CN104219053A - Information displaying method, information concealing method and information concealing device - Google Patents

Information displaying method, information concealing method and information concealing device Download PDF

Info

Publication number
CN104219053A
CN104219053A CN201410429501.1A CN201410429501A CN104219053A CN 104219053 A CN104219053 A CN 104219053A CN 201410429501 A CN201410429501 A CN 201410429501A CN 104219053 A CN104219053 A CN 104219053A
Authority
CN
China
Prior art keywords
authentication mechanism
information content
verification operation
layer
camouflage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410429501.1A
Other languages
Chinese (zh)
Other versions
CN104219053B (en
Inventor
鲍协浩
戚冬杰
赵振海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410429501.1A priority Critical patent/CN104219053B/en
Publication of CN104219053A publication Critical patent/CN104219053A/en
Application granted granted Critical
Publication of CN104219053B publication Critical patent/CN104219053B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses an information displaying method, an information concealing method and an information concealing device, and belongs to the technical field of information safety. The information displaying method comprises the following steps of receiving a first type of verification operation for verifying an optional layer in (n-1) layers of verification mechanisms in (n) layers of verification mechanisms under the condition that (n) is greater than and equal to 2; displaying a disguised information content which is used for disguising the original information content when the first type of verification operation passes; receiving a second type of verification operation for verifying a (n)th verification mechanism; and displaying the original information content when the second type of verification operation passes. The problem that the safety of information in a correlation technique is poor is solved; and the original information content can be disguised by the disguised information content, so that others know the original information content difficultly, and the information safety effect is improved.

Description

Method for information display, information concealing method and device
Technical field
The disclosure relates to field of information security technology, particularly a kind of method for information display, information concealing method and device.
Background technology
It is that one increases authentication mechanism in note application that note is hidden, and prevents other people from arbitrarily checking the function of whole note.
Usually in note application, arrange a secret entrance in correlation technique, user just can see the note be hidden after needing to input correct authentication password in this secret entrance.But under the scene that user is coerced by other people, after user inputs correct authentication password, other people also can read the hiding note of user.
Disclosure
In order to solve the poor problem of Information Security in correlation technique, present disclose provides a kind of method for information display, information concealing method and device.Described technical scheme is as follows:
According to the first aspect of disclosure embodiment, a kind of method for information display is provided, comprises:
Receive the first kind verification operation being used for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism, n >=2;
When described first kind verification operation is verified, the display camouflage information content, the described camouflage information content is used for pretending original information content;
Receive the Equations of The Second Kind verification operation being used for verifying n-th layer authentication mechanism;
When described Equations of The Second Kind verification operation is verified, show described original information content.
Optionally, described reception is used for the Equations of The Second Kind verification operation verified n-th layer authentication mechanism, comprising:
Receive the recessive verification operation being used for verifying n-th layer authentication mechanism, using described recessive verification operation as described Equations of The Second Kind verification operation, the checking entrance of the dominant prompting of checking entrance right and wrong of described recessive verification operation.
Optionally, described reception is used for the recessive verification operation verified n-th layer authentication mechanism, comprising:
Received by transducer and preset shake operation, using described default shake operation as described recessive verification operation;
And/or,
Received by touch-screen and preset gesture operation, using described default gesture operation as described recessive verification operation;
And/or,
Voice messaging is preset, using described default voice messaging as described recessive verification operation by microphones;
And/or,
The button operation presetting rule is received, using the button operation of described default rule as described recessive verification operation by physical button or virtual key;
And/or,
Receive to preset by described touch-screen and knock operation, described presetting is knocked operation as described recessive verification operation.
Optionally, described when described first kind verification operation is verified, the display camouflage information content, comprising:
When the described first kind verification operation corresponding to i-th layer of authentication mechanism in front n-1 layer authentication mechanism is verified, show the camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤n-1.
Optionally, described method also comprises:
Obtain the display duration of described original information content; Detect the described display duration got and whether exceed scheduled duration; If described display duration exceedes described scheduled duration, then reactivate described n layer authentication mechanism;
And/or,
If when showing described original information content, receiving the triggering signal of interrupting display, then reactivating described n layer authentication mechanism.
According to the second aspect of disclosure embodiment, a kind of information concealing method is provided, comprises:
N layer authentication mechanism is arranged to original information content, n >=2;
Arrange the camouflage information content to n-1 layer authentication mechanism before in described n layer authentication mechanism, described camouflage information is used for showing when described front n-1 layer authentication mechanism is verified.
Optionally, described n layer authentication mechanism is arranged to original information content, comprising:
Be arranged through the front n-1 layer authentication mechanism that first kind verification operation carries out verifying;
Be arranged through the n-th layer authentication mechanism that Equations of The Second Kind verification operation carries out verifying.
Optionally, described in be arranged through the n-th layer authentication mechanism that Equations of The Second Kind verification operation carries out verifying, comprising:
Be arranged through the n-th layer authentication mechanism that recessive verification operation carries out verifying, described recessive verification operation as described Equations of The Second Kind verification operation, the checking entrance of the dominant prompting of checking entrance right and wrong of described recessive verification operation.
Optionally, described recessive verification operation comprises: preset shake operation, preset gesture operation, preset voice messaging, preset the button operation of rule and preset at least one of knocking in operation.
Optionally, described the camouflage information content is arranged to n-1 layer authentication mechanism before in described n layer authentication mechanism, comprising:
The camouflage information content of the i-th layer of authentication mechanism corresponded in described front n-1 layer authentication mechanism is set respectively, 1≤i≤n-1.
Optionally, the described camouflage information content arranging the i-th layer of authentication mechanism corresponded in described front n-1 layer authentication mechanism respectively, comprising:
Obtain the information content of system default, using the described information content that gets as the camouflage information content corresponding to described i-th layer of authentication mechanism;
And/or,
Obtain the sensitive content in described original information content, using the content in described original information content except described sensitive content as the camouflage information content corresponding to described i-th layer of authentication mechanism;
And/or,
Receiving user be the information content that described original information content is arranged, using the described information content that receives as the camouflage information content corresponding to described i-th layer of authentication mechanism.
According to the third aspect of disclosure embodiment, a kind of information display device is provided, comprises:
First operation receiver module, is configured to receive the first kind verification operation for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism, n >=2;
Camouflage content display module, be configured to when the described first kind verification operation received described first operation receiver module is verified, the display camouflage information content, the described camouflage information content is used for pretending original information content;
Second operation receiver module, is configured to receive the Equations of The Second Kind verification operation for verifying n-th layer authentication mechanism;
Original contents display module, is configured to, when the described Equations of The Second Kind verification operation received described second operation receiver module is verified, show described original information content.
Optionally, described second operation receiver module, be configured to receive the recessive verification operation for verifying n-th layer authentication mechanism, using described recessive verification operation as described Equations of The Second Kind verification operation, the checking entrance of the dominant prompting of checking entrance right and wrong of described recessive verification operation.
Optionally, described second operation receiver module, is configured to:
Received by transducer and preset shake operation, using described default shake operation as described recessive verification operation;
And/or,
Received by touch-screen and preset gesture operation, using described default gesture operation as described recessive verification operation;
And/or,
Voice messaging is preset, using described default voice messaging as described recessive verification operation by microphones;
And/or,
The button operation presetting rule is received, using the button operation of described default rule as described recessive verification operation by physical button or virtual key;
And/or,
Receive to preset by described touch-screen and knock operation, described presetting is knocked operation as described recessive verification operation.
Optionally, described camouflage content display module, when the described first kind verification operation being configured to correspond in front n-1 layer authentication mechanism i-th layer of authentication mechanism is verified, shows the camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤n-1.
Optionally, described device also comprises:
First trigger module, is configured to the display duration obtaining described original information content; Detect the described display duration got and whether exceed scheduled duration; If described display duration exceedes described scheduled duration, then reactivate described n layer authentication mechanism;
And/or,
Second trigger module, when showing described original information content if be configured to, receive the triggering signal of interrupting display, then reactivates described n layer authentication mechanism.
According to the fourth aspect of disclosure embodiment, a kind of information concealment device is provided, comprises:
Authentication mechanism arranges module, is configured to arrange n layer authentication mechanism, n >=2 to original information content;
Camouflage curriculum offering module, be configured to arrange n-1 layer authentication mechanism before in the described n layer authentication mechanism of module installation to described authentication mechanism and arrange the camouflage information content, described camouflage information is used for showing when described front n-1 layer authentication mechanism is verified.
Optionally, described authentication mechanism arranges module, comprising:
First arranges submodule, is configured to be arranged through the front n-1 layer authentication mechanism that first kind verification operation carries out verifying;
Second arranges submodule, is configured to be arranged through the n-th layer authentication mechanism that Equations of The Second Kind verification operation carries out verifying.
Optionally, described second arranges submodule, be configured to be arranged through the n-th layer authentication mechanism that recessive verification operation carries out verifying, described recessive verification operation as described Equations of The Second Kind verification operation, the checking entrance of the dominant prompting of checking entrance right and wrong of described recessive verification operation.
Optionally, described recessive verification operation comprises: preset shake operation, preset gesture operation, preset voice messaging, preset the button operation of rule and preset at least one of knocking in operation.
Optionally, described camouflage curriculum offering module, is configured to arrange the camouflage information content corresponding to i-th layer of authentication mechanism in described front n-1 layer authentication mechanism respectively, 1≤i≤n-1.
Optionally, described camouflage curriculum offering module, comprising:
3rd arranges submodule, is configured to obtain the information content of system default, using the described information content that gets as the camouflage information content corresponding to described i-th layer of authentication mechanism;
And/or,
4th arranges submodule, is configured to obtain the sensitive content in described original information content, using the content in described original information content except described sensitive content as the camouflage information content corresponding to described i-th layer of authentication mechanism;
And/or,
5th arranges submodule, and being configured to receive user be the information content that described original information content is arranged, using the described information content that receives as the camouflage information content corresponding to described i-th layer of authentication mechanism.
According to the 5th aspect of disclosure embodiment, a kind of information display device is provided, comprises:
Processor;
For storing the memory of described processor executable;
Wherein, described processor is configured to:
Receive the first kind verification operation being used for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism, n >=2;
When described first kind verification operation is verified, the display camouflage information content, the described camouflage information content is used for pretending original information content;
Receive the Equations of The Second Kind verification operation being used for verifying n-th layer authentication mechanism;
When described Equations of The Second Kind verification operation is verified, show described original information content.
According to the 6th aspect of disclosure embodiment, a kind of information concealment device is provided, comprises:
Processor;
For storing the memory of described processor executable;
Wherein, described processor is configured to:
N layer authentication mechanism is arranged to original information content, n >=2;
Arrange the camouflage information content to n-1 layer authentication mechanism before in described n layer authentication mechanism, described camouflage information is used for showing when described front n-1 layer authentication mechanism is verified.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
By receiving the first kind verification operation verified any layer authentication mechanism in front n-1 layer authentication mechanism, and when being verified first kind verification operation, the only display camouflage information content; And receiving the Equations of The Second Kind verification operation that n-th layer authentication mechanism is verified, and when Equations of The Second Kind verification operation is verified, just can show original information content; Solve the problem that in correlation technique, the fail safe of information is poor; Reach and can be pretended original information content by the camouflage information content, and then make other people be difficult to know original information content, improve the effect of Information Security.
Should be understood that, it is only exemplary that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in specification and to form the part of this specification, shows and meets embodiment of the present disclosure, and is used from specification one and explains principle of the present disclosure.
Fig. 1 is the flow chart of a kind of method for information display according to an exemplary embodiment.
Fig. 2 is the flow chart of a kind of information concealing method according to another exemplary embodiment.
Fig. 3 is the flow chart of a kind of method for information display Gen Ju an exemplary embodiment again.
Fig. 4 is the flow chart of a kind of method for information display Gen Ju an exemplary embodiment again.
Fig. 5 is the block diagram of a kind of information display device according to an exemplary embodiment.
Fig. 6 is the block diagram of a kind of information display device according to another exemplary embodiment.
Fig. 7 is the block diagram of a kind of information concealment device according to an exemplary embodiment.
Fig. 8 is the block diagram of a kind of information concealment device according to another exemplary embodiment.
Fig. 9 is the block diagram of a kind of device for information displaying and Information hiding according to an exemplary embodiment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Execution mode described in following exemplary embodiment does not represent all execution modes consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
Fig. 1 is the flow chart of a kind of method for information display according to an exemplary embodiment, and as shown in Figure 1, this method for information display can comprise the following steps.
In a step 101, the first kind verification operation being used for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism is received, n >=2.
In a step 102, when first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for pretending original information content.
In step 103, the Equations of The Second Kind verification operation being used for verifying n-th layer authentication mechanism is received.
At step 104, when Equations of The Second Kind verification operation is verified, display original information content.
In sum, the method for information display provided in disclosure embodiment, by receiving the first kind verification operation verified any layer authentication mechanism in front n-1 layer authentication mechanism, and when being verified first kind verification operation, the only display camouflage information content; And receiving the Equations of The Second Kind verification operation that n-th layer authentication mechanism is verified, and when Equations of The Second Kind verification operation is verified, just can show original information content; Solve the problem that in correlation technique, the fail safe of information is poor; Reach and can be pretended original information content by the camouflage information content, and then make other people be difficult to know original information content, improve the effect of Information Security.
Fig. 2 is the flow chart of a kind of information concealing method according to an exemplary embodiment, and as shown in Figure 2, this information concealing method can comprise the following steps.
In step 201, n layer authentication mechanism is arranged to original information content, n >=2.
In step 202., arrange the camouflage information content to n-1 layer authentication mechanism before in n layer authentication mechanism, camouflage information is used for showing when front n-1 layer authentication mechanism is verified.
In sum, the information concealing method provided in disclosure embodiment, by arranging n layer authentication mechanism to original information content, and arranges the camouflage information content to front n-1 layer authentication mechanism; Even if make the first kind verification operation corresponding to front n-1 layer authentication mechanism be known by other user, other user also can only know the camouflage information content pretended original information content, can not know real original information content; Solve the problem that Information Security in correlation technique is poor; Reach the effect that can improve Information Security.
Fig. 3 is the flow chart of a kind of method for information display according to an exemplary embodiment, and as shown in Figure 3, this method for information display can comprise the following steps.
In step 301, n layer authentication mechanism is arranged to original information content, n >=2.
In step 302, arrange the camouflage information content to n-1 layer authentication mechanism before in n layer authentication mechanism, camouflage information is used for showing when front n-1 layer authentication mechanism is verified.
In step 303, the first kind verification operation being used for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism is received, n >=2.
In step 304, when first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for pretending original information content.
In step 305, the Equations of The Second Kind verification operation being used for verifying n-th layer authentication mechanism is received.
Within step 306, when Equations of The Second Kind verification operation is verified, display original information content.
In sum, the method for information display provided in disclosure embodiment, by receiving the first kind verification operation verified any layer authentication mechanism in front n-1 layer authentication mechanism, and when being verified first kind verification operation, the only display camouflage information content; And receiving the Equations of The Second Kind verification operation that n-th layer authentication mechanism is verified, and when Equations of The Second Kind verification operation is verified, just can show original information content; Solve the problem that in correlation technique, the fail safe of information is poor; Reach and can be pretended original information content by the camouflage information content, and then make other people be difficult to know original information content, improve the effect of Information Security.
Fig. 4 is the flow chart of a kind of method for information display according to an exemplary embodiment, and as shown in Figure 4, this method for information display can comprise the following steps.
In step 401, the front n-1 layer authentication mechanism that first kind verification operation carries out verifying is arranged through.
When user wants to hide some information in terminal, and then when avoiding other people arbitrarily to check, user can perform sequence of operations in the terminal.For original information content is arranged through the front n-1 layer authentication mechanism that first kind verification operation carries out verifying after terminal receives the sequence of operations of user.Wherein, n >=2, original information content can comprise at least one in note, instant messaging information, notepad information, diary, mail, picture or video; The checking entrance of first kind verification operation is generally the checking entrance of dominant prompting.
Such as, for n for 3, terminal can be arranged through the ground floor authentication mechanism that clear crytpographic key carries out verifying, and is arranged through the 2nd layer of authentication mechanism that prearranged gesture carries out verifying.
When actual realization, terminal sequentially can arrange the first kind verification operation corresponding to every one deck authentication mechanism in front n-1 layer authentication mechanism, also can arrange the first kind verification operation corresponding to every one deck authentication mechanism in front n-1 layer authentication mechanism, the present embodiment does not limit this simultaneously.Further, the first kind verification operation corresponding to every one deck authentication mechanism in front n-1 layer authentication mechanism can be the same or different, and the present embodiment does not also limit this.
In step 402, the n-th layer authentication mechanism that Equations of The Second Kind verification operation carries out verifying is arranged through.
Terminal can be arranged through the n-th layer authentication mechanism that recessive verification operation carries out verifying, using recessive verification operation as Equations of The Second Kind verification operation, and the checking entrance of the dominant prompting of checking entrance right and wrong of recessive verification operation.Wherein, recessive verification operation comprises: preset shake operation, preset gesture operation, preset voice messaging, preset the button operation of rule and preset at least one of knocking in operation.
Such as, the shake that terminal can be arranged through shake terminal three times operates the 3rd layer of authentication mechanism of carrying out verifying.
It should be noted that, this step can be the step performed under user triggers, and can be also the step that terminal automatically performs, the present embodiment limit this.
In step 403, the camouflage information content of the i-th layer of authentication mechanism corresponded in front n-1 layer authentication mechanism is set respectively.
In order to avoid other people the first kind verification operation corresponding to front n-1 layer authentication mechanism is verified time, other people can browse original information content, threaten the problem of the information security of original information content, terminal can arrange the camouflage information content corresponding to i-th layer of authentication mechanism in front n-1 layer authentication mechanism respectively, is pretended original information content by the camouflage information content.Wherein, the camouflage information content is used for pretending original information content, 1≤i≤n-1.
Terminal arranges the method to set up of the camouflage information content corresponding to i-th layer of authentication mechanism can comprise at least one in following method:
The first:
Obtain the information content of system default, using the information content that gets as the camouflage information content corresponding to i-th layer of authentication mechanism;
Terminal can preset information contents, when terminal need be i-th layer of authentication mechanism the camouflage information content is set time, terminal obtains the information content of systemic presupposition, using the information content that gets as the camouflage information content corresponding to i-th layer of authentication mechanism.
When actual realization, terminal can preset the information content of such as greeting, blessing language, polite expressions and so on for the original information content of note, notepad information, diary, instant messaging information or mail and so on.Such as, for note, terminal can be preset ' wishing that you are everyday happy ', ' wishing that you and your household are healthy, everything is just fine ', ' good morning ', ' I now in session, busy please leave a message ' or ' I contacts with you after a while ' and so on the information content.Like this, when terminal needs to arrange the camouflage information content for note, terminal can using above-mentioned default content as the camouflage information content corresponding to i-th layer of authentication mechanism.
Terminal can preset the image content of such as star's placard, cinema promotional placard, demonstration list, animal picture or landscape figure and so on for the original information content of picture and so on.When terminal needs to arrange the camouflage information content for picture, above-mentioned default curriculum offering can be the camouflage information content corresponding to i-th layer of authentication mechanism by terminal.
Terminal can preset the information content of such as propaganda film, MV or star's interview and so on for the original information content of video and so on.When terminal needs to arrange the camouflage information content for video, default foregoing can be set to the camouflage information content corresponding to i-th layer of authentication mechanism by terminal.
The second:
Obtain the sensitive content in original information content, using the content in original information content except sensitive content as the camouflage information content corresponding to i-th layer of authentication mechanism;
When original information content is note, notepad information, instant messaging information or mail, terminal can extract sensitive information wherein, the information except sensitive information is defined as the camouflage information content corresponding to i-th layer of authentication mechanism.
Such as, when original information content is the notepad information comprising bank's card number and password, terminal can extract bank's card number in notepad information and password, using the content in notepad information except bank's card number and password as the camouflage information content corresponding to i-th layer of authentication mechanism; When original information content is the payroll of Corporate Finance by mail sending, the amount of money that terminal can be extracted in salary bill is detailed, the information in salary bill except the amount of money detail extracted is defined as the camouflage information content corresponding to i-th layer of authentication mechanism.
When original information content is picture, terminal can identify the destination object in picture, the content in picture except destination object is defined as the camouflage information content corresponding to i-th layer of authentication mechanism.Wherein, this destination object object that can mark in advance for user or terminal extract the object determined according to each picture stored.
When original information content is video, terminal can extract the target fragment in video, the content in video except target fragment is defined as the camouflage information content corresponding to i-th layer of authentication mechanism.Wherein, the fragment that target fragment can mark in advance for user, can be also the fragment that terminal is extracted automatically according to video content, the present embodiment limit this.
When actual realization, terminal can also regular content in extracting directly original information content, using the regular content that extracts as the camouflage information content corresponding to i-th layer of authentication mechanism.Wherein, regular content refers to that the amount of information of carrying is less or for the content user not being private information.
Such as, when original information content is the text message of such as note, notepad information or instant messaging information and so on, terminal can obtain the regular content in original information content by semantic analysis, regular content analysis obtained is as the camouflage information content of i-th layer of authentication mechanism.Such as, the greeting in text message, blessing language and polite expressions are extracted.
When original information content is mail, terminal can extract the regular content in mail, such as the content of greeting, blessing language, signature or polite expressions and so on, using the content extracted as the camouflage information content corresponding to i-th layer of authentication mechanism.
When original information content is picture, terminal can be hidden the sensitive action in picture or sensitive objects automatically, and then only shows the content after hiding.
When original information content is video, terminal can extract landscape fragment in video or cuisines fragment, using the fragment extracted as the camouflage information content corresponding to i-th layer of authentication mechanism.
The third:
Receive the information content that arranges for original information content of user, using the information content that receives as the camouflage information content corresponding to i-th layer of authentication mechanism.
When needs be i-th layer of authentication mechanism arrange camouflage the information content time, user can input self-defining content in the terminal, after terminal receives user-defined content, using the information content that receives as the camouflage information content corresponding to i-th layer of authentication mechanism.
It should be noted is that, terminal is that the camouflage information content that every layer of authentication mechanism is arranged can be the same or different, and the present embodiment does not limit this.
Need to illustrate on the other hand, the present embodiment performs step 403 after just first performing step 402 for terminal, when actual realization, terminal can also perform step 402 and step 403 simultaneously, or perform step 402 after first performing step 403, only need to ensure that step 401 performed to step 403 before step 404, its actual execution sequence is not limited.
In step 404, the first kind verification operation being used for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism is received, n >=2.
When user wants the information content hidden in browsing terminal, user can input the first kind verification operation verified i-th layer of authentication mechanism in the terminal, and accordingly, terminal can receive the first kind verification operation verified i-th layer of authentication mechanism.Wherein, the initial value of i is 1, and i is the integer being less than or equal to n-1.
Such as, when ground floor authentication mechanism uses Crypted password encryption, user can input the clear crytpographic key corresponding to Crypted password in the terminal; Terminal receives the clear crytpographic key of user's input accordingly.Similar, when second layer authentication mechanism uses the encryption of encryption gesture, user can apply the gesture decryption oprerations corresponding with encrypting gesture in the terminal; Terminal can receive gesture decryption oprerations accordingly.
When actual realization, terminal can show the checking entrance for pointing out first kind verification operation, and user is after viewing checking entrance, enter checking entrance, apply first kind verification operation, terminal receives first kind verification operation accordingly, and the present embodiment does not limit this.
In step 405, when the first kind verification operation corresponding to i-th layer of authentication mechanism in front n-1 layer authentication mechanism is verified, the camouflage information content corresponding with i-th layer of authentication mechanism is shown.
When terminal receives the first kind verification operation for verifying i-th layer of authentication mechanism, terminal can be verified the first kind verification operation received, and when being verified, shows the camouflage information content corresponding with i-th layer of authentication mechanism.Wherein, pretend the information content to be used for pretending original information content.
Such as, terminal receives the clear crytpographic key corresponding to ground floor authentication mechanism, then whether terminal can to detect the clear crytpographic key that receives correct, if correctly, then display corresponds to the camouflage information content of ground floor authentication mechanism.
Needing at first of explanation is, when terminal receives the first kind verification operation corresponding to i-th layer of authentication mechanism, terminal can be verified the first kind verification operation corresponding to i-th layer of authentication mechanism received, when being verified, display corresponds to the camouflage information content of i-th layer of authentication mechanism.After this, by i+1, when user continues the first kind verification operation applying to correspond to i-th layer of authentication mechanism, terminal can perform the first kind verification operation receiving and correspond to i-th layer of authentication mechanism again, the first kind verification operation corresponding to i-th layer of authentication mechanism received is verified, if the verification passes, then display corresponds to the camouflage information content of i-th layer.
The second point illustrated is needed to be that if terminal is to first kind verification operation authentication failed, then flow process terminates, and the present embodiment does not repeat them here.
Need to illustrate thirdly, when i<n-1, user also can select not continue to apply first kind verification operation, and now flow process will terminate, and the present embodiment does not also repeat this.
In a step 406, the Equations of The Second Kind verification operation being used for verifying n-th layer authentication mechanism is received.
After terminal demonstration corresponds to the camouflage information content of (n-1)th layer of authentication mechanism, user can perform the Equations of The Second Kind verification operation verified n-th layer authentication mechanism.Accordingly, terminal can receive Equations of The Second Kind verification operation.
When actual realization, this step can comprise: receive the recessive verification operation being used for verifying n-th layer authentication mechanism, using recessive verification operation as Equations of The Second Kind verification operation, and the checking entrance of the dominant prompting of checking entrance right and wrong of recessive verification operation.
Preset shake operation because recessive verification operation can comprise, preset gesture operation, preset voice messaging, preset the button operation of rule and preset at least one of knocking in operation, so according to the difference of recessive verification operation, terminal receives at least one being used for can comprising the method for reseptance of the recessive verification operation that n-th layer authentication mechanism is verified in following method:
The first:
Received by transducer and preset shake operation, shake operation will be preset as recessive verification operation;
When user is according in default shake operation shake terminal, terminal can be received by transducer and preset shake operation, and terminal will preset shake operation as recessive verification operation.Wherein, shake operation can be traditional shake operation, also can be the shake operation that user's handling terminal makes certain gesture, and can also be that user reverses the reverse turn operation of terminal, the present embodiment limit this.
Such as, when user shakes No. three mobile phones, terminal can receive the shake operation of shake three times by transducer.When the operation of drawing a circle made by user's handling mobile phone, terminal can receive by transducer operation of drawing a circle.When user's handling mobile phone draws one ' check mark ', terminal can receive this operation by transducer.When, when mobile phone reverses by user, mobile phone can receive this reverse turn operation by transducer.
The present embodiment is just above-mentionedly severally be operating as example with default shake operation, and when actual realization, presetting shake operation can also operate for other, and the present embodiment does not limit this.
The second:
Received by touch-screen and preset gesture operation, gesture operation will be preset as recessive verification operation;
The third:
Preset voice messaging by microphones, voice messaging will be preset as recessive verification operation;
User can also say default statement facing to terminal microphone, and accordingly, terminal can preset voice messaging by microphones.
4th kind:
The button operation presetting rule is received, using the button operation of default rule as recessive verification operation by physical button or virtual key;
User can also press the physical button in terminal with default rule, or the virtual key that pressing terminal is provided to user by dummy keyboard.Such as, terminal presses numerical key ' 1 ' and numerical key ' 9 ' simultaneously.
5th kind:
Receiving to preset by touch-screen and knock operation, knocking operation as recessive verification operation using presetting.
User can also knock rule and knocks terminal screen according to presetting, such as, and user's adopting consecutive click chemical reaction 3 terminal screens.
In step 407, when Equations of The Second Kind verification operation is verified, display original information content.
When terminal receives Equations of The Second Kind verification operation, terminal can be verified Equations of The Second Kind verification operation, if be verified Equations of The Second Kind verification operation, then terminal can show original information content.
Whether terminal can detect the Equations of The Second Kind verification operation received and mate with the Equations of The Second Kind verification operation preset, if coupling, then determines to be verified Equations of The Second Kind verification operation, otherwise, then authentication failed.
In an application scenarios of the present embodiment, in order to avoid forgeing the bank card password of oneself, and then make troubles to use, Xiao Ming creates the notepad information storing bank's card number and password in mobile phone notepad.Time then in order to avoid hand-set from stolen, other people view this notepad information, and then cause property loss, and Xiao Ming is provided with 2 layers of authentication mechanism to this notepad information.Wherein, ground floor authentication mechanism is provided with gesture checking, and second layer authentication mechanism is provided with speech verification; And ' No. 8.10 little younger sister's birthdays that ground floor authentication mechanism is arranged by user, remember to buy present ' pretend.Like this, even if other people find mobile phone, to have been hit it encryption gesture by the cut in screen, and be verified ground floor authentication mechanism, other people also can only see the camouflage information content of ground floor authentication mechanism, and cannot view oneself bank's card number and password; And other people are after viewing the information content, other people generally can think that this content is exactly the initial content of this notepad information, thus abandon continuing deciphering, improve the information security of notepad information.Even if other people know also need further checking, but due to mobile phone can't show to final step checking checking entrance, other people also cannot continue checking, further ensure information security.
In the Another application scene of the present embodiment, little Hua is checked by other people to prevent the note record of oneself and lover, little Hua is provided with 3 layers of checking to note record, ground floor authentication mechanism is password authentification, second layer authentication mechanism is gesture checking, third layer authentication mechanism is combination button checking, and ground floor authentication mechanism and second layer authentication mechanism are all pretended this note record by the camouflage information content.Then when other people use little Hua mobile phone and attempt out of curiosity verifying the note hidden, even if other people may be verified ground floor authentication mechanism, but also can only view the information content of camouflage, and can not view and pretend content really; And other people also differ and continue surely to be verified second layer authentication mechanism, even if other people are also verified second layer authentication mechanism when minimum probability, the content that so he sees remains the information content of camouflage, and be not the true content of note record, improve the safety of note record.Simultaneously, because third layer authentication mechanism uses recessive verification operation, terminal does not provide checking entrance, so when other people do not know third layer checking in addition in advance, what other people can affirm very much thinks that the content of current display is the true content of note, further increases information security.
It should be added that, step 404 is to the step performed after step 407 can be step 403 once, and also can be the step that the Posterior circle of step 403 performs repeatedly, the present embodiment limit this.
In sum, the method for information display provided in disclosure embodiment, by receiving the first kind verification operation verified any layer authentication mechanism in front n-1 layer authentication mechanism, and when being verified first kind verification operation, the only display camouflage information content; And receiving the Equations of The Second Kind verification operation that n-th layer authentication mechanism is verified, and when Equations of The Second Kind verification operation is verified, just can show original information content; Solve the problem that in correlation technique, the fail safe of information is poor; Reach and can be pretended original information content by the camouflage information content, and then make other people be difficult to know original information content, improve the effect of Information Security.
Under normal circumstances, user to conduct interviews checking to the content hidden, after the content that terminal demonstration is corresponding, user can think that the content now shown is exactly hiding content, so the present embodiment is by arranging the encryption of n layer authentication mechanism, and front n-1 layer authentication mechanism uses the camouflage information content to pretend original information content, even if reach other users coerce user to hide content verify, other users also cannot view the true content in original information content, improve the fail safe of the information content.
Simultaneously, the present embodiment is verified by being arranged through recessive verification operation to last one deck authentication mechanism, the checking entrance of recessive verification operation is the checking entrance of non-dominant prompting, make other users after verifying the first kind authorization information of front n-1 layer authentication mechanism, other users also cannot know one deck checking in addition, further increase the safety of the information content.
It should be noted that, after terminal demonstration original information content, terminal can also perform at least one step in following steps:
The first, obtain the display duration of original information content; Detect the display duration got and whether exceed scheduled duration; If display duration exceedes scheduled duration, then reactivate n layer authentication mechanism;
When terminal starts to show original information content, terminal can record the display duration of original information content, and whether the display duration of detection record exceedes scheduled duration such as ' 30S ' in real time, when testing result is for exceeding scheduled duration, terminal can ask user again to verify.When actual realization, terminal can show the checking entrance of first kind verification operation, when user applies the first kind verification operation that any layer before in n layer authentication mechanism in n-1 layer authentication mechanism verifies, accordingly, terminal can reactivate n layer authentication mechanism.Like this, with regard to avoid user checked hiding original information content forget exit time, the original information content of terminal demonstration is by problem that other people steal a glance at.
The second, if when showing original information content, receiving the triggering signal of interrupting display, then reactivating n layer authentication mechanism.
Wherein, the triggering signal of interrupting display can be the request signal of new calling incoming call, also can be user switches to other interfaces from informing switching signal by drop-down informing.
Such as, when terminal demonstration original information content, when have new calling incoming call and end of calling time, terminal is by the checking entrance of display first kind verification operation, when the first kind verification operation that any layer in n-1 layer authentication mechanism front during user's applying is to n layer authentication mechanism is verified, terminal reactivates n layer authentication mechanism.
Similar, when user is by drop-down informing, and then after checking new message, new instant messaging information, terminal also can show the checking entrance of first kind verification operation, when the first kind verification operation that any layer in n-1 layer authentication mechanism front during user's applying is to n layer authentication mechanism is verified, terminal can reactivate n layer authentication mechanism.
When actual realization, when user exits the display of original information content, and when wanting again to check original information content, terminal still needs to reactivate n layer authentication mechanism.
Following is disclosure device embodiment, may be used for performing disclosure embodiment of the method.For the details do not disclosed in disclosure device embodiment, please refer to disclosure embodiment of the method.
Fig. 5 is the block diagram of a kind of information display device according to an exemplary embodiment, as shown in Figure 5, this information display device can include but not limited to: the first operation receiver module 510, camouflage content display module 520, second operate receiver module 530 and original contents display module 540.
First operation receiver module 510, is configured to receive the first kind verification operation for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism, n >=2;
Camouflage content display module 520, be configured to when the first kind verification operation received the first operation receiver module 510 is verified, the display camouflage information content, the camouflage information content is used for pretending original information content;
Second operation receiver module 530, is configured to receive the Equations of The Second Kind verification operation for verifying n-th layer authentication mechanism;
Original contents display module 540, is configured to when the Equations of The Second Kind verification operation received the second operation receiver module 530 is verified, display original information content.
In sum, the information display device provided in disclosure embodiment, by receiving the first kind verification operation verified any layer in front n-1 layer, and when being verified first kind verification operation, the only display camouflage information content; And receiving the Equations of The Second Kind verification operation that n-th layer is verified, and when Equations of The Second Kind verification operation is verified, just can show original information content; Solve the problem that in correlation technique, the fail safe of information is poor; Reach and can be pretended original information content by the camouflage information content, and then make other people be difficult to know original information content, improve the effect of Information Security.
Fig. 6 is the block diagram of a kind of information display device according to an exemplary embodiment, as shown in Figure 6, this information display device can include but not limited to: the first operation receiver module 610, camouflage content display module 620, second operate receiver module 630 and original contents display module 640.
First operation receiver module 610, is configured to receive the first kind verification operation for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism, n >=2;
Camouflage content display module 620, be configured to when the first kind verification operation received the first operation receiver module 610 is verified, the display camouflage information content, the camouflage information content is used for pretending original information content;
Second operation receiver module 630, is configured to receive the Equations of The Second Kind verification operation for verifying n-th layer authentication mechanism;
Original contents display module 640, is configured to when the Equations of The Second Kind verification operation received the second operation receiver module 630 is verified, display original information content.
Optionally, second operation receiver module 630, be configured to receive the recessive verification operation for verifying n-th layer authentication mechanism, using recessive verification operation as Equations of The Second Kind verification operation, the checking entrance of the dominant prompting of checking entrance right and wrong of recessive verification operation.
Optionally, the second operation receiver module 630, is configured to:
Received by transducer and preset shake operation, shake operation will be preset as recessive verification operation;
And/or,
Received by touch-screen and preset gesture operation, gesture operation will be preset as recessive verification operation;
And/or,
Preset voice messaging by microphones, voice messaging will be preset as recessive verification operation;
And/or,
The button operation presetting rule is received, using the button operation of default rule as recessive verification operation by physical button or virtual key;
And/or,
Receiving to preset by touch-screen and knock operation, knocking operation as recessive verification operation using presetting.
Optionally, camouflage content display module 620, when the first kind verification operation being configured to correspond in front n-1 layer authentication mechanism i-th layer of authentication mechanism is verified, shows the camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤n-1.
Optionally, device also comprises:
First trigger module 650, is configured to the display duration obtaining original information content; Detect the display duration got and whether exceed scheduled duration; If display duration exceedes scheduled duration, then restart n layer authentication mechanism;
And/or,
Second trigger module 660, when showing original information content if be configured to, receive the triggering signal of interrupting display, then reactivates n layer authentication mechanism.
In sum, the information display device provided in disclosure embodiment, by receiving the first kind verification operation verified any layer in front n-1 layer, and when being verified first kind verification operation, the only display camouflage information content; And receiving the Equations of The Second Kind verification operation that n-th layer is verified, and when Equations of The Second Kind verification operation is verified, just can show original information content; Solve the problem that in correlation technique, the fail safe of information is poor; Reach and can be pretended original information content by the camouflage information content, and then make other people be difficult to know original information content, improve the effect of Information Security.
Under normal circumstances, user to conduct interviews checking to the content hidden, after the content that terminal demonstration is corresponding, user can think that the content now shown is exactly hiding content, so the present embodiment is by arranging n infill layer, and front n-1 layer uses the camouflage information content to pretend original information content, coerces user verify hiding content even if reach other users, other users also cannot view the true content in original information content, improve the fail safe of the information content.
Simultaneously, the present embodiment is verified by being arranged through recessive verification operation to last one deck, the checking entrance of recessive verification operation is the checking entrance of non-dominant prompting, after making the checking of other users n-1 layer before carrying out, other users also cannot know one deck checking in addition, further increase the safety of the information content.
Fig. 7 is the block diagram of a kind of information concealment device according to another exemplary embodiment, and as shown in Figure 7, this information concealment device can include but not limited to: authentication mechanism arranges module 710 and camouflage curriculum offering module 720;
Authentication mechanism arranges module 710, is configured to arrange n layer authentication mechanism, n >=2 to original information content;
Camouflage curriculum offering module 720, be configured to that n-1 layer authentication mechanism before in the n layer authentication mechanism of module 710 setting is arranged to authentication mechanism and the camouflage information content is set, camouflage information is used for showing when front n-1 layer authentication mechanism is verified, and the camouflage information content is used for pretending original information content.
In sum, the information concealment device provided in disclosure embodiment, by arranging n layer authentication mechanism to original information content, and arranges the camouflage information content to front n-1 layer authentication mechanism; Even if make the first kind verification operation corresponding to front n-1 layer authentication mechanism be known by other user, other user also can only know the camouflage information content pretended original information content, can not know real original information content; Solve the problem that Information Security in correlation technique is poor; Reach the effect that can improve Information Security.
Fig. 8 is the block diagram of a kind of information concealment device according to another exemplary embodiment, and as shown in Figure 8, this information concealment device can include but not limited to: authentication mechanism arranges module 810 and camouflage curriculum offering module 820;
Authentication mechanism arranges module 810, is configured to arrange n layer authentication mechanism, n >=2 to original information content;
Camouflage curriculum offering module 820, be configured to that n-1 layer authentication mechanism before in the n layer authentication mechanism of module 810 setting is arranged to authentication mechanism and the camouflage information content is set, camouflage information is used for showing when front n-1 layer authentication mechanism is verified, and the camouflage information content is used for pretending original information content.
Optionally, authentication mechanism arranges module 810, comprising:
First arranges submodule 811, is configured to be arranged through the front n-1 layer authentication mechanism that first kind verification operation carries out verifying;
Second arranges submodule 812, is configured to be arranged through the n-th layer authentication mechanism that Equations of The Second Kind verification operation carries out verifying.
Optionally, second arranges submodule 812, is configured to be arranged through the n-th layer authentication mechanism that recessive verification operation carries out verifying, using recessive verification operation as Equations of The Second Kind verification operation, and the checking entrance of the dominant prompting of checking entrance right and wrong of recessive verification operation.
Optionally, recessive verification operation comprises: preset shake operation, preset gesture operation, preset voice messaging, preset the button operation of rule and preset at least one of knocking in operation.
Optionally, camouflage curriculum offering module 820, is configured to arrange the camouflage information content corresponding to i-th layer of authentication mechanism in front n-1 layer authentication mechanism respectively, 1≤i≤n-1.
Optionally, camouflage curriculum offering module 820, comprising:
3rd arranges submodule 821, is configured to obtain the information content of system default, using the information content that gets as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
4th arranges submodule 822, is configured to obtain the sensitive content in original information content, using the content in original information content except sensitive content as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
5th arranges submodule 823, is configured to receive the information content that arranges for original information content of user, using the information content that receives as the camouflage information content corresponding to i-th layer of authentication mechanism.
In sum, the information concealment device provided in disclosure embodiment, by arranging n layer authentication mechanism to original information content, and arranges the camouflage information content to front n-1 layer authentication mechanism; Even if make the first kind verification operation corresponding to front n-1 layer authentication mechanism be known by other user, other user also can only know the camouflage information content pretended original information content, can not know real original information content; Solve the problem that Information Security in correlation technique is poor; Reach the effect that can improve Information Security.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Fig. 9 is the block diagram of a kind of device 900 for information displaying and Information hiding according to an exemplary embodiment.Such as, device 900 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 9, device 900 can comprise following one or more assembly: processing components 902, memory 904, power supply module 906, multimedia groupware 908, audio-frequency assembly 910, the interface 912 of I/O (I/O), sensor cluster 914, and communications component 916.
The integrated operation of the usual control device 900 of processing components 902, such as with display, call, data communication, camera operation and record operate the operation be associated.Processing components 902 can comprise one or more processor 918 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 902 can comprise one or more module, and what be convenient between processing components 902 and other assemblies is mutual.Such as, processing components 902 can comprise multi-media module, mutual with what facilitate between multimedia groupware 908 and processing components 902.
Memory 904 is configured to store various types of data to be supported in the operation of device 900.The example of these data comprises for any application program of operation on device 900 or the instruction of method, contact data, telephone book data, message, picture, video etc.Memory 904 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk or CD.
The various assemblies that power supply module 906 is device 900 provide electric power.Power supply module 906 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 900 and be associated.
Multimedia groupware 908 is included in the screen providing an output interface between described device 900 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 908 comprises a front-facing camera and/or post-positioned pick-up head.When device 900 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 910 is configured to export and/or input audio signal.Such as, audio-frequency assembly 910 comprises a microphone (MIC), and when device 900 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The audio signal received can be stored in memory 904 further or be sent via communications component 916.In certain embodiments, audio-frequency assembly 910 also comprises a loud speaker, for output audio signal.
I/O interface 912 is for providing interface between processing components 902 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor cluster 914 comprises one or more transducer, for providing the state estimation of various aspects for device 900.Such as, sensor cluster 914 can detect the opening/closing state of device 900, the relative positioning of assembly, such as described assembly is display and the keypad of device 900, the position of all right checkout gear 900 of sensor cluster 914 or device 900 1 assemblies changes, the presence or absence that user contacts with device 900, the variations in temperature of device 900 orientation or acceleration/deceleration and device 900.Sensor cluster 914 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor cluster 914 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor cluster 914 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communications component 916 is configured to the communication being convenient to wired or wireless mode between device 900 and other equipment.Device 900 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 916 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communications component 916 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 900 can be realized, for performing said method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the memory 904 of instruction, above-mentioned instruction can perform said method by the processor 918 of device 900.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (24)

1. a method for information display, is characterized in that, described method comprises:
Receive the first kind verification operation being used for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism, n >=2;
When described first kind verification operation is verified, the display camouflage information content, the described camouflage information content is used for pretending original information content;
Receive the Equations of The Second Kind verification operation being used for verifying n-th layer authentication mechanism;
When described Equations of The Second Kind verification operation is verified, show described original information content.
2. method according to claim 1, is characterized in that, described reception is used for the Equations of The Second Kind verification operation verified n-th layer authentication mechanism, comprising:
Receive the recessive verification operation being used for verifying n-th layer authentication mechanism, using described recessive verification operation as described Equations of The Second Kind verification operation, the checking entrance of the dominant prompting of checking entrance right and wrong of described recessive verification operation.
3. method according to claim 2, is characterized in that, described reception is used for the recessive verification operation verified n-th layer authentication mechanism, comprising:
Received by transducer and preset shake operation, using described default shake operation as described recessive verification operation;
And/or,
Received by touch-screen and preset gesture operation, using described default gesture operation as described recessive verification operation;
And/or,
Voice messaging is preset, using described default voice messaging as described recessive verification operation by microphones;
And/or,
The button operation presetting rule is received, using the button operation of described default rule as described recessive verification operation by physical button or virtual key;
And/or,
Receive to preset by described touch-screen and knock operation, described presetting is knocked operation as described recessive verification operation.
4. method according to claim 1, is characterized in that, described when described first kind verification operation is verified, and the display camouflage information content, comprising:
When the described first kind verification operation corresponding to i-th layer of authentication mechanism in front n-1 layer authentication mechanism is verified, show the camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤n-1.
5., according to the arbitrary described method of Claims 1-4, it is characterized in that, described method also comprises:
Obtain the display duration of described original information content; Detect the described display duration got and whether exceed scheduled duration; If described display duration exceedes described scheduled duration, then reactivate described n layer authentication mechanism;
And/or,
If when showing described original information content, receiving the triggering signal of interrupting display, then reactivating described n layer authentication mechanism.
6. an information concealing method, is characterized in that, described method comprises:
N layer authentication mechanism is arranged to original information content, n >=2;
Arrange the camouflage information content to n-1 layer authentication mechanism before in described n layer authentication mechanism, described camouflage information is used for showing when described front n-1 layer authentication mechanism is verified, and the described camouflage information content is used for pretending described original information content.
7. method according to claim 6, is characterized in that, describedly arranges n layer authentication mechanism to original information content, comprising:
Be arranged through the front n-1 layer authentication mechanism that first kind verification operation carries out verifying;
Be arranged through the n-th layer authentication mechanism that Equations of The Second Kind verification operation carries out verifying.
8. method according to claim 7, is characterized in that, described in be arranged through the n-th layer authentication mechanism that Equations of The Second Kind verification operation carries out verifying, comprising:
Be arranged through the n-th layer authentication mechanism that recessive verification operation carries out verifying, using described recessive verification operation as described Equations of The Second Kind verification operation, the checking entrance of the dominant prompting of checking entrance right and wrong of described recessive verification operation.
9. method according to claim 8, is characterized in that, described recessive verification operation comprises: preset shake operation, preset gesture operation, preset voice messaging, preset the button operation of rule and preset at least one of knocking in operation.
10. method according to claim 6, is characterized in that, describedly arranges the camouflage information content to n-1 layer authentication mechanism before in described n layer authentication mechanism, comprising:
The camouflage information content of the i-th layer of authentication mechanism corresponded in described front n-1 layer authentication mechanism is set respectively, 1≤i≤n-1.
11. methods according to claim 10, is characterized in that, the described camouflage information content arranging the i-th layer of authentication mechanism corresponded in described front n-1 layer authentication mechanism respectively, comprising:
Obtain the information content of system default, using the described information content that gets as the camouflage information content corresponding to described i-th layer of authentication mechanism;
And/or,
Obtain the sensitive content in described original information content, using the content in described original information content except described sensitive content as the camouflage information content corresponding to described i-th layer of authentication mechanism;
And/or,
Receiving user be the information content that described original information content is arranged, using the described information content that receives as the camouflage information content corresponding to described i-th layer of authentication mechanism.
12. 1 kinds of information display devices, is characterized in that, described device comprises:
First operation receiver module, is configured to receive the first kind verification operation for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism, n >=2;
Camouflage content display module, be configured to when the described first kind verification operation received described first operation receiver module is verified, the display camouflage information content, the described camouflage information content is used for pretending original information content;
Second operation receiver module, is configured to receive the Equations of The Second Kind verification operation for verifying n-th layer authentication mechanism;
Original contents display module, is configured to, when the described Equations of The Second Kind verification operation received described second operation receiver module is verified, show described original information content.
13. devices according to claim 12, is characterized in that,
Described second operation receiver module, be configured to receive the recessive verification operation for verifying n-th layer authentication mechanism, using described recessive verification operation as described Equations of The Second Kind verification operation, the checking entrance of the dominant prompting of checking entrance right and wrong of described recessive verification operation.
14. devices according to claim 13, is characterized in that, described second operation receiver module, is configured to:
Received by transducer and preset shake operation, using described default shake operation as described recessive verification operation;
And/or,
Received by touch-screen and preset gesture operation, using described default gesture operation as described recessive verification operation;
And/or,
Voice messaging is preset, using described default voice messaging as described recessive verification operation by microphones;
And/or,
The button operation presetting rule is received, using the button operation of described default rule as described recessive verification operation by physical button or virtual key;
And/or,
Receive to preset by described touch-screen and knock operation, described presetting is knocked operation as described recessive verification operation.
15. devices according to claim 12, is characterized in that,
Described camouflage content display module, when the described first kind verification operation being configured to correspond in front n-1 layer authentication mechanism i-th layer of authentication mechanism is verified, shows the camouflage information content corresponding with i-th layer, 1≤i≤n-1.
16. according to claim 12 to 15 arbitrary described devices, and it is characterized in that, described device also comprises:
First trigger module, is configured to the display duration obtaining described original information content; Detect the described display duration got and whether exceed scheduled duration; If described display duration exceedes described scheduled duration, then reactivate described n layer authentication mechanism;
And/or,
Second trigger module, when showing described original information content if be configured to, receive the triggering signal of interrupting display, then reactivates described n layer authentication mechanism.
17. 1 kinds of information concealment devices, is characterized in that, described device comprises:
Authentication mechanism arranges module, is configured to arrange n layer authentication mechanism, n >=2 to original information content;
Camouflage curriculum offering module, be configured to that n-1 layer authentication mechanism before in the described n layer authentication mechanism of module installation is arranged to described authentication mechanism and the camouflage information content is set, described camouflage information is used for showing when described front n-1 layer authentication mechanism is verified, and the described camouflage information content is used for pretending original information content.
18. devices according to claim 17, is characterized in that, described authentication mechanism arranges module, comprising:
First arranges submodule, is configured to be arranged through the front n-1 layer authentication mechanism that first kind verification operation carries out verifying;
Second arranges submodule, is configured to be arranged through the n-th layer authentication mechanism that Equations of The Second Kind verification operation carries out verifying.
19. devices according to claim 18, is characterized in that,
Described second arranges submodule, be configured to be arranged through the n-th layer authentication mechanism that recessive verification operation carries out verifying, described recessive verification operation as described Equations of The Second Kind verification operation, the checking entrance of the dominant prompting of checking entrance right and wrong of described recessive verification operation.
20. devices according to claim 19, is characterized in that, described recessive verification operation comprises: preset shake operation, preset gesture operation, preset voice messaging, preset the button operation of rule and preset at least one of knocking in operation.
21. devices according to claim 17, is characterized in that,
Described camouflage curriculum offering module, is configured to arrange the camouflage information content corresponding to i-th layer of authentication mechanism in described front n-1 layer authentication mechanism respectively, 1≤i≤n-1.
22. devices according to claim 21, is characterized in that, described camouflage curriculum offering module, comprising:
3rd arranges submodule, is configured to obtain the information content of system default, using the described information content that gets as the camouflage information content corresponding to described i-th layer of authentication mechanism;
And/or,
4th arranges submodule, is configured to obtain the sensitive content in described original information content, using the content in described original information content except described sensitive content as the camouflage information content corresponding to described i-th layer of authentication mechanism;
And/or,
5th arranges submodule, and being configured to receive user be the information content that described original information content is arranged, using the described information content that receives as the camouflage information content corresponding to described i-th layer of authentication mechanism.
23. 1 kinds of information display devices, is characterized in that, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Receive the first kind verification operation being used for verifying any layer in n-1 layer authentication mechanism front in n layer authentication mechanism, n >=2;
When described first kind verification operation is verified, the display camouflage information content, the described camouflage information content is used for pretending original information content;
Receive the Equations of The Second Kind verification operation being used for verifying n-th layer authentication mechanism;
When described Equations of The Second Kind verification operation is verified, show described original information content.
24. 1 kinds of information concealment devices, is characterized in that, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
N layer authentication mechanism is arranged to original information content, n >=2;
Arrange the camouflage information content to n-1 layer authentication mechanism before in described n layer authentication mechanism, described camouflage information is used for showing when described front n-1 layer authentication mechanism is verified.
CN201410429501.1A 2014-08-27 2014-08-27 Method for information display, information concealing method and device Active CN104219053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410429501.1A CN104219053B (en) 2014-08-27 2014-08-27 Method for information display, information concealing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410429501.1A CN104219053B (en) 2014-08-27 2014-08-27 Method for information display, information concealing method and device

Publications (2)

Publication Number Publication Date
CN104219053A true CN104219053A (en) 2014-12-17
CN104219053B CN104219053B (en) 2017-11-07

Family

ID=52100217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410429501.1A Active CN104219053B (en) 2014-08-27 2014-08-27 Method for information display, information concealing method and device

Country Status (1)

Country Link
CN (1) CN104219053B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105933503A (en) * 2016-03-29 2016-09-07 联想(北京)有限公司 Information processing method and electronic equipment
WO2017028141A1 (en) * 2015-08-16 2017-02-23 张焰焰 Method and mobile terminal for logging in to account
CN106896996A (en) * 2015-12-21 2017-06-27 阿里巴巴集团控股有限公司 A kind of frame display methods and device
CN106897873A (en) * 2015-12-21 2017-06-27 阿里巴巴集团控股有限公司 A kind of frame display methods and device
CN107292185A (en) * 2016-03-30 2017-10-24 阿里巴巴集团控股有限公司 A kind of method and terminal for showing private information
WO2018014533A1 (en) * 2016-07-18 2018-01-25 中兴通讯股份有限公司 Message processing method and apparatus
CN107644333A (en) * 2016-07-22 2018-01-30 展讯通信(上海)有限公司 Barcode scanning method of payment, device and payment terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370209A (en) * 2008-09-22 2009-02-18 深圳华为通信技术有限公司 Information disguising method and system
US20090199295A1 (en) * 2008-02-02 2009-08-06 Yung-Ho Shih Image password authentication system of portable electronic apparatus and method for the same
CN103559451A (en) * 2013-10-21 2014-02-05 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting and displaying privacy information
CN103888607A (en) * 2014-03-13 2014-06-25 惠州Tcl移动通信有限公司 Method and system for viewing privacy short message services of mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090199295A1 (en) * 2008-02-02 2009-08-06 Yung-Ho Shih Image password authentication system of portable electronic apparatus and method for the same
CN101370209A (en) * 2008-09-22 2009-02-18 深圳华为通信技术有限公司 Information disguising method and system
CN103559451A (en) * 2013-10-21 2014-02-05 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting and displaying privacy information
CN103888607A (en) * 2014-03-13 2014-06-25 惠州Tcl移动通信有限公司 Method and system for viewing privacy short message services of mobile terminal

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017028141A1 (en) * 2015-08-16 2017-02-23 张焰焰 Method and mobile terminal for logging in to account
CN106896996A (en) * 2015-12-21 2017-06-27 阿里巴巴集团控股有限公司 A kind of frame display methods and device
CN106897873A (en) * 2015-12-21 2017-06-27 阿里巴巴集团控股有限公司 A kind of frame display methods and device
CN106896996B (en) * 2015-12-21 2020-05-05 阿里巴巴集团控股有限公司 Information image display method and device
CN111738715A (en) * 2015-12-21 2020-10-02 阿里巴巴集团控股有限公司 Payment code payment method and device
CN111738715B (en) * 2015-12-21 2024-06-18 创新先进技术有限公司 Payment code payment method and device
CN105933503A (en) * 2016-03-29 2016-09-07 联想(北京)有限公司 Information processing method and electronic equipment
CN105933503B (en) * 2016-03-29 2020-02-21 联想(北京)有限公司 Information processing method and electronic equipment
CN107292185A (en) * 2016-03-30 2017-10-24 阿里巴巴集团控股有限公司 A kind of method and terminal for showing private information
WO2018014533A1 (en) * 2016-07-18 2018-01-25 中兴通讯股份有限公司 Message processing method and apparatus
CN107644333A (en) * 2016-07-22 2018-01-30 展讯通信(上海)有限公司 Barcode scanning method of payment, device and payment terminal

Also Published As

Publication number Publication date
CN104219053B (en) 2017-11-07

Similar Documents

Publication Publication Date Title
CN103916233B (en) A kind of information ciphering method and device
CN104219053A (en) Information displaying method, information concealing method and information concealing device
CN108269334A (en) Method for unlocking, terminal device and smart lock
CN104216742B (en) Brush machine control method and device based on password
CN105654302B (en) Payment method and device
CN104391870B (en) Logistics information acquisition methods and device
CN104283876A (en) Operation authorization method and device
CN104008348A (en) Application program control method, application program control device and terminal
CN105930707A (en) Method and device for switching systems
CN106020587A (en) Method and device for message display
TWI761843B (en) Access control method and device, electronic device and storage medium
CN104573550A (en) Method and device for protecting data
CN104484593B (en) terminal verification method and device
CN104391712A (en) Shutdown method and device
CN106156561A (en) Application locking method, application unlocking method and a device
CN106295294A (en) Method for controlling mobile terminal and device
US9667784B2 (en) Methods and devices for providing information in voice service
CN106126986A (en) Lock unlocking processing method and the device of data partition
CN107423378A (en) Image display method and device
CN106789070A (en) The decryption method of data, device and terminal
CN106845199A (en) Object authentication method and device
CN106372943A (en) Message processing method and device
CN105046127A (en) Encryption and decryption method and apparatus
CN107360322A (en) Information cuing method and device
CN106778198A (en) Perform the safety certifying method and device of operation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant