CN104463004B - A kind of method and apparatus of protection interface content - Google Patents

A kind of method and apparatus of protection interface content Download PDF

Info

Publication number
CN104463004B
CN104463004B CN201310439032.7A CN201310439032A CN104463004B CN 104463004 B CN104463004 B CN 104463004B CN 201310439032 A CN201310439032 A CN 201310439032A CN 104463004 B CN104463004 B CN 104463004B
Authority
CN
China
Prior art keywords
hiding
interface
user
hidden
entry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310439032.7A
Other languages
Chinese (zh)
Other versions
CN104463004A (en
Inventor
王宗学
蔡军
张宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Samsung Telecommunications Technology Research Co Ltd, Samsung Electronics Co Ltd filed Critical Beijing Samsung Telecommunications Technology Research Co Ltd
Priority to CN201310439032.7A priority Critical patent/CN104463004B/en
Publication of CN104463004A publication Critical patent/CN104463004A/en
Application granted granted Critical
Publication of CN104463004B publication Critical patent/CN104463004B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

This application discloses a kind of methods of protection interface content, including:The protected object that user chooses is determined first in the interface including multiple objects; then; after detecting user to the hiding operation of protected object, the protected object of selection is labeled as hiding, and hide selected protected object when display includes the interface of multiple objects.When detecting recovery operation of the user to protected object, restore to show protected object.Disclosed herein as well is a kind of devices of protection interface content.By the application, the protection of interface content can be conveniently realized.

Description

A kind of method and apparatus of protection interface content
Technical field
This application involves content protection technology, more particularly to a kind of method and apparatus of protection interface content.
Background technology
In existing terminal device, bulk information is all to show user with tabular form.Such as:Short message, mail etc.. In lists, there is the content of some entries very strong privacy, user to be not intended to be seen by other people.Therefore, related list The privacy of content, user has very powerful protection demand, but there is presently no easily guard methods;Such as common short message List is not intended to be seen by other people to the information of for example related bank card of some important information or other secrets.Mesh Before, list content to be protected needed for these, a kind of mode can be deleted manually, alternatively, third party can be used soft Part realizes the encryption to entry.
In the above method, if directly deleted to protect privacy, related content will disappear, and user thinks to search quilt again The content of deletion will become abnormal difficult;If using third-party encryption software, in addition to needing additional installation, it is also necessary to manually Protected content is added to third party software, it is still very inconvenient to the operation of list itself.
In addition to list, other on terminal device include that there is also the above problems for the interfaces of multiple objects, such as including more The file of a file.
Invention content
This application provides a kind of method and apparatus of protection interface content, can conveniently realize to including multiple objects Interface in contents of object protection.
To achieve the above object, the application adopts the following technical scheme that:
A method of protection interface content, including:
The object that user chooses is determined in the interface including multiple objects;
It is hiding by the object tag of selection after detecting user to the hiding operation of selected object, and is showing It is hidden when the interface and is marked as hiding object.
Preferably, hide be marked as hiding object after, this method further comprises:When detecting user to hidden When hiding the recovery operation of object, restore the object being hidden described in display.
Preferably, after detecting for the hiding operation of selected object, this method further comprises:To the selection Contents of object be encrypted;
Detect user to it is described be hidden the recovery operation of object after, restore the object being hidden described in display before, This method further comprises:Judge whether password input by user is correct, and after judging that password is correct, it is aobvious to execute the recovery The operation shown.
Preferably, described hide is marked as hiding object and includes:It is marked as hiding object described in not showing, or Person is marked as showing blank information on the position of hiding object, alternatively, being marked as hiding object described described Position on display is default or the mess code that randomly generates.
Preferably, described hide is marked as hiding object and includes:In the position for being marked as hiding object Upper display ciphertext.
Preferably, the password or preset password that are inputted in real time using user carry out the encryption.
Preferably, when by do not show it is described be marked as hiding object and be hidden when, it is described be marked as it is hidden Hidden identification is shown on the position of the object of Tibetan, for prompting present bit to be equipped with hidden object.
Preferably, described determine that the object that user chooses includes in interface:The long press operation of two fingers of user is detected, The object that object using two positions of long-press and therebetween is chosen as user, alternatively, by pair between two positions of long-press As the object chosen as user;
The hiding operation of described pair of selection object includes kneading operation or rotation process.
Preferably, the object in the interface is grouped in advance;
It is described to determine that the object that user chooses includes in interface:When determining that user selects an object in the interface Afterwards, using the object in object group where the object as the object of the selection.
Preferably, in detecting user to grouping after the cancellation operation of any object, by any object from grouping Middle deletion.
Preferably, the object by interface be grouped including:By user by second operation simultaneously or several times The multiple objects selected are as one group.
Preferably, it is described by interface be grouped including:The object in interface is grouped according to the rule of setting, often A grouping includes N number of object;For each grouping, one index object is set;The N is user or the natural number that system is arranged;
In display interface, the index object being each grouped is shown, alternatively, screen is shown each grouping with split screen mode In object.
Preferably, second operation includes the slide that suspension procedure, slide or multiple fingers are carried out at the same time.
Preferably, before being grouped the object in the interface, this method further comprises:According to the finger of user It enables, the specified object in the interface is moved to the designated position of current interface, alternatively, by the specified object in the interface It is moved to the designated position at other interfaces.
Preferably, when detecting that user's finger is suspended in above an object, the object is chosen to be moved with finger, this is right As be moved to finger frame out detection range position on.
Preferably, realizing that object is moved to the operation at other interfaces by rolling screen.
Preferably, when the rolling screen, it is true that the time in screen detection range is located at according to the user's finger detected Surely the speed of screen is rolled.
Preferably, being hidden object described in recovery display and including:Include in current interface by hiding contents of object On, alternatively, with roll mode including in list by the content of hiding object.
Preferably, after restoring to be hidden object described in display, this method further comprises:Receiving scheduled recovery After hiding instruction, the object for restoring display is enabled to return to hidden state.
Preferably, the hiding operation of the object of described pair of selection includes slide.
Preferably, when being hidden object in the interface and being deleted under hidden state, in the object that is hidden Blank is shown on position, alternatively, the subsequent object position for being hidden object is shifted to an earlier date successively.
Preferably, the interface including multiple objects includes list or file;
The object is entry or word content in list, alternatively, the object is the file in file.
A kind of device of protection interface content, including:Selection unit hides processing unit and display unit;
The selection unit, the object chosen for determining user in the interface including multiple objects;
The hiding processing unit for detecting user to choosing the hiding operation of object, and is detecting described hide After operation, the object tag by the selection is hiding;
The display unit is marked as hiding object for being hidden when showing the interface.
Preferably, the hiding processing unit, is further used for detecting user to being hidden the recovery operation of object, and lead to Know that display unit shows the object being accordingly hidden;
The display unit is further used for after the notice for receiving the hiding processing unit, restores described in display The object being hidden.
Preferably, described device further comprises encryption unit, for the hiding processing unit labeled as hiding Object is encrypted, and is additionally operable to after the password authentification notice for receiving the hiding processing unit, judges input by user close Whether code is correct, and will determine that result feeds back to the hiding processing unit;
The hiding processing unit, for after receiving the recovery operation, notifying the encryption unit to carry out password Verification, and after the correct result of encryption unit feedback cipher, the display unit is notified to restore to be hidden described in display Object.
Preferably, the device further comprises grouped element, for the object in the interface to be grouped;
The selection unit is further used for after user selects an object, by pair in object group where the object As the object as the selection.
As seen from the above technical solution, in the application, determine what user chose first in the interface including multiple objects Then protected object after detecting user to the hiding operation of protected object, the protected object of selection is labeled as hiding, And selected protected object is hidden in display interface.Further, when detecting recovery operation of the user to protected object When, the content for showing protected object can also be restored.By the above-mentioned means, can be right to the part in interface by predetermined registration operation As being hidden label, to when carrying out interface display, hide the content of labeled object, conveniently realize interface content Protection.
Description of the drawings
Fig. 1 is the basic flow chart that interface object method is protected in the application;
Fig. 2 is that the enciphering hiding schematic diagram for realizing list of entries is mediated by long-press;
Fig. 3 is that the decryption schematic diagram for realizing list of entries is instead mediated by long-press;
Fig. 4 is to rotate clockwise to realize that list content is encrypted as ciphertext schematic diagram by gesture;
Fig. 5 is to rotate to realize that list content decrypts schematic diagram counterclockwise by gesture;
Fig. 6 is the grouping schematic diagram that list is realized by suspension;
Fig. 7 is the grouping schematic diagram that list is realized by sliding;
Fig. 8 is the grouping schematic diagram that index list is realized by kneading;
Fig. 9 is to realize that the sequence of list of entries adjusts schematic diagram by suspension;
Figure 10 is the device basic structure schematic diagram that interface object is protected in the application.
Specific implementation mode
In order to make the purpose, technological means and advantage of the application be more clearly understood, the application is done below in conjunction with attached drawing It is further described.
It is hiding for needing object to be protected to be marked for including the interface of multiple objects in the application, and into When row interface display, object that covert marks are crossed.Wherein, including the interface of multiple objects can be list or file etc., Object can be entry or word content in list, alternatively, object can also be the file of such as photo in file.Having It is identical for the hiding process flow of object in interface when body application the present processes, in the following description, with to list It is illustrated for the hiding process flow of middle entry.
Fig. 1 is the basic flow chart that interface content method is protected in the application, and in Fig. 1, step 104 optionally performs Step.As shown in Figure 1, the flow includes:
Step 101, the entry that user chooses is determined in lists.
Step 102, after detecting hiding operation of the user to choosing entry, by the entry of selection labeled as hiding.
Wherein, hiding operation can be preset, and entry can be arbitrarily arranged labeled as hiding concrete mode, such as Flag bit etc. is hidden in setting.
Step 103, when showing list, the content for being marked as hiding entry is hidden.
When carrying out list display, each entry of preservation is traversed, for having been marked as hiding entry(Claim in the application To protect entry), no longer show the content of the entry.For the Stealth Modus of protection entry contents, can be configured, such as Its entry can entirely be hidden, or entry contents are shown as blank or mess code etc..
So far, the basic skills flow in the application terminates.On the basis of above-mentioned flow, it is marked as hiding when hiding Entry contents after, user's instruction can also be further advanced by, restore the entry that is hidden of display, specifically may be used as follows Processing is realized:
Step 104, when detecting recovery operation of the user to being hidden entry, restore display and be hidden the interior of entry Hold.
Wherein, recovery operation can also be preset.It, can be directly as hidden when recovery display is hidden the content of entry The same displayed entries content before hiding, or entry contents can also be shown with roll mode, and in the return for detecting user After the instruction of hidden state, entry will be hidden and restore hidden state.
It, can be after detecting the hiding operation to choosing entry, to this for the protection for further enhancing to entry contents The content for choosing entry is encrypted, in this way, after user is to being hidden entry execution recovery operation, needs input correctly close Code, system can just restore the hiding entry contents of display.Meanwhile after being encrypted, carry out entry contents it is hiding when, The ciphertext of entry can also be directly displayed.
Illustrate the specific implementation of the application below by several specific embodiments.
Embodiment one:It is mediated by long-press and realizes hiding for list of entries
For an entry, the entry is mediated with left and right after two finger long-press;Alternatively, being directed to multiple continuous entries, use Two fingers select two entries therein, are mediated up and down after long-press and can be realized as the selection of ceiling purpose and hiding instruction. Wherein, long press operation is for carrying out ceiling purpose selection, and kneading operation is then as hiding operation.
When being encrypted hiding, the icon prompt of lock can be used to input real-time encrypted password in kneading process, or pass through Password is set in advance, encryption every time can be encrypted as password default automatically, and label is hidden for selected entry after the completion of encryption, When showing list, the content of respective entries is hidden.In the present embodiment, it is hidden in a manner of not displayed entries.Selected entry Position can be substituted and be prompted by cut-off rule(Different for the kneading mode of one or more entries, cut-off rule mark is different)It should There is hiding information at place;When need to open hide entry when, indicated according to the difference of cut-off rule, corresponding direction is counter mediates for selection, leads to After crossing input clear crytpographic key, entry Automatic-expanding is hidden.If user be not desired to be unfolded it is all be hidden entry, merely desire to see entry When content, cut-off rule can be hidden by click and input password, the content for being hidden entry is shown in the form of rolling in list, After user finishes watching the content of entry, auto-returned is hiding and encrypted state, or need to only execute the recovery encryption of setting State operates(Such as press back keys)Can auto-returned be to hide and encrypted state.
In addition to list of entries, gesture can be also carried out to word content and mediates realization enciphering hiding.
A simply example is given below.As shown in Fig. 2, to realize hidden to the encryption of list of entries 3 and list of entries 4 It hides, user only need to select entry 2 and entry 5 to carry out kneading operation with after two finger long-press, then 4 automatic hidden of entry 3 and entry It hides, as shown in the right sides Fig. 2.Wherein, entry is hidden in order to prompt to exist between user's entry 2 and entry 5, it can be in entry 2 and item Display reminding information between mesh 5, such as cut-off rule shown in Fig. 2, in each embodiment of the application, cut-off rule is as hidden identification One example in practical application, can also show various types of hidden identifications of definition between entry 2 and entry 5, such as "+" number.
The above is non-encrypted Stealth Modus, further, if user has selected enciphering hiding, when user selects When entry 2 and entry 5 carry out kneading operation, that is, there is real-time encrypted password box, after inputting Crypted password(It is such as set as logical With password i.e. without this prompt), entry 3 and entry 4 be automatically encrypted it is hiding, still as shown in the right sides Fig. 2, corresponding entry 2 and entry 5 Between there is separator to prompt have hiding entry at this, it is preferable if use enciphering hiding, can also show the encryption mark of setting Knowledge is encrypted with the content for prompting user currently to hide, and a small lock is shown such as between entry 2 and entry 5.
When user needs that above-mentioned entry 3 and entry 4 is unfolded, hand is used on the separator between entry 2 and entry 5 Refer to it is anti-mediate as shown in the right sides Fig. 3, in the process, it may be necessary to click or the entry of long-press separator both sides, for example, click or Then long-press executes anti-kneading operation close to the entry 2 and entry 5 of separator, certainly, execute the anti-kneading operation and be not limited to The kneading position of finger, as long as the entry of cut-off rule both sides can be carried out instead mediating the operation that triggering restores hiding, for example, Click or long-press entry 1 and entry 6, which can also be used as, carries out the anti-operation mediated triggering and entry 3 and entry 4 is unfolded.Further If using enciphering hiding, while there is input clear crytpographic key frame and being hidden entry 3 and item after inputting proper password in ground Mesh 4 realizes Automatic-expanding.Anti- kneading operation therein is to restore display operation.
In above-mentioned Stealth Modus, if the entry being hidden is deleted, for example, entry 4 is deleted, then it can in the application With there are two types of processing modes:
1, the content of entry 4 is deleted, and entry 4 shows blank information;
2, it is moved up close to the entry 5 of entry 4.
In addition, for the entry of hiding information, exists if it is with dialogic operation, sent when being received again by same addresser New information when, on the basis of hiding display receive the prompt of new information.Such as every short message is with right in message list Existing for words form, if after the short message of certain contact person is hidden, when receiving the new message that the contact person sends, in the contact Display receives the prompt of new message in the hidden identification of people's short message, to ensure that user will not leak the short message seen and newly received.
Although above-described embodiment one mainly describes the hiding processing mode mediated by long-press and realize list of entries, The various processing modes such as various hiding modes of operation, recovery Stealth Modus, deletion entry described in the embodiment one, it is suitable For under various other interfaces to the processing mode of object.
Embodiment two:It is rotated by gesture and realizes that list content is encrypted as ciphertext;
Entry or word content in selective listing rotate clockwise operation, to selected item by what is carried out on the touchscreen Mesh or word realize encryption, and selected entry or content become ciphertext after encryption, and it is mess code or other plaintexts to show user. That is in the present embodiment, the selection of protection entry or word content can be realized in the way of the long-press in embodiment one, then Utilize the hiding instruction for rotating clockwise operation realization protection entry or word content.Other specific modes for carrying out encryption and decryption and The mode for hiding, restoring display is identical as embodiment one.
A simply example is given below.As shown in figure 4, when user wishes to encrypt entry 2, entry 3 and entry 4, make The selection entry 2 that uses gesture and entry 4 rotate clockwise, while Crypted password frame occur, by inputting Crypted password(As without adding Close or password is default universal code, then is not required to this step)Afterwards, that is, it realizes as shown in the right sides Fig. 4, corresponding selected entry 2 arrives item Entry realization between mesh 4 is encrypted as ciphertext or is shown as blank, it is preferable that can be with the essential information of reservation entry, for example, hair Part people's information.
The rotation gesture can also directly apply to the entry Stealth Modus in previous embodiment one.When user needs to upper It states when being encrypted as the entry of ciphertext and checking, rotation is as shown in the right sides Fig. 5 counterclockwise using gesture selection entry 2 and entry 4 by user, together When there is input password box, after input is correct, i.e., ciphertext reverts to content before encryption.That is, what is carried out on the screen is inverse Hour hands rotation process is to restore display operation.
All it is directly to be used as user by the content that operation is chosen to need to protect in above-described embodiment one and embodiment two The content of shield.In fact, list content can also be grouped before user chooses, when user chooses the content in list Afterwards, all entries being grouped where content or word content will be chosen all as entry to be protected or word content is needed, carried out Covert marks.Illustrate the specific implementation of this mode below by embodiment three, four and five.
Embodiment three:The method for supporting scattered block encryption hiding
In the present embodiment, multiple entries or word content are selected first, the scattered entry or word content that will be selected It is grouped as one.It can be realized by multiple selection operation when being specifically grouped operation, specific selection operation can be Suspension procedure.For example, can be used as first entry of grouping using the selection any entry that suspends, then select thereon or under it A certain entry be used as last entry automatically, two above entry automatically forms one group, this grouping is generally in choosing shape State is shown as dynamic effect.Alternatively, form one group using suspension select items many times or word content, specifically, when being suspended in When the entry or content, the entry or content are in selected state, are shown as dynamic effect, and by suspending, repeatedly selection is more After a entry or content, i.e., the entry or content chosen at this time are combined into one group,
After completing to be grouped, in detecting user to grouping after the cancellation operation of any entry or word content, by phase Entry or word content is answered to be deleted from grouping.For example, in above-mentioned scene, user delimit one point by suspension procedure Group, and the grouping is made to be in selected state, user need to only click wherein some entry, you can with by the entry from grouping It removes, this mode wishes to select many entries, but intermediate certain entries and unwanted situation for user.
After the completion of grouping, it is only necessary to be hidden operation to any entry in grouping or word content, system will incite somebody to action All entries or word content being grouped where the entry or word content are hidden label, are subsequently carrying out list display When, hide the entry or word content of respective packets.For example, choosing grouping in above-mentioned scene, make entirely to be grouped in choosing Middle state has then by sliding this group of entry realization enciphering hiding or being encrypted as ciphertext at selected entry or content Cut-off rule prompts, and is realized restore by the action of dragging again when needed.
In the selection of included entry or word content in being grouped, can also by once select multiple entries or Word content is realized.For example, alternatively being operated using slide, multiple discontinuous entries at same interface can be made It uses multiple finger simultaneous selections as one group and Slideslip realization to the right is concealed encrypted;In addition to the entry at same interface, by turning over Dynamic list, can the entry at the other interfaces of simultaneous selection carry out half and slide, i.e. selected holding is in dynamic, after completing to select It is automatically composed one group, then carries out the full sliding realization encryption of batch on the basis of half sliding to the group, realizes and restores to be same as above.
Two simply examples are given below, Fig. 6 is to be selected to realize the example of grouping by suspension procedure.Such as Shown in Fig. 6, entry 2 is selected by suspension finger, then continues to suspension finger selection entry 4, i.e., between entry 2 and entry 4 All entries automatically form one group and in selected states, as shown in the right sides Fig. 6, when needing to delete a certain entry of the group such as entry When 3, user need to only be selected to click the entry with finger to be to realize that the entries cancellation is selected state, remaining entry chosen(Item Mesh 2 and entry 4)It can be encrypted by aforesaid operations as one group and hide or be encrypted as ciphertext.
Fig. 7 is to be selected to realize the example of grouping by slide.As shown in fig. 7, by multiple point touching, use One, family finger selection entry 2 is done to be slided by a small margin, another finger simultaneous selection entry 4 is slided by a small margin, that is, is realized Entry 2 and entry 4 automatically form one group and in selected states;It is to this group of entry by sliding any entry in the group Operation sliding mode by a small margin before is increased into sliding amplitude and is realized to the enciphering hiding of this group of entry as shown in the right sides Fig. 7 Or it is encrypted as ciphertext.
Example IV:The grouping of index list is realized by kneading
For the more situation of entry in list, entry in list is carried out by quickly mediating selected entry in list Grouping, selected number can be used as the radix of grouping, can be grouped by default rule, such as according to phonetic grouping or temporally Sequential packet;Each group as a new entry(That is directory entry)Display in lists, can show in new entry and be wrapped Information containing entry, new entry can show in the way of original list, can also be by the side of similar launcher desktop split screens Formula is shown, is conducive to accurate positionin of the user to entry in this way.
A simply example is given below, is automatically grouping with 4 as utilized finger to mediate entry 1 and entry 4 in Fig. 8 Radix, i.e., every group includes 4 entries, is realized after kneading as shown list grouping or split screen grouping in the right sides Fig. 7.
Before the grouping for carrying out entry or word content, it is preferable that can also by the entry carry out sequence adjustment in list, Selection to conveniently be grouped.Specifically, the specified entry in the list can be moved to according to the instruction of user Specified entry in the list is moved to the finger at other interfaces by the designated position of current interface alternatively, by rolling screen Positioning is set.The concrete mode of Entry order adjustment is introduced below by embodiment five and embodiment six.
Embodiment five:The sequence adjustment of list of entries is realized by suspension or multiple point touching
It is suspended in a certain entry in list using finger, i.e. the entry is in by finger adsorbed state;Immediately upwards or Finger is moved down, realizes that the position of the entry in lists moves up and down, in the position that finger unclamps, which is moved At to this, the sequence adjustment of entry in list is realized.
Realize distance dragging farther out using multiple point touching sliding type, as user wish to move a certain entry to distance compared with Remote position, it is smaller to be confined to screen size, and a certain entry may be selected in one finger of user, and motionless, another rubber sleeve is chosen in holding Dynamic screen makes list stir up and down, and when sliding into corresponding position, the entry chosen release is positioned over this position by the finger chosen.
A simply example is given below, as shown in figure 9, by entry 3 in finger suspension list, i.e. entry 3 is in Selected state, it is to be adsorbed on finger to show form, by moving up and down finger, realizes that the sequence of list of entries changes.
When controlling screen scroll to realize that list or more is stirred, for the speed that list is stirred, touched by finger The length of time controls.For example, touching, the time is longer, and the speed that list is stirred is bigger, and the time is shorter, and it is smaller to stir speed.
When finger touches in list, touching the time can be with instant playback on the screen, and such as setting touches list 1 second, 5 entries of automatic sliding touch list 2 seconds, slide 15 entries automatically, and so on, touch list time is longer, automatic sliding The number of dynamic entry is more, i.e., speed is faster;And time dynamic shows that user selects the time more accurate, reaches on the screen The purpose that User Control List stirs speed is arrived.
Above-mentioned is the specific implementation of list content guard method in the application.In the method, it removes to list content It hides with outside encipherment protection, the above index list grouping, the adjustment of list of entries sequence, control list stir speed except itself is operated List it is convenient outer, while to realizing that list content protection encryption provides more better choices, especially for scattered grouping Fast and accurately selection and block encryption can be achieved in conjunction with above in encryption.
Relevant processing mode is hidden described in the above-mentioned each embodiment of the application, although being directed to different boundaries respectively Object factory under face, but in practical application, hide relevant processing mode described in each embodiment, can also fit For the object under other interfaces.
Present invention also provides a kind of device of protection interface content, which may be embodied in terminal device, server Etc. in various types of equipment, it can be used in the list content guard method for implementing above-mentioned the application.Figure 10 is to be protected in the application Protect the basic structure schematic diagram of interface content device.As shown in Figure 10, which includes:Selection unit, hide processing unit and Display unit.
Wherein, selection unit, the object chosen for determining user in the interface including multiple objects.It is single to hide processing The object tag of selection is hidden for detecting hiding operation of the user to selection object, and after detecting hiding operation by member It hides.Display unit, for hiding the object for being hidden label in display interface.
Further, to restore the display of hidden object, processing unit is hidden, can be also used for detection user to selection pair The recovery operation of elephant, and display unit is notified to show corresponding object.Display unit can be also used for receiving hiding processing list After the notice of member, restores display and be marked as hiding object.
Furthermore it is preferred that device can further include encryption unit, for the object to hiding processing unit label It is encrypted, is additionally operable to after the password authentification notice for receiving hiding processing unit, judges password input by user whether just Really, and it will determine that result feeds back to hiding processing unit.Processing unit is hidden, for after receiving recovery operation, notice to add Close unit carries out password authentification, and after the correct result of encryption unit feedback cipher, and notice display unit restores display and chooses Object.Wherein, encryption unit can be added when being encrypted using the password or preset password that user inputs in real time It is close.
Display unit in device can not show selected object in hidden object, alternatively, can also be selected Object position on show blank information, alternatively, default or random production can also be shown on the position of selected object Raw mess code.Wherein, when device includes encryption unit, display unit removes can carry out hiding for object in fashion described above Outside, ciphertext can also be shown on the position of the object of selection.
Preferably, when determining the object that user chooses, concrete mode can be selection unit:Detect two fingers of user Long press operation, the entry or word that all entries using two positions of long-press and therebetween or word content are chosen as user Content, alternatively, using all entries or the entry chosen as user of word content or word content between two positions of long-press. Hiding operation to choosing object can be kneading operation or rotation process etc..
Preferably, to realize the unified selection of multiple objects and hiding processing, it is single that device can further include grouping Member, for the object in interface to be grouped.Selection unit is further used for after user selects an object, this is right As all objects in the object group of place are as the object chosen.Wherein, when grouped element is grouped, user can be passed through Setting operates the multiple objects selected simultaneously or several times as one group, and the operation of setting can be suspension procedure, sliding behaviour The slide that work or multiple fingers are carried out at the same time.It, can be in detecting user to grouping after the cancellation operation of any object Any object is deleted from grouping.
Alternatively, all objects in interface can also be grouped by grouped element according to the rule of setting, and it is each grouping One directory entry is set;Each grouping includes N number of object, and N is user or the number of objects that system is arranged.Display unit can be shown Show the directory entry of each grouping, alternatively, screen to be shown with split screen mode to the entry in each grouping.Wherein it is possible to will use The entry sum that family selects in lists is as entry number N.
In addition, for convenience of the division operation carried out to list, mobile unit is can further include in device, is used for root According to the instruction of user, the specified entry in list is moved to the designated position of current interface, alternatively, by rolling screen, it will Specified entry in list is moved to the designated position at other interfaces.Wherein, when detecting that user's finger is suspended in an entry When, it chooses the entry to be moved with finger, which is moved on the position of finger release.When rolling screen, it is preferable that mobile Unit can be according to the speed for touching time determination and rolling screen to screen detected.
Further, display unit, can be by hiding entry or text when restoring perhaps word content in displayed entries Word content is directly displayed in current interface, alternatively, can also show hiding entry contents or word content with roll mode Show in list, and after receiving scheduled recovery and hiding instruction, entry or word content that will be hiding return to hidden state.
By the specific implementation of above-mentioned the application as it can be seen that by the processing of the application, can utilize sliding to list and point The method of group realizes the protection to list content by kneading, gesture rotation, suspension, the sliding etc. to list content.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention With within principle, any modification, equivalent substitution, improvement and etc. done should be included within the scope of protection of the invention god.

Claims (24)

1. a kind of method of protection interface content, which is characterized in that including:
The object that user chooses is determined in the interface including multiple objects;
It is hiding by the object tag of selection, and described in display after detecting user to the hiding operation of selected object It is hidden when interface and is marked as hiding object;
When detecting recovery operation of the user to being hidden object, restore pair being hidden described in display on the interface As;The wherein described recovery operation is the operation carried out on the hiding generation position in the interface, the hiding behaviour Make and the recovery operation is preset.
2. according to the method described in claim 1, it is characterized in that, after detecting for the hiding operation of selected object, This method further comprises:The contents of object of the selection is encrypted;
Detect user to it is described be hidden the recovery operation of object after, restore the object being hidden described in display before, the party Method further comprises:Judge whether password input by user is correct, and after judging that password is correct, executes the recovery display Operation.
3. method according to claim 1 or 2, which is characterized in that described hide is marked as hiding object and includes:No Hiding object is marked as described in display, alternatively, be marked as showing blank information on the position of hiding object described, Alternatively, being marked as showing mess code that is default or randomly generating on the position of hiding object described.
4. according to the method described in claim 2, it is characterized in that, described hide is marked as hiding object and includes:Institute It states and is marked as showing ciphertext on the position of hiding object.
5. according to the method described in claim 2, it is characterized in that, the password or preset password that are inputted in real time using user into The row encryption.
6. according to the method described in claim 3, it is characterized in that, when by do not show it is described be marked as hiding object into When row is hidden, it is marked as showing hidden identification on the position of hiding object described, it is hiding for prompting present bit to be equipped with Object.
7. according to the method described in claim 1, it is characterized in that, described determine user's choosing in the interface including multiple objects The object taken includes:The long press operation of two fingers of user is detected, object using two positions of long-press and therebetween is as user The object of selection, alternatively, the object that the object between two positions of long-press is chosen as user;
The hiding operation to selected object includes kneading operation or rotation process.
8. according to the method described in claim 1, it is characterized in that, the object in the interface is grouped in advance;
It is described to determine that the object that user chooses includes in the interface including multiple objects:It is selected when determining user in the interface After selecting an object, using the object in object group where the object as the object of the selection.
9. according to the method described in claim 8, it is characterized in that, when detecting cancellation behaviour of the user to any object in grouping After work, any object is deleted from grouping.
10. according to the method described in claim 8, it is characterized in that, the object by the interface be grouped including: Multiple objects that user is selected simultaneously or several times by the second operation are as one group.
11. according to the method described in claim 8, it is characterized in that, the object by the interface be grouped including: The object in interface is grouped according to the rule of setting, each grouping includes N number of object;For each grouping, one index pair is set As;The N is user or the natural number that system is arranged;
In display interface, the index object being each grouped is shown, alternatively, screen is shown with split screen mode in each grouping Object.
12. according to the method described in claim 10, it is characterized in that, second operation includes suspension procedure, slide Or the slide that multiple fingers are carried out at the same time.
13. according to the method described in claim 8, it is characterized in that, before the object in the interface is grouped, the party Method further comprises:According to the instruction of user, the specified object in the interface is moved to the designated position of current interface, or Specified object in the interface is moved to the designated position at other interfaces by person.
14. according to the method for claim 13, which is characterized in that when detecting that user's finger is suspended in above an object When, choose the object to be moved with finger, by the object be moved to finger frame out detection range position on.
15. according to the method for claim 13, which is characterized in that realize that object is moved to other interfaces by rolling screen Operation.
16. according to the method for claim 15, which is characterized in that when the rolling screen, according to the user hand detected Refer to the speed that the time determination being located in screen detection range rolls screen.
17. according to the method described in claim 1,2 or 8, which is characterized in that described to restore to show the quilt on the interface Hidden object includes:Hiding contents of object is directly displayed on the interface, alternatively, by the content of hiding object to roll Flowing mode is shown on the interface.
18. according to the method for claim 17, which is characterized in that after restoring to be hidden object described in display, this method Further comprise:After receiving scheduled recovery and hiding instruction, the object for restoring to show is enabled to return to hidden state.
19. according to the method described in claim 1,2 or 8, which is characterized in that the hiding operation packet to selected object Include slide.
20. according to the method described in claim 1,2 or 8, which is characterized in that when being hidden object in the interface in hiding shape When being deleted under state, blank is shown in described be hidden on the position of object, alternatively, by the subsequent object for being hidden object Position shifts to an earlier date successively.
21. according to the method described in claim 1,2 or 8, which is characterized in that the interface including multiple objects includes list Or file;
The object is entry or word content in list, alternatively, the object is the file in file.
22. a kind of device of protection interface content, which is characterized in that including:Selection unit hides processing unit and display list Member;
The selection unit, the object chosen for determining user in the interface including multiple objects;
The hiding processing unit for detecting user to choosing the hiding operation of object, and is detecting the hiding operation Afterwards, it is hiding by the object tag of the selection;It is further used for detecting user to being hidden the recovery operation of object, and notifies Display unit shows the object being accordingly hidden;The wherein described recovery operation is in the interface in the hiding generation position The operation of progress is set, the hiding operation and the recovery operation are preset;
The display unit is marked as hiding object for being hidden when showing the interface;It is further used for receiving To after the notice of the hiding processing unit, restore the object being hidden described in display.
23. device according to claim 22, which is characterized in that described device further comprises encryption unit, for pair The hiding processing unit is encrypted labeled as hiding object, is additionally operable in the password for receiving the hiding processing unit After verification notice, judge whether password input by user is correct, and will determine that result feeds back to the hiding processing unit;
The hiding processing unit, for after receiving the recovery operation, notifying the encryption unit to carry out password authentification, And after the correct result of encryption unit feedback cipher, the display unit is notified to restore pair being hidden described in display As.
24. the device according to claim 22 or 23, which is characterized in that the device further comprises grouped element, is used for Object in the interface is grouped;
The selection unit is further used for after user selects an object, and the object in object group where the object is made For the object of the selection.
CN201310439032.7A 2013-09-24 2013-09-24 A kind of method and apparatus of protection interface content Active CN104463004B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310439032.7A CN104463004B (en) 2013-09-24 2013-09-24 A kind of method and apparatus of protection interface content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310439032.7A CN104463004B (en) 2013-09-24 2013-09-24 A kind of method and apparatus of protection interface content

Publications (2)

Publication Number Publication Date
CN104463004A CN104463004A (en) 2015-03-25
CN104463004B true CN104463004B (en) 2018-08-28

Family

ID=52909026

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310439032.7A Active CN104463004B (en) 2013-09-24 2013-09-24 A kind of method and apparatus of protection interface content

Country Status (1)

Country Link
CN (1) CN104463004B (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883436A (en) * 2015-04-30 2015-09-02 广东欧珀移动通信有限公司 Information hiding method and apparatus
CN104898482A (en) * 2015-05-04 2015-09-09 广东美的制冷设备有限公司 Control interface displaying method and device
CN106339636A (en) * 2015-07-10 2017-01-18 阿里巴巴集团控股有限公司 Hiding setting method and device, application program content processing method and device
CN105068723B (en) * 2015-07-27 2019-12-24 联想(北京)有限公司 Information processing method and electronic equipment
CN106649387B (en) * 2015-11-02 2020-07-03 阿里巴巴集团控股有限公司 Method and device for displaying information
CN106445325B (en) * 2016-08-30 2019-09-20 华为技术有限公司 A kind of method and device creating group
CN106650484A (en) * 2016-08-31 2017-05-10 深圳天珑无线科技有限公司 Picture library content processing method and apparatus, and mobile device
CN106708375A (en) * 2016-12-26 2017-05-24 惠州Tcl移动通信有限公司 Interface filtering method and system
CN107295186A (en) * 2017-07-03 2017-10-24 广东欧珀移动通信有限公司 Method for hidden controlling, device and the storage medium and mobile terminal of application message
CN109521914A (en) * 2017-09-19 2019-03-26 阿里巴巴集团控股有限公司 Restore the methods, devices and systems of data in file
CN109460672A (en) * 2018-10-18 2019-03-12 北京邮电大学 A kind of order encryption method of online shopping mall
CN109947328B (en) * 2019-03-21 2020-12-08 珠海格力电器股份有限公司 Multi-parameter display method and device and air conditioning unit monitoring equipment
CN110069304A (en) * 2019-03-26 2019-07-30 维沃移动通信有限公司 A kind of notification message display methods and terminal device
CN110377219B (en) * 2019-07-10 2021-04-20 维沃移动通信有限公司 Interface interaction method and terminal
CN111368329B (en) * 2020-03-02 2023-06-23 北京达佳互联信息技术有限公司 Message display method and device, electronic equipment and storage medium
CN111399712A (en) * 2020-03-11 2020-07-10 上海索辰信息科技有限公司 System and method for processing sequence diagram packet
CN111786876B (en) * 2020-06-29 2022-11-04 北京字节跳动网络技术有限公司 Information processing method, device, electronic equipment and computer readable medium
CN112417483A (en) * 2020-11-26 2021-02-26 珠海格力电器股份有限公司 Data encryption method and device, electronic equipment and storage medium
CN112948422A (en) * 2021-03-11 2021-06-11 北京小米移动软件有限公司 Contact person searching method and device and electronic equipment
CN113050850A (en) * 2021-03-29 2021-06-29 联想(北京)有限公司 Output control method and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101248438A (en) * 2005-06-24 2008-08-20 创新科技有限公司 A method and apparatus for protecting private information on a user apparatus
TW201019682A (en) * 2008-11-12 2010-05-16 Condel Internat Technologies Inc Method and system for enhancing data encryption using multiple-key lists
CN101754467A (en) * 2008-12-22 2010-06-23 康佳集团股份有限公司 Realizing method of privacy protection for dual-card cell phone
CN101833625A (en) * 2010-05-11 2010-09-15 上海众烁信息科技有限公司 File and folder safety protection method based on dynamic password and system thereof
CN102156614A (en) * 2010-01-06 2011-08-17 苹果公司 Device, method, and graphical user interface for manipulating tables using multi-contact gestures
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101248438A (en) * 2005-06-24 2008-08-20 创新科技有限公司 A method and apparatus for protecting private information on a user apparatus
TW201019682A (en) * 2008-11-12 2010-05-16 Condel Internat Technologies Inc Method and system for enhancing data encryption using multiple-key lists
CN101754467A (en) * 2008-12-22 2010-06-23 康佳集团股份有限公司 Realizing method of privacy protection for dual-card cell phone
CN102156614A (en) * 2010-01-06 2011-08-17 苹果公司 Device, method, and graphical user interface for manipulating tables using multi-contact gestures
CN101833625A (en) * 2010-05-11 2010-09-15 上海众烁信息科技有限公司 File and folder safety protection method based on dynamic password and system thereof
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal

Also Published As

Publication number Publication date
CN104463004A (en) 2015-03-25

Similar Documents

Publication Publication Date Title
CN104463004B (en) A kind of method and apparatus of protection interface content
CN103324898B (en) Method for encrypting/decrypting display content in touch screen, and communication terminal
EP2390812B1 (en) Method and apparatus for controlling objects of a user interface
CN105074716B (en) For making the technology safe to use of one-time password
JP6590583B2 (en) Security device and terminal device including the same
CN103455761B (en) File encryption and decryption method and device and electronic device
WO2016045469A1 (en) Information encryption method and mobile terminal
WO2012000092A1 (en) Seamless end-to-end data obfuscation and encryption
CN104333449A (en) Picture encryption method and system
CN106203061B (en) Encryption method of application program and mobile terminal
CN104732121A (en) Encryption setting method, decryption setting method and corresponding device of application program
KR20130087010A (en) Method and device for secured entry of personal data
CN103092484A (en) Method and device and terminal for unlocking screen
CN104408357A (en) Fingerprint encryption device and method, fingerprint decryption device and method
CN103930899A (en) A method for managing public and private data input at a device
US20180053006A1 (en) Primary device, an accessory device, and methods for processing operations on the primary device and the accessory device
CN104768148A (en) Message encryption method and device
CN110140336A (en) Consecutive password technology
CN103186346A (en) Pattern-based touch screen unlocking system and method
CN105243331A (en) Encryption device and encryption method, and decryption device and decryption method
EP3203407A1 (en) Information processing method and information processing device
CN105893854A (en) Encryption and decryption method and device
CN108491703A (en) A kind of double verification unlocking method and system based on comprehensive screen equipment
CN107832603A (en) The startup method and mobile terminal of a kind of application program
US9613201B1 (en) Access control by a mobile device using an image

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant