unit (NPU), etc. Wherein, the different processing units may be independent devices or may be integrated in one or more processors.
The controller may be, among other things, a neural center and a command center of the electronic device 100. The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution.
A memory may also be provided in processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Avoiding repeated accesses reduces the latency of the processor 110, thereby increasing the efficiency of the system.
In some embodiments, processor 110 may include one or more interfaces. The interface may include an integrated circuit (I2C) interface, an integrated circuit built-in audio (I2S) interface, a Pulse Code Modulation (PCM) interface, a universal asynchronous receiver/transmitter (UART) interface, a Mobile Industry Processor Interface (MIPI), a general-purpose input/output (GPIO) interface, a Subscriber Identity Module (SIM) interface, and/or a Universal Serial Bus (USB) interface, etc.
The I2C interface is a bi-directional synchronous serial bus that includes a serial data line (SDA) and a Serial Clock Line (SCL). In some embodiments, processor 110 may include multiple sets of I2C buses. The processor 110 may be coupled to the touch sensor 180K, the charger, the flash, the camera 193, etc. through different I2C bus interfaces, respectively. For example: the processor 110 may be coupled to the touch sensor 180K via an I2C interface, such that the processor 110 and the touch sensor 180K communicate via an I2C bus interface to implement the touch functionality of the electronic device 100.
The I2S interface may be used for audio communication. In some embodiments, processor 110 may include multiple sets of I2S buses. The processor 110 may be coupled to the audio module 170 via an I2S bus to enable communication between the processor 110 and the audio module 170. In some embodiments, the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface, so as to receive phone calls through the bluetooth headset.
The PCM interface may also be used for audio communication, sampling, quantizing and encoding analog signals. In some embodiments, the audio module 170 and the wireless communication module 160 may be coupled by a PCM bus interface. In some embodiments, the audio module 170 may also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to implement a function of answering a call through a bluetooth headset. Both the I2S interface and the PCM interface may be used for audio communication.
The UART interface is a universal serial data bus used for asynchronous communications. The bus may be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is generally used to connect the processor 110 with the wireless communication module 160. For example: the processor 110 communicates with a bluetooth module in the wireless communication module 160 through a UART interface to implement a bluetooth function. In some embodiments, the audio module 170 may transmit the audio signal to the wireless communication module 160 through a UART interface, so as to implement the function of playing music through a bluetooth headset.
The MIPI interface may be used to connect the processor 110 with peripheral devices such as the display screen 194, the camera 193, and the like. The MIPI interface includes a Camera Serial Interface (CSI), a Display Serial Interface (DSI), and the like. In some embodiments, processor 110 and camera 193 communicate through a CSI interface to implement the capture functionality of electronic device 100. The processor 110 and the display screen 194 communicate through the DSI interface to implement the display function of the electronic device 100.
The GPIO interface may be configured by software. The GPIO interface may be configured as a control signal and may also be configured as a data signal. In some embodiments, a GPIO interface may be used to connect the processor 110 with the camera 193, the display 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like. The GPIO interface may also be configured as an I2C interface, an I2S interface, a UART interface, a MIPI interface, and the like.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge the electronic device 100, and may also be used to transmit data between the electronic device 100 and a peripheral device. And the earphone can also be used for connecting an earphone and playing audio through the earphone. The interface may also be used to connect other electronic devices, such as AR devices and the like.
It should be understood that the interface connection relationship between the modules illustrated in the present embodiment is only an exemplary illustration, and does not limit the structure of the electronic device 100. In other embodiments, the electronic device 100 may also adopt different interface connection manners or a combination of multiple interface connection manners in the above embodiments.
The charging management module 140 is configured to receive a charging input from a charger. The charger may be a wireless charger or a wired charger. In some wired charging embodiments, the charging management module 140 may receive charging input from a wired charger via the USB interface 130. In some wireless charging embodiments, the charging management module 140 may receive a wireless charging input through a wireless charging coil of the electronic device 100. The charging management module 140 may also supply power to the electronic device through the power management module 141 while charging the battery 142.
The power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 and provides power to the processor 110, the internal memory 121, the external memory, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be used to monitor parameters such as battery capacity, battery cycle count, battery state of health (leakage, impedance), etc. In some other embodiments, the power management module 141 may also be disposed in the processor 110. In other embodiments, the power management module 141 and the charging management module 140 may be disposed in the same device.
The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution including 2G/3G/4G/5G wireless communication applied to the electronic device 100. The mobile communication module 150 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. The mobile communication module 150 may receive the electromagnetic wave from the antenna 1, filter, amplify, etc. the received electromagnetic wave, and transmit the electromagnetic wave to the modem processor for demodulation. The mobile communication module 150 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic wave through the antenna 1 to radiate the electromagnetic wave. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating a low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then passes the demodulated low frequency baseband signal to a baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs a sound signal through an audio device (not limited to the speaker 170A, the receiver 170B, etc.) or displays an image or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional modules, independent of the processor 110.
The wireless communication module 160 may provide a solution for wireless communication applied to the electronic device 100, including Wireless Local Area Networks (WLANs) (e.g., wireless fidelity (Wi-Fi) networks), bluetooth (bluetooth, BT), Global Navigation Satellite System (GNSS), Frequency Modulation (FM), Near Field Communication (NFC), Infrared (IR), and the like. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, performs frequency modulation and filtering processing on electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, perform frequency modulation and amplification on the signal, and convert the signal into electromagnetic waves through the antenna 2 to radiate the electromagnetic waves.
In some embodiments, antenna 1 of electronic device 100 is coupled to mobile communication module 150 and antenna 2 is coupled to wireless communication module 160 so that electronic device 100 can communicate with networks and other devices through wireless communication techniques. The wireless communication technology may include global system for mobile communications (GSM), General Packet Radio Service (GPRS), code division multiple access (code division multiple access, CDMA), Wideband Code Division Multiple Access (WCDMA), time-division code division multiple access (time-division code division multiple access, TD-SCDMA), Long Term Evolution (LTE), LTE, BT, GNSS, WLAN, NFC, FM, and/or IR technologies, etc. The GNSS may include a Global Positioning System (GPS), a global navigation satellite system (GLONASS), a beidou navigation satellite system (BDS), a quasi-zenith satellite system (QZSS), and/or a Satellite Based Augmentation System (SBAS).
The electronic device 100 implements display functions via the GPU, the display screen 194, and the application processor. The GPU is a microprocessor for image processing, and is connected to the display screen 194 and an application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. The processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
The display screen 194 is used to display images, video, and the like. The display screen 194 includes a display panel. The display panel may adopt a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode, AMOLED), a flexible light-emitting diode (FLED), a miniature, a Micro-oeld, a quantum dot light-emitting diode (QLED), and the like. In some embodiments, the electronic device 100 may include 1 or N display screens 194, with N being a positive integer greater than 1.
In the embodiment of the present application, the display screen 194 may be used for displaying an interface of an electronic device. As shown in fig. 1 and 2, the display screen 194 may be used to display an interface of an application of the electronic device.
The electronic device 100 may implement a shooting function through the ISP, the camera 193, the video codec, the GPU, the display 194, the application processor, and the like.
The ISP is used to process the data fed back by the camera 193. For example, when a photo is taken, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electrical signal, and the camera photosensitive element transmits the electrical signal to the ISP for processing and converting into an image visible to naked eyes. The ISP can also carry out algorithm optimization on the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image to the photosensitive element. The photosensitive element may be a Charge Coupled Device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The light sensing element converts the optical signal into an electrical signal, which is then passed to the ISP where it is converted into a digital image signal. And the ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into image signal in standard RGB, YUV and other formats. In some embodiments, the electronic device 100 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process other digital signals besides digital image signals. For example, when the electronic device 100 selects a frequency bin, the digital signal processor is used to perform fourier transform or the like on the frequency bin energy.
Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 may play or record video in a variety of encoding formats, such as: moving Picture Experts Group (MPEG) 1, MPEG2, MPEG3, MPEG4, and the like.
The NPU is a neural-network (NN) computing processor that processes input information quickly by using a biological neural network structure, for example, by using a transfer mode between neurons of a human brain, and can also learn by itself continuously. Applications such as intelligent recognition of the electronic device 100 can be realized through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, and the like.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to extend the storage capability of the electronic device 100. The external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, files such as music, video, etc. are saved in an external memory card.
The internal memory 121 may be used to store computer-executable program code, which includes instructions. The processor 110 executes various functional applications of the electronic device 100 and data processing by executing instructions stored in the internal memory 121. The internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (UFS), and the like.
The electronic device 100 may implement audio functions via the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be disposed in the processor 110, or some functional modules of the audio module 170 may be disposed in the processor 110. The speaker 170A, also called a "horn", is used to convert the audio electrical signal into an acoustic signal. The electronic apparatus 100 can listen to music through the speaker 170A or listen to a hands-free call. The receiver 170B, also called "earpiece", is used to convert the electrical audio signal into an acoustic signal. When the electronic apparatus 100 receives a call or voice information, it can receive voice by placing the receiver 170B close to the ear of the person. The microphone 170C, also referred to as a "microphone," is used to convert sound signals into electrical signals. When making a call or sending voice information, the user can input a voice signal into the microphone 170C by uttering a voice signal by the mouth of the user near the microphone 170C.
The headphone interface 170D is used to connect a wired headphone. The headset interface 170D may be the USB interface 130, or may be a 3.5mm open mobile electronic device platform (OMTP) standard interface, a cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The pressure sensor 180A is used for sensing a pressure signal, and converting the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A can be of a wide variety, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like. The capacitive pressure sensor may be a sensor comprising at least two parallel plates having an electrically conductive material. When a force acts on the pressure sensor 180A, the capacitance between the electrodes changes. The electronic device 100 determines the strength of the pressure from the change in capacitance. When a touch operation is applied to the display screen 194, the electronic apparatus 100 detects the intensity of the touch operation according to the pressure sensor 180A. The electronic apparatus 100 may also calculate the touched position from the detection signal of the pressure sensor 180A. In some embodiments, the touch operations that are applied to the same touch position but different touch operation intensities may correspond to different operation instructions. For example: and when the touch operation with the touch operation intensity smaller than the first pressure threshold value acts on the short message application icon, executing an instruction for viewing the short message. And when the touch operation with the touch operation intensity larger than or equal to the first pressure threshold value acts on the short message application icon, executing an instruction of newly building the short message.
The gyro sensor 180B may be used to determine the motion attitude of the electronic device 100. In some embodiments, the angular velocity of electronic device 100 about three axes (i.e., the x, y, and z axes) may be determined by gyroscope sensor 180B. The gyro sensor 180B may be used for photographing anti-shake. For example, when the shutter is pressed, the gyro sensor 180B detects a shake angle of the electronic device 100, calculates a distance to be compensated for by the lens module according to the shake angle, and allows the lens to counteract the shake of the electronic device 100 through a reverse movement, thereby achieving anti-shake. The gyroscope sensor 180B may also be used for navigation, somatosensory gaming scenes.
The air pressure sensor 180C is used to measure air pressure. In some embodiments, electronic device 100 calculates altitude, aiding in positioning and navigation, from barometric pressure values measured by barometric pressure sensor 180C.
The magnetic sensor 180D includes a hall sensor. The electronic device 100 may detect the opening and closing of the flip holster using the magnetic sensor 180D. In some embodiments, when the electronic device 100 is a flip phone, the electronic device 100 may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the opening and closing state of the leather sheath or the opening and closing state of the flip cover, the automatic unlocking of the flip cover is set.
The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device 100 in various directions (typically three axes). The magnitude and direction of gravity may be detected when the electronic device 100 is stationary. The method can also be used for recognizing the posture of the electronic equipment, and is applied to horizontal and vertical screen switching, pedometers and other applications.
A distance sensor 180F for measuring a distance. The electronic device 100 may measure the distance by infrared or laser. In some embodiments, taking a picture of a scene, electronic device 100 may utilize range sensor 180F to range for fast focus.
The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device 100 emits infrared light to the outside through the light emitting diode. The electronic device 100 detects infrared reflected light from nearby objects using a photodiode. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device 100. When insufficient reflected light is detected, the electronic device 100 may determine that there are no objects near the electronic device 100. The electronic device 100 can utilize the proximity light sensor 180G to detect that the user holds the electronic device 100 close to the ear for talking, so as to automatically turn off the screen to achieve the purpose of saving power. The proximity light sensor 180G may also be used in a holster mode, a pocket mode automatically unlocks and locks the screen.
The ambient light sensor 180L is used to sense the ambient light level. Electronic device 100 may adaptively adjust the brightness of display screen 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust the white balance when taking a picture. The ambient light sensor 180L may also cooperate with the proximity light sensor 180G to detect whether the electronic device 100 is in a pocket to prevent accidental touches.
The fingerprint sensor 180H is used to collect a fingerprint. The electronic device 100 may utilize the collected fingerprint characteristics to unlock a fingerprint, access an application lock, photograph a fingerprint, answer an incoming call with a fingerprint, and so on.
The temperature sensor 180J is used to detect temperature. In some embodiments, electronic device 100 implements a temperature processing strategy using the temperature detected by temperature sensor 180J. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device 100 performs a reduction in performance of a processor located near the temperature sensor 180J, so as to reduce power consumption and implement thermal protection. In other embodiments, the electronic device 100 heats the battery 142 when the temperature is below another threshold to avoid the low temperature causing the electronic device 100 to shut down abnormally. In other embodiments, when the temperature is lower than a further threshold, the electronic device 100 performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown due to low temperature.
The touch sensor 180K is also referred to as a "touch panel". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is used to detect a touch operation applied thereto or nearby. The touch sensor can communicate the detected touch operation to the application processor to determine the touch event type. Visual output associated with the touch operation may be provided through the display screen 194. In other embodiments, the touch sensor 180K may be disposed on the surface of the electronic device 100 at a different position than the display screen 194.
The bone conduction sensor 180M may acquire a vibration signal. In some embodiments, the bone conduction sensor 180M may acquire a vibration signal of the human vocal part vibrating the bone mass. The bone conduction sensor 180M may also contact the human pulse to receive the blood pressure pulsation signal. In some embodiments, the bone conduction sensor 180M may also be disposed in a headset, integrated into a bone conduction headset. The audio module 170 may analyze a voice signal based on the vibration signal of the bone mass vibrated by the sound part acquired by the bone conduction sensor 180M, so as to implement a voice function. The application processor can analyze heart rate information based on the blood pressure beating signal acquired by the bone conduction sensor 180M, so as to realize the heart rate detection function.
The keys 190 include a power-on key, a volume key, and the like. The keys 190 may be mechanical keys. Or may be touch keys. The electronic apparatus 100 may receive a key input, and generate a key signal input related to user setting and function control of the electronic apparatus 100.
The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration cues, as well as for touch vibration feedback. For example, touch operations applied to different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The motor 191 may also respond to different vibration feedback effects for touch operations applied to different areas of the display screen 194. Different application scenes (such as time reminding, receiving information, alarm clock, game and the like) can also correspond to different vibration feedback effects. The touch vibration feedback effect may also support customization.
Indicator 192 may be an indicator light that may be used to indicate a state of charge, a change in charge, or a message, missed call, notification, etc.
The SIM card interface 195 is used to connect a SIM card. The SIM card can be brought into and out of contact with the electronic apparatus 100 by being inserted into the SIM card interface 195 or being pulled out of the SIM card interface 195. The electronic device 100 may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The SIM card interface 195 may support a Nano SIM card, a Micro SIM card, a SIM card, etc. The same SIM card interface 195 can be inserted with multiple cards at the same time. The types of the plurality of cards may be the same or different. The SIM card interface 195 may also be compatible with different types of SIM cards. The SIM card interface 195 may also be compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to implement functions such as communication and data communication. In some embodiments, the electronic device 100 employs esims, namely: an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100.
It should be noted that the hardware modules included in the electronic device shown in fig. 3 are only exemplary and do not limit the specific structures of the first electronic device and the second electronic device in the following embodiments, and the following first electronic device or the following second electronic device may include more or fewer components than the electronic device shown in fig. 3.
Both the first electronic device and the second electronic device in the following embodiments may be implemented in the electronic device 100 having the above-described hardware structure.
For example, in the present application, the operating system of the electronic device (including the first electronic device and the second electronic device) may include, but is not limited to
Figure BDA0002763359770000141
(Symbian)、
Figure BDA0002763359770000142
(Android)、
Figure BDA0002763359770000143
(iOS)、
Figure BDA0002763359770000144
(Blackberry), hong meng (Harmony), etc., and the present application is not limited thereto.
Referring to fig. 3a, fig. 3a illustrates a schematic diagram of a display process provided in an embodiment of the present application, taking an Android system including a layered architecture as an example. As shown in fig. 3a, the Android system of the layered architecture may include an application layer, a system framework layer, a hardware driver layer, and a hardware layer.
The application layer may include a series of application packages, for example, the application packages may include applications such as a camera, a gallery, a calendar, a call, a map, a navigation, bluetooth, music, a video, and a short message. For convenience of description, the application program will be simply referred to as an application hereinafter. The application on the first device may be a native application (for example, an application installed in the electronic device when the operating system is installed before the electronic device leaves a factory), or may be a third-party application (for example, a user downloads the installed application through an application store), and the embodiment of the present application is not limited.
The system framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. As shown in fig. 3a, the system framework layer may include an input subsystem, a graphics subsystem, an Activity Manager Service (AMS), and a Package Manager Service (PMS). In some embodiments, the framework layer may also include a screen projection management module, content provider, view system, phone manager, resource manager, notification manager, etc. (not shown in fig. 3 a).
The Activity manager AMS is used for managing Activity, starting, switching and scheduling components in the system, managing and scheduling application programs and the like. The PMS is used to manage all the package information, including install, uninstall, update, and parse android manifest. In this application the first image may be input to the input subsystem. The graphic subsystem is used for synthesizing and arranging a plurality of layers according to a certain sequence.
The hardware driver layer includes a screen (TP) driver, an input hub driver, and other driver modules.
The hardware layer comprises hardware devices such as a screen TP, a USB/Type-c, Bluetooth, wifi and a sensor.
As shown in fig. 3a, in the present application, a hardware device such as bluetooth or wifi in a hardware layer receives an input event, reports the input event to a hardware driver layer, performs coding in the hardware driver layer, reports the input event to a system framework layer, and reports the coded input event to an application layer through the system framework layer. And the application layer transmits the screen capture event triggered by the user to the PMS and the AMS, performs security processing through a graphic subsystem in the system framework layer, and finally displays the processed image on the hardware layer.
It should be noted that fig. 3a only takes the Android system with the layered architecture as an example to introduce a display process of the secure display method. The present application does not limit the specific architecture of the software systems of the first electronic device and the second electronic device, and for specific introduction of software systems of other architectures, reference may be made to conventional technologies.
In the following embodiments, the security display method provided by the embodiments of the present application is described with the first electronic device being a mobile phone and the second electronic device being a notebook computer.
With reference to fig. 2 to 3a, as shown in fig. 4, a security display method provided in an embodiment of the present application includes steps S401 to S403.
S401, the first electronic equipment displays a first image.
The first image may be an entire image displayed on the display screen of the first electronic device or a partial image displayed on the display screen of the first electronic device. For example, the first image may be a display interface of the first electronic device. For another example, when the first electronic device runs the first application, the first image may also be a display interface of the first application. Optionally, when the display screen of the first electronic device displays the interface of the first application in a full screen manner, the display interface of the first electronic device is the same as the display interface of the first application.
Alternatively, the first image may include a plurality of layers, and the first image is synthesized by the plurality of layers.
S402, the first electronic equipment receives a first operation of a user.
The first operation is for acquiring a first image.
Optionally, the first operation may include a screen capture operation, a screen recording operation, a screen sharing operation, or a screen projection operation. It should be noted that the first operation in the embodiment of the present application may also be another operation for acquiring the first image displayed by the electronic device, and the embodiment of the present application is specific to and limited to the first operation.
Illustratively, when the first operation is a screen capture operation, the screen capture operation is used for acquiring an interface displayed by the first electronic device. For example, as shown in fig. 5 (a), when the user presses the screen locking key and the volume reduction key ("-") simultaneously to trigger the screen capturing operation, the electronic device receives the screen capturing operation of the user. Optionally, the screen capturing operation triggered by the user may also be triggered by a screen capturing control in the pull-down menu, and may also be triggered by a specific gesture.
For example, when the first operation is a screen recording operation, the screen recording operation may be used to obtain multiple frames of first images, where the multiple frames of first images are interfaces displayed by the first electronic device at different times. For example, as shown in fig. 5 (b), the user clicks the "screen recording" control, and the electronic device receives an operation of clicking the "screen recording" by the user. Optionally, a user may also trigger a screen recording operation through screen recording software, and a specific trigger manner of the screen recording operation is not limited in the embodiment of the present application, and is only an exemplary illustration here.
Illustratively, when the first operation is a screen sharing operation, the screen sharing operation is used for acquiring an interface displayed by the first electronic device. For example, as shown in (c) of fig. 5, the user clicks the "wireless screen projection" control, and the electronic device receives a screen sharing operation of the user. The specific triggering manner of the screen sharing operation in the embodiment of the present application is not limited, and is only an exemplary illustration here.
For example, when the first operation is a screen projection operation, the user may trigger the screen projection operation by clicking a screen projection control in the first application in a first application run by the first electronic device. For example, as shown in fig. 5 (d), the first electronic device runs the first application to watch a video, the user may select the screen-projecting device after clicking the screen-projecting control in the first application, and the electronic device receives a screen-projecting operation of the user. The specific triggering manner of the screen-projection operation in the embodiment of the present application is not limited, and is only an exemplary illustration here.
It should be noted that, in the embodiment of the present application, a screen projection scene and a screen sharing scene are not strictly distinguished, and all scenes in which an interface displayed by the first electronic device is projected onto the second electronic device may be referred to as a screen projection scene or a screen sharing scene. The operation of the user triggering the interface displayed by the first electronic device to be projected on the second electronic device can be called screen sharing operation or screen projection operation. For example, as shown in fig. 5 (c), the operation of the user clicking the "wireless screen projection" control may also be referred to as a screen projection operation. For another example, as shown in fig. 5 (d), after clicking the screen-casting control in the first application, the user may select the screen-casting device, and this series of operations may also be referred to as screen sharing operations.
Optionally, when the first image is obtained by the first operation, the first operation may be implemented by one triggering action, or may be implemented by a plurality of triggering actions.
S403, responding to a first operation of a user, if the first electronic device determines that a first image layer in the first image comprises a safety identification, replacing or covering the first image layer with a first preset image layer by the first electronic device, and generating a second image.
Illustratively, in response to a screen capture operation, a screen recording operation, a screen sharing operation or a screen projection operation of a user, the first electronic device determines whether a plurality of layers included in the first image include the security identifier.
Alternatively, the security identifier may be a preconfigured identifier for the application or system. For example, an application or system may configure security identifiers for security-related layers relating to copyright, user privacy, and the like in advance. Optionally, the security identifier may be layoutparams.
In an implementation manner, when the first electronic device determines that a first layer in the first image includes the security identifier, the first layer may be replaced with a first preset layer, and a second image is generated.
For example, the first electronic device may replace the first image layer with a first preset image layer, and synthesize a second image layer, which does not include the security identifier, in the first image with the first preset image layer to generate a second image. That is to say, when the first electronic device generates the second image, the first preset layer is used to replace the first layer in the first image, and then the second layer not including the security identifier in the first image is synthesized with the first preset layer to obtain the second image. Therefore, the generated second image does not include the first image layer any more, so that the copyright can be protected if the first image layer relates to the copyright, and the privacy of the user can be protected if the first image layer includes user privacy information.
In this implementation manner, the first layer is replaced by the first preset layer, so that the generated second image does not include the first layer any more, and it is ensured that the generated second image does not include user privacy information or copyright information. According to the scheme, copyright or user privacy information can be protected without manual editing by a user, and user experience is improved.
In another implementation manner, when the first electronic device determines that the first layer in the first image includes the security identifier, the first layer may be covered with a first preset layer, and a second image is generated.
For example, when the first electronic device covers the first layer with the first preset layer, the plurality of layers of the first image may be synthesized with the first preset layer, and during synthesis, the first preset layer is located on the first layer, so that the first layer may be covered by the first preset layer.
In this implementation, although the second image still includes the first image layer, since the first image layer is covered by the first preset image layer, the generated second image does not display the first image layer, that is, the first image layer is invisible to the user, so that it can be ensured that the generated second image does not display user privacy information or copyright information. According to the scheme, copyright or user privacy information can be protected without manual editing by a user, and user experience is improved.
Optionally, the first preset image layer may include a prompt message, where the prompt message is used to prompt the user that the first image includes the security information. The security information is related to security and may relate to user privacy or copyright, etc. The prompt information can enable the user to understand the reason that the second image is different from the first image, and user experience is improved.
For example, the prompt information in the first preset layer may be text information such as "screen capture prohibited for secure interface", "screen recording prohibited for secure interface", and the like, and may also be animation or icon prompt information, and the specific content and type of the prompt information are not limited in the present application.
Optionally, the size of the first preset layer may be the same as the size of the first layer.
It can be understood that, in the display method provided in the embodiment of the present application, when an image displayed by the first electronic device is acquired, whether the first image includes a security identifier is recognized by the first electronic device, and when it is determined that the first image layer in the first image includes the security identifier, the first image layer is replaced or covered by the first preset image layer, and the second image is generated, so that the first image layer is not displayed in the generated second image, and it is ensured that the generated second image protects the privacy information and the copyright of the user. According to the scheme, the copyright or the user privacy information can be protected without manual editing by a user, and the user can understand the behavior by prompting that the current page of the user relates to safety, so that the user experience is improved.
Alternatively, as shown in fig. 6, in the case that the first operation is a screen capture operation or a screen recording operation, the display method may further include step S404 in addition to steps S401 to S403.
And S404, the first electronic equipment displays the second image.
Illustratively, the first electronic device generates a second image after replacing or overlaying the first layer in the first image, and displays the processed second image on the display screen. It is to be understood that the second image displayed by the first electronic device does not relate to copyright or privacy information.
For example, in a screen capture scene, taking the first image displayed by the mobile phone as shown in (a) in fig. 7 as an example, the first image shown in (a) in fig. 7 is synthesized by multiple layers, where the "person" is located, the layer relates to a copyright, and the third-party application configures a security identifier for the layer in advance. After the user triggers the screen capture operation, the mobile phone receives the screen capture operation of the user, and in response to the screen capture operation, after the mobile phone recognizes that the layer where the "person" in the first image is located includes the security identifier, the mobile phone may replace the first layer with a first preset layer, and then synthesize a second layer that does not include the security identifier in the first image with the first preset layer to generate a second image as shown in (b) in fig. 7, where the "person" is not displayed in the second image. After the mobile phone generates the second image, the second image can be displayed.
For another example, in a screen capture scene, taking a first image displayed by a mobile phone as an example shown in (c) in fig. 7, the first image shown in (c) in fig. 7 is synthesized by multiple image layers, an account password relates to user privacy information, and a third party application configures a security identifier for the image layer where the account password is located in advance. After the user triggers the screen capture operation, the mobile phone receives the screen capture operation of the user, and in response to the screen capture operation, after the mobile phone recognizes that the layer where the user account password is located in the first image includes the security identifier, the mobile phone may cover the first layer with a first preset layer to generate a second image as shown in (d) in fig. 7. It can be understood that after the first preset layer is adopted to cover the first layer, the generated second image does not display the user account password information. After the mobile phone generates the second image, the second image can be displayed.
It should be noted that, in the display method in the embodiment of the application, in the screen capture scene, when the first image displayed by the first electronic device relates to security information such as copyright or privacy, the screen capture operation of the user is not prevented, but the security information relating to copyright or privacy is not displayed in the screen capture picture (the second image), and the current interface of the user is prompted to be a secure interface, so that the user understands the behavior, and the user experience is improved.
For another example, in a screen recording scene, the display interface of the mobile phone is as shown in (a) in fig. 8 as an example. After a user triggers a screen recording operation, the mobile phone receives the screen recording operation of the user, responds to the screen recording operation, and if the mobile phone recognizes that a layer where a 'figure' in the first image is located includes a safety identifier, the mobile phone can replace the first layer with a first preset layer, and then synthesizes a second layer which does not include the safety identifier in the first image with the first preset layer to generate a second image. As shown in fig. 8 (b), the first electronic device displays the second image when recording the screen, and the "person" is not displayed in the second image.
For another example, in a screen recording scene, the display interface of the mobile phone is as shown in (c) of fig. 8 as an example. After the user triggers the screen recording operation, the mobile phone receives the screen recording operation of the user, responds to the screen recording operation, and can cover the first image layer by adopting a first preset image layer to obtain a second image after the mobile phone recognizes that the image layer where the user account password is located in the first image comprises the safety identification. As shown in fig. 8 (d), the mobile phone displays the second image while recording the screen. It can be understood that after the first preset layer is adopted to cover the first layer, the generated second image does not display the user account password information.
It should be noted that, in a screen recording scene, when a first image displayed by a first electronic device relates to security information such as copyright or privacy, a recording process is not interrupted, the security information relating to copyright or privacy is not displayed on the first electronic device, and a current interface of a user is prompted to be a secure interface, so that the user understands the behavior, and user experience is improved.
According to the display method provided by the embodiment of the application, in response to a screen capture or screen recording operation triggered by a user, first electronic equipment acquires a first image, identifies whether the first image comprises a safety identification, replaces or covers the first image layer with a first preset image layer to generate a second image under the condition that the first image layer in the first image comprises the safety identification, and displays the second image by the first electronic equipment. Therefore, the first image layer is not displayed in the generated second image, so that the generated second image is ensured not to reveal the privacy information of the user or infringe the copyright. According to the scheme, copyright or user privacy information can be protected without manual editing by a user, and the user can understand the behavior and the user experience is improved by prompting the user that the current interface is a safe interface.
Alternatively, as shown in fig. 9, in the case where the first operation is a screen projection operation or a screen sharing operation, the display method may further include steps S405 to S407 in addition to the steps S401 to S403 described above.
S405, the first electronic device sends the second image to the second electronic device.
The second electronic device may be the same type of device as the first electronic device or a different type of device from the first electronic device.
Illustratively, in response to a screen projection operation or a screen sharing operation of a user, the first electronic device replaces or overlays a first image layer in the first image and generates a second image, and sends the second image to the second electronic device. It is to be understood that the second image sent by the first electronic device to the second electronic device does not relate to copyright or privacy information.
S406, the second electronic device receives the second image.
And S407, the second electronic device displays the second image.
For example, since the second image is an image generated after the first image replacement or overlay processing, the second image is displayed with different content from the first image, and thus the second image displayed by the second electronic device is different from the first image displayed by the first electronic device.
For example, in a screen projection or screen sharing scenario, a display interface of a mobile phone is shown as (a) in fig. 10 as an example. When a user triggers screen projection or screen sharing operation, the mobile phone receives the screen projection or screen sharing operation, and responds to the operation, and the mobile phone acquires a first image displayed by the mobile phone. Because the 'person' relates to copyright, after the mobile phone recognizes that the layer where the 'person' in the first image is located comprises the security identifier, the mobile phone may replace the first layer with a first preset layer, and then synthesize a second layer, which does not comprise the security identifier, in the first image with the first preset layer to obtain a second image. The mobile phone sends the second image to the notebook computer, and the notebook computer displays the second image on the display screen after receiving the second image, as shown in fig. 10 (b), the second image displayed by the notebook computer does not include "person".
For another example, in a screen projection or screen sharing scenario, the display interface of the mobile phone is as shown in (c) of fig. 10 as an example. When a user triggers screen projection or screen sharing operation, the mobile phone receives the screen projection or screen sharing operation, and responds to the operation, and the mobile phone acquires a first image. Because the first image includes account password information of the user, the privacy of the user is involved, and after the mobile phone recognizes that the layer where the user account password is located in the first image includes the security identifier, the first layer can be covered by a first preset layer to obtain a second image. The mobile phone sends the second image to the notebook computer, and the notebook computer displays the second image on the display screen of the notebook computer after receiving the second image, as shown in (d) of fig. 10, the second image displayed by the notebook computer does not include the privacy information of the user. As shown in fig. 10 (c) and 10 (d), when the user inputs the account password, the account password information of the user is not displayed in the mobile phone interface projected on the notebook computer.
It can be understood that, in the embodiment of the application, the first layer related to the security information in the first image is replaced or covered, so that the first layer is not displayed in the generated second image, and therefore, in a screen projection or screen sharing scene, the second image displayed by the second electronic device is different from the first image displayed by the first electronic device, thereby ensuring that the security information is not leaked.
According to the display method provided by the embodiment of the application, in response to screen projection or screen sharing operation triggered by a user, first electronic equipment acquires a first image and identifies whether the first image comprises a safety identification, under the condition that a first image layer in the first image comprises the safety identification, a first preset image layer is adopted to replace or cover the first image layer to generate a second image, the first electronic equipment sends the second image to second electronic equipment, and the second electronic equipment receives and displays the second image. Therefore, the second image displayed by the second electronic device is different from the first image displayed by the first electronic device, and the first image layer is not displayed in the second image displayed by the second electronic device, so that the generated second image is ensured not to leak privacy information of a user or infringe copyright. According to the scheme, when copyright or user privacy information is protected, operations such as screen capture and screen recording cannot be prevented, and the user can understand the behavior and improve user experience by prompting the current interface of the user to be a safe interface.
An embodiment of the present application further provides a secure display method, as shown in fig. 11, the method may further include steps S408 to S409 in addition to steps S401 to S403.
S408, the first electronic equipment receives a second operation of the user.
The second operation is to turn on the safety switch control.
Optionally, the security switch control may be displayed on a display screen of the first electronic device in a form of a suspension switch, may also be a control in a setting page of the first electronic device, and may also be a control in a pull-down menu of the first electronic device.
Illustratively, as shown in fig. 12 (a), when the user clicks the safety switch control, the mobile phone receives a click operation of opening the safety switch. The embodiment of the present application does not limit the specific action of the user to open the safety switch control, and (a) in fig. 12 is only an exemplary illustration.
Optionally, in this embodiment of the application, the sequence of the first operation and the second operation received by the first electronic device is not limited.
And S409, responding to a second operation of the user, and filtering a third image layer in the second image by the first electronic device to generate a third image.
The third layer comprises pop-up window prompt information. The pop-up window prompt message can be a short message prompt message, an application notification message and other prompt messages displayed in a pop-up window mode.
Illustratively, in the case that the user turns on the security switch control, taking the display interface of the first electronic device as shown in (b) in fig. 12 as an example, the first electronic device displays a first image including a short message prompting message, where the short message prompting message includes the user's payroll information, and relates to the privacy of the user, and the user does not want others to see his payroll information. As shown in (c) in fig. 12, in response to the screen capture operation of the user, the mobile phone replaces or covers the first layer related to security in the first image with the first preset layer, so as to obtain a second image shown in (c) in fig. 12. As shown in (d) in fig. 12, in response to the operation of turning on the security switch by the user, the mobile phone filters the layer where the short message prompt message is located in the second image to obtain a third image shown in (d) in fig. 12, where the third image does not include the short message prompt message of the user salary information.
For example, in a case where the user turns on the security switch control, taking the display interface of the first electronic device as shown in (a) in fig. 13 as an example, the first image displayed by the first electronic device includes a short message prompt message. As shown in fig. 13 (b), in response to a screen recording operation of a user, the mobile phone replaces or covers the first layer related to security in the first image with the first preset layer, so as to obtain a second image shown in fig. 13 (b). As shown in (c) in fig. 13, in response to the operation of turning on the security switch by the user, the mobile phone filters the layer where the short message prompt message is located in the second image, so as to obtain a third image shown in (c) in fig. 13.
According to the display method provided by the implementation, the popup prompt information of the first electronic device can be further filtered by opening the safety switch control, so that popup prompt information such as short message prompt information or application notification information of a user can not be seen by other users, and privacy information of the user can be better protected.
Optionally, in the scene where the first operation is screen capturing or screen recording, after the steps S408 to S409, the first electronic device may further display a third image. In the scene that the first operation is screen projection or screen sharing, the steps S408 to S409 may further include the first electronic device sending a third image to the second electronic device, the second electronic device receiving the third image, and the second electronic device displaying the third image.
The embodiment of the present application further provides a secure display method, as shown in fig. 14, the method includes steps S1401 to S1405.
And S1401, the first electronic device displays a first image.
S1402, the first electronic device receives a first operation of a user.
The first operation may be a screen capture operation, a screen recording operation, a screen projection operation, or a screen sharing operation.
And S1403, the first electronic equipment determines whether the safety switch control is started.
Optionally, if the first electronic device receives the second operation of the user before step S1403, the first electronic device determines that the security switch control is turned on. The second operation is to turn on the safety switch control.
Optionally, if the first electronic device does not receive the second operation of the user before step S1403, the first electronic device determines that the security switch control is not turned on.
And S1404, under the condition that the first electronic device determines that the security switch control is not started, responding to the first operation, and if the first electronic device determines that a first layer in the first image comprises the security identifier, replacing or covering the first layer with a first preset layer by the first electronic device to generate a second image.
S1405, in response to the first operation when the first electronic device determines that the security switch control is turned on, if the first electronic device determines that the first layer in the first image includes the security identifier, the first electronic device replaces or covers the first layer with a first preset layer, and filters the third layer to generate a third image.
The third layer comprises pop-up window prompt information. The popup prompt message may be a message displayed in a popup manner, such as a short message prompt message, an application notification message, and the like.
It should be noted that, in the embodiment of the application, the first electronic device in step S1405 uses the first preset layer to replace or cover the first layer, and the sequence of executing the filtering of the third layer is not limited, for example, the first electronic device may first use the first preset layer to replace or cover the first layer, and then filter the third layer. Or the third layer may be filtered first, and then the first layer is replaced or covered by the first preset layer. And replacing or covering the first layer by adopting the first preset layer and filtering the third layer. It can be understood that the scheme of the first electronic device first replacing or covering the first layer with the first preset layer and then filtering the third layer is the same as the scheme in step S409.
It is understood that the difference between step S1404 and step S1405 is whether the safety switch control is turned on. Under the condition that the safety switch control is opened, the first electronic device not only needs to replace or cover the layer including the safety identification, but also needs to filter popup prompt information. And under the condition that the safety switch control is not started, the first electronic device only needs to replace or cover the layer comprising the safety identification.
It is understood that the specific implementation manner of the above steps S1401-S1405 can refer to the specific implementation manner of the foregoing embodiments.
According to the display method provided by the embodiment of the application, after receiving a first operation of a user, the first electronic device further determines whether the security switch is turned on, and responds to the first operation when the first electronic device determines that the security switch control is not turned on, and if the first electronic device determines that a first layer in the first image includes the security identifier, the first electronic device replaces or covers the first layer with a first preset layer to generate a second image. And under the condition that the first electronic device determines that the safety switch control is started, responding to the first operation, if the first electronic device determines that a first layer in the first image comprises the safety identification, replacing or covering the first layer with a first preset layer, filtering a third layer, and generating a third image. Therefore, the generated third image can not reveal privacy information of the user or infringe copyright, and the pop-up window prompt information of the user can be further protected from being seen by other users, so that the user experience is improved.
Optionally, in the scene where the first operation is screen capturing or screen recording, after step S1404, the first electronic device may further display a second image. In the scene where the first operation is screen projection or screen sharing, the step S1404 may further include the first electronic device sending a second image to the second electronic device, the second electronic device receiving the second image, and the second electronic device displaying the second image.
Optionally, in the scene where the first operation is screen capturing or screen recording, after step S1405, the first electronic device may further display a third image. In the scene where the first operation is screen projection or screen sharing, step S1405 may further include the first electronic device sending a third image to the second electronic device, the second electronic device receiving the third image, and the second electronic device displaying the third image.
The embodiment of the present application further provides a security display method, as shown in fig. 15, the method includes steps S1501 to S1503.
S1501, the first electronic device displays a first image.
S1502, the first electronic device receives a first operation of a user.
The first operation is for acquiring a first image.
Optionally, the first operation may include a screen capture operation, a screen recording operation, a screen sharing operation, or a screen projection operation. It should be noted that the first operation in the embodiment of the present application may also be another operation for acquiring an image displayed by an electronic device, and the embodiment of the present application is specific to and limited to the first operation.
S1503, responding to a first operation of the user, and if the first electronic device determines that the first control in the first image comprises the security identifier, the first electronic device covers the first control by using a second preset layer to generate a fourth image.
Optionally, the covering, by the first electronic device, the first control by using the second preset layer may include adding a watermark, mosaic, or fuzzy processing to the first control by the first electronic device.
Illustratively, in response to a screen capture operation, a screen recording operation, a screen sharing operation or a screen projection operation of a user, the first electronic device determines whether a control included in the first image includes a security identifier. Optionally, the first image may include a plurality of security controls, and the plurality of security controls may be controls in one layer or controls in a plurality of layers.
Optionally, the security identifier may be a security identifier pre-configured for the application or the system. For example, an application or system may pre-configure security identities for user security related controls related to user privacy, such as account controls, password controls, keyboard controls, and the like. Optionally, the security identifier may be layoutparams.
Optionally, the second preset image layer may include a prompt message, where the prompt message is used to prompt the user that the first image includes the security information. The security information is related to security and may relate to user privacy or copyright, etc. The specific content of the prompt information is not limited in the present application.
For example, the first electronic device covers the first control with the second preset layer to generate the fourth image, which may include: the method comprises the steps that first electronic equipment obtains position information of a first control in a first image; based on the position information, the first electronic device covers the area where the first control is located by adopting a second preset layer, and a fourth image is generated.
Optionally, when the first electronic device determines that the first control in the first image includes the security identifier, the first control may be covered by a second preset layer, for example, when the first electronic device generates the fourth image, the second preset layer may be located on the layer where the first control is located, so that the first control may be covered by the second preset layer.
In this implementation manner, since the first control is covered by the second preset layer, the generated fourth image does not display the first control, that is, the first control is invisible to the user, so that it can be ensured that the generated fourth image does not display the user privacy information. According to the scheme, copyright or user privacy information can be protected without manual editing by a user, and user experience is improved.
Optionally, the step S1503 may further include: the first electronic device displays the fourth image.
For example, as shown in fig. 16, in a screen capture scene, taking a first image displayed by a mobile phone as shown in (a) in fig. 16 as an example, a third-party application configures security identifiers for an account control and a password control in advance. After a user triggers a screen capturing operation, the mobile phone receives the screen capturing operation of the user, responds to the screen capturing operation, and after the account control and the password control in the first image are identified to include the safety identification, position information of the account control and the password control in the first image can be obtained, and a second preset image layer is adopted to respectively cover the area where the account control is located and the area where the password control is located, so that a fourth image is generated. The fourth image is as shown in (b) in fig. 16, and both the account control and the password control in the fourth image are covered by the second preset layer.
For another example, as shown in fig. 17, in a screen recording scene, taking a first image displayed by a mobile phone as shown in (a) in fig. 17 as an example, the third-party application configures security identifiers for an account control and a password control in advance. When a user triggers a screen capture operation, after the mobile phone recognizes that the account control and the password control in the first image comprise the security identification, the position information of the account control and the password control in the first image can be acquired, and a second preset layer is adopted to cover the region where the account control is located and the region where the password control is located respectively to generate a fourth image. As shown in fig. 17 (b), the account control and the password control in the fourth image are both covered by a second preset layer.
Optionally, after the step S1503, the method may further include: the first electronic device sends the fourth image to the second electronic device, the second electronic device receives the fourth image, and the second electronic device displays the fourth image.
For example, as shown in fig. 18, in a screen-shooting scenario, taking a first image displayed by a mobile phone as shown in (a) in fig. 18 as an example, a third-party application configures security identifiers for an account control and a password control in advance. When a user triggers a screen-casting operation, after the mobile phone recognizes that the account control and the password control in the first image comprise the security identification, the position information of the account control and the password control in the first image can be acquired, and a second preset layer is adopted to cover the region where the account control is located and the region where the password control is located respectively to generate a fourth image. And the mobile phone sends the fourth image to the notebook computer, and the notebook computer receives and displays the fourth image. As shown in fig. 18 (b), the account control and the password control in the fourth image displayed on the notebook computer are both covered by the second preset layer.
It can be understood that, in the display method provided in the embodiment of the present application, when an image displayed by the first electronic device is acquired, if the first electronic device recognizes that the first control in the first image includes the security identifier, the first electronic device covers the first control with the second preset layer, and generates the fourth image, so that the generated fourth image does not display information of the first control, and it is ensured that the generated fourth image does not reveal privacy information of the user. The scheme can process the safety control, so that the information of the control can not be seen by other users, the safety of the users is protected, and the user experience is further improved due to the fact that the safety processing area is smaller.
Alternatively, as shown in fig. 19, in the case where the first operation is a screen capture operation or a screen recording operation, the display method may further include steps S1504 to S1505 in addition to the steps S1501 to S1503 described above.
S1504, the first electronic equipment receives a second operation of the user.
The second operation is to turn on the safety switch control.
S1505, in response to a second operation of the user, the first electronic device filters a third layer in the fourth image to generate a fifth image.
The third layer comprises pop-up window prompt information. The pop-up window prompt message may be a message displayed in a pop-up window manner, such as a short message prompt message and an application notification message.
Illustratively, in the case that the user turns on the security switch control, taking the display interface of the first electronic device as shown in (a) in fig. 20 as an example, the first electronic device displays a first image including a short message prompting message, where the short message prompting message includes the user's payroll information, and relates to the privacy of the user, and the user does not want others to see his payroll information. As shown in fig. 20 (b), in response to a screen capture operation of the user, the mobile phone uses the second preset layer to overlay the account control and the password control related to security in the first image, so as to obtain a fourth image shown in fig. 20 (b). In response to the operation of opening the security switch by the user, the mobile phone filters the layer where the short message prompt message is located in the fourth image to obtain a fifth image shown in (c) in fig. 20, where the fifth image does not include the short message prompt message of the user payroll information.
According to the display method provided by the implementation, the popup prompt message of the first electronic device can be further filtered by opening the safety switch control, so that the popup prompt message such as a short message prompt message or an application notification message of a user can not be seen by other users, and privacy safety information for the user can be better protected.
Optionally, in the scenario that the first operation is screen capture or screen recording, the foregoing steps S1504 to S1505 may be followed by: the first electronic device displays the fifth image. In the scene where the first operation is screen projection or screen sharing, the steps S1504 to S1505 may be followed by: and the first electronic equipment sends the fifth image to the second electronic equipment, the second electronic equipment receives the fifth image, and the second electronic equipment displays the fifth image.
An embodiment of the present application further provides a secure display method, as shown in fig. 21, the method includes steps S2101 to S2105.
S2101, the first electronic device displays a first image.
S2102, the first electronic device receives a first operation of a user.
The first operation may be a screen capture operation, a screen recording operation, a screen projection operation, or a screen sharing operation.
S2103, the first electronic device determines whether the safety switch control is started.
Optionally, if the first electronic device receives the second operation of the user before step S2103, the first electronic device determines that the security switch control is turned on. The second operation is to turn on the safety switch control.
Optionally, if the first electronic device does not receive the second operation of the user before step S2103, the first electronic device determines that the security switch control is not turned on.
S2104, under the condition that the first electronic device determines that the security switch control is not turned on, responding to the first operation, and if the first electronic device determines that the first control in the first image includes the security identifier, the first electronic device covers the first control with a second preset layer to generate a fourth image.
S2105, in response to the first operation when the first electronic device determines that the security switch control is turned on, if the first electronic device determines that the first control in the first image includes the security identifier, the first electronic device covers the first control with a second preset layer, and filters the third layer to generate a fifth image.
The third layer comprises pop-up window prompt information. The popup prompt message may be a message displayed in a popup manner, such as a short message prompt message, an application notification message, and the like.
It should be noted that, in the embodiment of the application, the first electronic device in step S2105 uses the second preset layer to cover the first control, and the sequence of executing the filtering of the third layer is not limited, for example, the first electronic device may first use the second preset layer to cover the first control, and then filter the third layer. Or filtering the third layer first, and then covering the first control by adopting a second preset layer. And simultaneously covering the first control by adopting a second preset layer and filtering a third layer. It can be understood that a scheme of the first electronic device that first covers the first control with the second preset layer and then filters the third layer is the same as the scheme in step S1505 above.
It can be understood that the difference between the foregoing step S2104 and step S2105 is that, in the case that the security switch control is turned on, the first electronic device not only needs to perform the overlay processing on the control including the security identifier, but also needs to filter the pop-up window prompt information. And under the condition that the safety switch control is not started, the first electronic equipment only needs to carry out covering processing on the control comprising the safety identification.
It is understood that the specific implementation manners of the above steps S2101-S2105 can refer to the specific implementation manners of the foregoing embodiments.
According to the display method provided by the embodiment of the application, after receiving a first operation of a user, the first electronic device further determines whether the security switch is turned on, and responds to the first operation when the first electronic device determines that the security switch control is not turned on, and if the first electronic device determines that the first control in the first image includes the security identifier, the first electronic device covers the first control with the second preset layer to generate the fourth image. And under the condition that the first electronic device determines that the safety switch control is started, responding to the first operation, if the first electronic device determines that the first control in the first image comprises the safety identification, covering the first control by adopting a second preset layer, filtering a third layer, and generating a fifth image. Therefore, the generated fifth image can not reveal privacy information of the user or infringe copyright, the popup prompt information of the user can be further protected from being seen by other users, and user experience is improved. In addition, the scheme processes the safety control, so that the information of the control cannot be seen by other users, the safety of the users is protected, and the user experience is further improved due to the fact that the safety processing area is smaller.
Optionally, in the scene where the first operation is screen capturing or screen recording, after step S2104, the first electronic device may further display a fourth image. In a scene that the first operation is screen projection or screen sharing, after the step S2104, the first electronic device may further send a fourth image to the second electronic device, the second electronic device receives the fourth image, and the second electronic device displays the fourth image.
Optionally, in the scene where the first operation is screen capturing or screen recording, after step S2105, the first electronic device may further display a fifth image. In the scene where the first operation is screen projection or screen sharing, the step S2105 may further include the first electronic device sending a fifth image to the second electronic device, the second electronic device receiving the fifth image, and the second electronic device displaying the fifth image.
The above description mainly introduces the solutions provided by the embodiments of the present invention from the perspective of method steps. It is understood that the terminal device includes hardware structures and/or software modules for performing the respective functions in order to implement the functions. Those of skill in the art would readily appreciate that the present application is capable of being implemented as a combination of hardware and computer software for carrying out the various example elements and algorithm steps described in connection with the embodiments disclosed herein. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiment of the present application, the electronic device (including the first electronic device and the second electronic device) may be divided into the functional modules, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
For example, in a case that each functional module is divided in an integrated manner, as shown in fig. 22, a block diagram of an electronic device provided in the embodiment of the present application is shown. For example, the electronic device may be the first electronic device or the second electronic device. As shown in fig. 22, the electronic device may include a processing unit 2210 and a transceiving unit 2220.
Wherein the processing unit 2210 is configured to enable the electronic device to perform the above-described steps S401-S403, S404, S408-S409, S1401-1405, S1501-S1503, S1504-S1505, S2101-S2105, and/or other processes for the techniques described herein, when the electronic device is a first electronic device. The transceiving unit 1620 is configured to transmit the second image, the third image, the fourth image, or the fifth image to the second electronic device, and/or other processes for the techniques described herein.
In one possible configuration, as shown in fig. 23, the electronic device may further include a storage unit 2230. The storage unit 2230 is used for storing computer programs and processing data and/or processing results for implementing the methods provided by the embodiments of the present application.
It should be noted that the transceiver 2220 may include a radio frequency circuit. Specifically, the portable device may receive and transmit wireless signals through the radio frequency circuit. In general, radio frequency circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency circuitry may also communicate with other devices via wireless communication. The wireless communication may use any communication standard or protocol including, but not limited to, global system for mobile communications, general packet radio service, code division multiple access, wideband code division multiple access, long term evolution, email, short message service, and the like.
It should be understood that the modules in the electronic device may be implemented in software and/or hardware, and are not particularly limited thereto. In other words, the electronic device is presented in the form of a functional module. As used herein, a "module" may refer to an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor and memory that execute one or more software or firmware programs, an integrated logic circuit, and/or other devices that may provide the described functionality. Alternatively, in a simple embodiment, one skilled in the art will recognize that the portable device may take the form shown in FIG. 24. Processing unit 2210 may be implemented by processor 2410, shown in fig. 24. The transceiving unit 2220 may be implemented by the transceiver 2420 shown in fig. 24. In particular, the processor is implemented by executing a computer program stored in the memory. Optionally, the memory is a storage unit in the chip, such as a register, a cache, and the like, and the storage unit may also be a storage unit located outside the chip in the computer device, such as the memory 2430 shown in fig. 24.
In an alternative, when the data transfer is implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in the embodiments of the present application are implemented in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in, or transmitted from, a computer-readable storage medium to another computer-readable storage medium, for example, from one website, computer, server, or data center, over a wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.) network, the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more integrated servers, data centers, etc., the available medium may be magnetic media (e.g., floppy disks, hard disks, magnetic tapes), optical media (e.g., digital video disks (digital video disks, DVD), or a semiconductor medium such as a Solid State Disk (SSD).
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware or may be embodied in software instructions executed by a processor. The software instructions may consist of corresponding software modules that may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. In addition, the ASIC may reside in a probing apparatus. Of course, the processor and the storage medium may reside as discrete components in the probe device.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.

Claims (26)

1. A secure display method, the method comprising:
the first electronic equipment displays a first image;
the first electronic equipment receives a first operation of a user, wherein the first operation is used for acquiring the first image;
responding to a first operation of a user, if the first electronic device determines that a first image layer in the first image includes a security identifier, replacing or covering the first image layer with a first preset image layer by the first electronic device, and generating a second image.
2. The method according to claim 1, wherein the first electronic device replaces the first image layer with a first preset image layer and generates a second image, and the method comprises:
the first electronic equipment replaces the first layer with a first preset layer;
the first electronic device synthesizes a second layer in the first image with the first preset layer to generate a second image; the second layer does not include the security identifier.
3. The method according to claim 1 or 2, wherein the first preset image layer includes a prompt message for prompting a user that the first image includes security information.
4. The method of any of claims 1-3, wherein the first operation comprises a screen capture operation, a screen cast operation, or a screen share operation.
5. The method according to claim 4, wherein in a case where the first operation is a screen capture operation or a screen recording operation, the method further comprises:
the first electronic device displays the second image.
6. The method according to claim 4, wherein in a case where the first operation is a screen-casting operation or a screen-sharing operation, the method further comprises:
and the first electronic equipment sends the second image to second electronic equipment.
7. The method according to any one of claims 1-4, further comprising:
the first electronic equipment receives a second operation of a user, wherein the second operation is used for starting a safety switch control;
responding to a second operation of a user, filtering a third image layer in the second image by the electronic equipment, and generating a third image; the third layer comprises pop-up window prompt information.
8. The method according to claim 7, wherein in a case where the first operation is a screen capture operation or a screen recording operation, the method further comprises:
the first electronic device displays the third image.
9. The method according to claim 7, wherein in a case where the first operation is a screen-casting operation or a screen-sharing operation, the method further comprises:
and the first electronic equipment sends the third image to second electronic equipment.
10. A secure display method, the method comprising:
the first electronic equipment displays a first image;
the first electronic equipment receives a first operation of a user, wherein the first operation is used for acquiring the first image;
responding to a first operation of a user, and if the first electronic device determines that a first control in the first image comprises a security identifier, the first electronic device covers the first control by using a second preset layer to generate a fourth image.
11. The method of claim 10, wherein the first electronic device overlays the first control with a second preset layer, and generates a fourth image, comprising:
the first electronic equipment acquires position information of the first control in the first image;
based on the position information, the first electronic device covers the area where the first control is located by adopting a second preset layer, and a fourth image is generated.
12. The method according to claim 10 or 11, wherein the second preset layer includes a prompt message for prompting a user that the first control includes security information.
13. The method of any of claims 10-12, wherein the first operation comprises a screen capture operation, a screen cast operation, or a screen share operation.
14. The method according to claim 13, wherein in a case where the first operation is a screen capture operation or a screen recording operation, the method further comprises:
the first electronic device displays the fourth image.
15. The method according to claim 13, wherein in a case where the first operation is a screen-casting operation or a screen-sharing operation, the method further comprises:
and the first electronic equipment sends the fourth image to second electronic equipment.
16. The method according to any one of claims 10-13, further comprising:
the first electronic equipment receives a second operation of a user, wherein the second operation is used for starting a safety switch control;
responding to a second operation of a user, filtering a third layer in the fourth image by the electronic equipment, and generating a fifth image; the third layer comprises pop-up window prompt information.
17. The method according to claim 16, wherein in a case where the first operation is a screen capture operation or a screen recording operation, the method further comprises:
the first electronic device displays the fifth image.
18. The method according to claim 16, wherein in a case where the first operation is a screen-casting operation or a screen-sharing operation, the method further comprises:
and the first electronic equipment sends the fifth image to second electronic equipment.
19. A secure display method, the method comprising:
the first electronic equipment displays a first image;
the first electronic equipment receives a first operation of a user, wherein the first operation is used for acquiring the first image;
under the condition that first electronic equipment determines that a safety switch control is not started, responding to the first operation, and if the first electronic equipment determines that a first image layer in the first image comprises a safety identification, replacing or covering the first image layer by a first preset image layer through the first electronic equipment to generate a second image;
responding to the first operation when first electronic equipment determines that a security switch control is started, and if the first electronic equipment determines that a first layer in the first image comprises a security identifier, replacing or covering the first layer with a first preset layer, and filtering a third layer to generate a third image; the third layer comprises pop-up window prompt information.
20. The method of claim 19, wherein the first operation comprises a screen capture operation, a screen cast operation, or a screen share operation.
21. A secure display method, the method comprising:
the first electronic equipment displays a first image;
the first electronic equipment receives a first operation of a user, wherein the first operation is used for acquiring the first image;
responding to the first operation when first electronic equipment determines that a safety switch control is not started, and if the first electronic equipment determines that a first control in the first image comprises a safety identification, covering the first control by the first electronic equipment through a second preset layer to generate a fourth image;
under the condition that first electronic equipment determines that a safety switch control is started, responding to the first operation, if the first electronic equipment determines that a first control in the first image comprises a safety identification, replacing or covering the first image layer with a second preset image layer by the first electronic equipment, and filtering a third image layer to generate a fifth image; the third layer comprises pop-up window prompt information.
22. The method of claim 21, wherein the first operation comprises a screen capture operation, a screen cast operation, or a screen share operation.
23. An electronic device, characterized in that the electronic device comprises:
a memory for storing a computer program;
a transceiver for receiving or transmitting a radio signal;
a processor for executing the computer program such that the electronic device implements the method of any of claims 1-22.
24. A computer-readable storage medium, having computer program code stored thereon, which, when executed by processing circuitry, implements the method of any of claims 1-22.
25. A chip system, comprising a processing circuit, a storage medium having computer program code stored therein; the computer program code realizing the method of any of claims 1-22 when executed by the processing circuit.
26. A computer program product for running on a computer to implement the method of any one of claims 1-22.
CN202011224998.5A 2020-11-05 2020-11-05 Safety display method and electronic equipment Pending CN114528581A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011224998.5A CN114528581A (en) 2020-11-05 2020-11-05 Safety display method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011224998.5A CN114528581A (en) 2020-11-05 2020-11-05 Safety display method and electronic equipment

Publications (1)

Publication Number Publication Date
CN114528581A true CN114528581A (en) 2022-05-24

Family

ID=81619634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011224998.5A Pending CN114528581A (en) 2020-11-05 2020-11-05 Safety display method and electronic equipment

Country Status (1)

Country Link
CN (1) CN114528581A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361365A (en) * 2022-08-10 2022-11-18 深圳乐播科技有限公司 Video stream-based processing method and related device
CN116437006A (en) * 2023-06-14 2023-07-14 深圳市英迈通信技术有限公司 Information security management system and method for mobile phone screen throwing

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361365A (en) * 2022-08-10 2022-11-18 深圳乐播科技有限公司 Video stream-based processing method and related device
CN115361365B (en) * 2022-08-10 2023-09-05 深圳乐播科技有限公司 Video stream-based processing method and related device
CN116437006A (en) * 2023-06-14 2023-07-14 深圳市英迈通信技术有限公司 Information security management system and method for mobile phone screen throwing
CN116437006B (en) * 2023-06-14 2023-09-08 深圳市英迈通信技术有限公司 Information security management system and method for mobile phone screen throwing

Similar Documents

Publication Publication Date Title
CN109766066B (en) Message processing method, related device and system
WO2020259452A1 (en) Full-screen display method for mobile terminal, and apparatus
CN113645351B (en) Application interface interaction method, electronic device and computer-readable storage medium
CN111602379B (en) Voice communication method, electronic equipment and system
WO2020062159A1 (en) Wireless charging method and electronic device
CN113722058B (en) Resource calling method and electronic equipment
CN111913750B (en) Application program management method, device and equipment
CN113496426A (en) Service recommendation method, electronic device and system
US20230351048A1 (en) Application Permission Management Method and Apparatus, and Electronic Device
WO2021052204A1 (en) Address book-based device discovery method, audio and video communication method, and electronic device
CN113452945A (en) Method and device for sharing application interface, electronic equipment and readable storage medium
CN114095599A (en) Message display method and electronic equipment
US20240098354A1 (en) Connection establishment method and electronic device
CN113973398A (en) Wireless network connection method, electronic equipment and chip system
CN113490291B (en) Data downloading method and device and terminal equipment
CN114528581A (en) Safety display method and electronic equipment
US20220377278A1 (en) Video Communication Method and Video Communications Apparatus
CN114006698B (en) token refreshing method and device, electronic equipment and readable storage medium
CN115706916A (en) Wi-Fi connection method and device based on position information
CN114827098A (en) Method and device for close shooting, electronic equipment and readable storage medium
CN110737916A (en) Communication terminal and processing method
CN111339513A (en) Data sharing method and device
WO2023029964A1 (en) Application component display method, electronic device, and storage medium
WO2022042774A1 (en) Profile picture display method and electronic device
CN115706994A (en) Access control method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination