CN104463004B - A kind of method and apparatus of protection interface content - Google Patents
A kind of method and apparatus of protection interface content Download PDFInfo
- Publication number
- CN104463004B CN104463004B CN201310439032.7A CN201310439032A CN104463004B CN 104463004 B CN104463004 B CN 104463004B CN 201310439032 A CN201310439032 A CN 201310439032A CN 104463004 B CN104463004 B CN 104463004B
- Authority
- CN
- China
- Prior art keywords
- hiding
- interface
- user
- hidden
- entry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04842—Selection of displayed objects or displayed text elements
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
This application discloses a kind of methods of protection interface content, including:The protected object that user chooses is determined first in the interface including multiple objects; then; after detecting user to the hiding operation of protected object, the protected object of selection is labeled as hiding, and hide selected protected object when display includes the interface of multiple objects.When detecting recovery operation of the user to protected object, restore to show protected object.Disclosed herein as well is a kind of devices of protection interface content.By the application, the protection of interface content can be conveniently realized.
Description
Technical field
This application involves content protection technology, more particularly to a kind of method and apparatus of protection interface content.
Background technology
In existing terminal device, bulk information is all to show user with tabular form.Such as:Short message, mail etc..
In lists, there is the content of some entries very strong privacy, user to be not intended to be seen by other people.Therefore, related list
The privacy of content, user has very powerful protection demand, but there is presently no easily guard methods;Such as common short message
List is not intended to be seen by other people to the information of for example related bank card of some important information or other secrets.Mesh
Before, list content to be protected needed for these, a kind of mode can be deleted manually, alternatively, third party can be used soft
Part realizes the encryption to entry.
In the above method, if directly deleted to protect privacy, related content will disappear, and user thinks to search quilt again
The content of deletion will become abnormal difficult;If using third-party encryption software, in addition to needing additional installation, it is also necessary to manually
Protected content is added to third party software, it is still very inconvenient to the operation of list itself.
In addition to list, other on terminal device include that there is also the above problems for the interfaces of multiple objects, such as including more
The file of a file.
Invention content
This application provides a kind of method and apparatus of protection interface content, can conveniently realize to including multiple objects
Interface in contents of object protection.
To achieve the above object, the application adopts the following technical scheme that:
A method of protection interface content, including:
The object that user chooses is determined in the interface including multiple objects;
It is hiding by the object tag of selection after detecting user to the hiding operation of selected object, and is showing
It is hidden when the interface and is marked as hiding object.
Preferably, hide be marked as hiding object after, this method further comprises:When detecting user to hidden
When hiding the recovery operation of object, restore the object being hidden described in display.
Preferably, after detecting for the hiding operation of selected object, this method further comprises:To the selection
Contents of object be encrypted;
Detect user to it is described be hidden the recovery operation of object after, restore the object being hidden described in display before,
This method further comprises:Judge whether password input by user is correct, and after judging that password is correct, it is aobvious to execute the recovery
The operation shown.
Preferably, described hide is marked as hiding object and includes:It is marked as hiding object described in not showing, or
Person is marked as showing blank information on the position of hiding object, alternatively, being marked as hiding object described described
Position on display is default or the mess code that randomly generates.
Preferably, described hide is marked as hiding object and includes:In the position for being marked as hiding object
Upper display ciphertext.
Preferably, the password or preset password that are inputted in real time using user carry out the encryption.
Preferably, when by do not show it is described be marked as hiding object and be hidden when, it is described be marked as it is hidden
Hidden identification is shown on the position of the object of Tibetan, for prompting present bit to be equipped with hidden object.
Preferably, described determine that the object that user chooses includes in interface:The long press operation of two fingers of user is detected,
The object that object using two positions of long-press and therebetween is chosen as user, alternatively, by pair between two positions of long-press
As the object chosen as user;
The hiding operation of described pair of selection object includes kneading operation or rotation process.
Preferably, the object in the interface is grouped in advance;
It is described to determine that the object that user chooses includes in interface:When determining that user selects an object in the interface
Afterwards, using the object in object group where the object as the object of the selection.
Preferably, in detecting user to grouping after the cancellation operation of any object, by any object from grouping
Middle deletion.
Preferably, the object by interface be grouped including:By user by second operation simultaneously or several times
The multiple objects selected are as one group.
Preferably, it is described by interface be grouped including:The object in interface is grouped according to the rule of setting, often
A grouping includes N number of object;For each grouping, one index object is set;The N is user or the natural number that system is arranged;
In display interface, the index object being each grouped is shown, alternatively, screen is shown each grouping with split screen mode
In object.
Preferably, second operation includes the slide that suspension procedure, slide or multiple fingers are carried out at the same time.
Preferably, before being grouped the object in the interface, this method further comprises:According to the finger of user
It enables, the specified object in the interface is moved to the designated position of current interface, alternatively, by the specified object in the interface
It is moved to the designated position at other interfaces.
Preferably, when detecting that user's finger is suspended in above an object, the object is chosen to be moved with finger, this is right
As be moved to finger frame out detection range position on.
Preferably, realizing that object is moved to the operation at other interfaces by rolling screen.
Preferably, when the rolling screen, it is true that the time in screen detection range is located at according to the user's finger detected
Surely the speed of screen is rolled.
Preferably, being hidden object described in recovery display and including:Include in current interface by hiding contents of object
On, alternatively, with roll mode including in list by the content of hiding object.
Preferably, after restoring to be hidden object described in display, this method further comprises:Receiving scheduled recovery
After hiding instruction, the object for restoring display is enabled to return to hidden state.
Preferably, the hiding operation of the object of described pair of selection includes slide.
Preferably, when being hidden object in the interface and being deleted under hidden state, in the object that is hidden
Blank is shown on position, alternatively, the subsequent object position for being hidden object is shifted to an earlier date successively.
Preferably, the interface including multiple objects includes list or file;
The object is entry or word content in list, alternatively, the object is the file in file.
A kind of device of protection interface content, including:Selection unit hides processing unit and display unit;
The selection unit, the object chosen for determining user in the interface including multiple objects;
The hiding processing unit for detecting user to choosing the hiding operation of object, and is detecting described hide
After operation, the object tag by the selection is hiding;
The display unit is marked as hiding object for being hidden when showing the interface.
Preferably, the hiding processing unit, is further used for detecting user to being hidden the recovery operation of object, and lead to
Know that display unit shows the object being accordingly hidden;
The display unit is further used for after the notice for receiving the hiding processing unit, restores described in display
The object being hidden.
Preferably, described device further comprises encryption unit, for the hiding processing unit labeled as hiding
Object is encrypted, and is additionally operable to after the password authentification notice for receiving the hiding processing unit, judges input by user close
Whether code is correct, and will determine that result feeds back to the hiding processing unit;
The hiding processing unit, for after receiving the recovery operation, notifying the encryption unit to carry out password
Verification, and after the correct result of encryption unit feedback cipher, the display unit is notified to restore to be hidden described in display
Object.
Preferably, the device further comprises grouped element, for the object in the interface to be grouped;
The selection unit is further used for after user selects an object, by pair in object group where the object
As the object as the selection.
As seen from the above technical solution, in the application, determine what user chose first in the interface including multiple objects
Then protected object after detecting user to the hiding operation of protected object, the protected object of selection is labeled as hiding,
And selected protected object is hidden in display interface.Further, when detecting recovery operation of the user to protected object
When, the content for showing protected object can also be restored.By the above-mentioned means, can be right to the part in interface by predetermined registration operation
As being hidden label, to when carrying out interface display, hide the content of labeled object, conveniently realize interface content
Protection.
Description of the drawings
Fig. 1 is the basic flow chart that interface object method is protected in the application;
Fig. 2 is that the enciphering hiding schematic diagram for realizing list of entries is mediated by long-press;
Fig. 3 is that the decryption schematic diagram for realizing list of entries is instead mediated by long-press;
Fig. 4 is to rotate clockwise to realize that list content is encrypted as ciphertext schematic diagram by gesture;
Fig. 5 is to rotate to realize that list content decrypts schematic diagram counterclockwise by gesture;
Fig. 6 is the grouping schematic diagram that list is realized by suspension;
Fig. 7 is the grouping schematic diagram that list is realized by sliding;
Fig. 8 is the grouping schematic diagram that index list is realized by kneading;
Fig. 9 is to realize that the sequence of list of entries adjusts schematic diagram by suspension;
Figure 10 is the device basic structure schematic diagram that interface object is protected in the application.
Specific implementation mode
In order to make the purpose, technological means and advantage of the application be more clearly understood, the application is done below in conjunction with attached drawing
It is further described.
It is hiding for needing object to be protected to be marked for including the interface of multiple objects in the application, and into
When row interface display, object that covert marks are crossed.Wherein, including the interface of multiple objects can be list or file etc.,
Object can be entry or word content in list, alternatively, object can also be the file of such as photo in file.Having
It is identical for the hiding process flow of object in interface when body application the present processes, in the following description, with to list
It is illustrated for the hiding process flow of middle entry.
Fig. 1 is the basic flow chart that interface content method is protected in the application, and in Fig. 1, step 104 optionally performs
Step.As shown in Figure 1, the flow includes:
Step 101, the entry that user chooses is determined in lists.
Step 102, after detecting hiding operation of the user to choosing entry, by the entry of selection labeled as hiding.
Wherein, hiding operation can be preset, and entry can be arbitrarily arranged labeled as hiding concrete mode, such as
Flag bit etc. is hidden in setting.
Step 103, when showing list, the content for being marked as hiding entry is hidden.
When carrying out list display, each entry of preservation is traversed, for having been marked as hiding entry(Claim in the application
To protect entry), no longer show the content of the entry.For the Stealth Modus of protection entry contents, can be configured, such as
Its entry can entirely be hidden, or entry contents are shown as blank or mess code etc..
So far, the basic skills flow in the application terminates.On the basis of above-mentioned flow, it is marked as hiding when hiding
Entry contents after, user's instruction can also be further advanced by, restore the entry that is hidden of display, specifically may be used as follows
Processing is realized:
Step 104, when detecting recovery operation of the user to being hidden entry, restore display and be hidden the interior of entry
Hold.
Wherein, recovery operation can also be preset.It, can be directly as hidden when recovery display is hidden the content of entry
The same displayed entries content before hiding, or entry contents can also be shown with roll mode, and in the return for detecting user
After the instruction of hidden state, entry will be hidden and restore hidden state.
It, can be after detecting the hiding operation to choosing entry, to this for the protection for further enhancing to entry contents
The content for choosing entry is encrypted, in this way, after user is to being hidden entry execution recovery operation, needs input correctly close
Code, system can just restore the hiding entry contents of display.Meanwhile after being encrypted, carry out entry contents it is hiding when,
The ciphertext of entry can also be directly displayed.
Illustrate the specific implementation of the application below by several specific embodiments.
Embodiment one:It is mediated by long-press and realizes hiding for list of entries
For an entry, the entry is mediated with left and right after two finger long-press;Alternatively, being directed to multiple continuous entries, use
Two fingers select two entries therein, are mediated up and down after long-press and can be realized as the selection of ceiling purpose and hiding instruction.
Wherein, long press operation is for carrying out ceiling purpose selection, and kneading operation is then as hiding operation.
When being encrypted hiding, the icon prompt of lock can be used to input real-time encrypted password in kneading process, or pass through
Password is set in advance, encryption every time can be encrypted as password default automatically, and label is hidden for selected entry after the completion of encryption,
When showing list, the content of respective entries is hidden.In the present embodiment, it is hidden in a manner of not displayed entries.Selected entry
Position can be substituted and be prompted by cut-off rule(Different for the kneading mode of one or more entries, cut-off rule mark is different)It should
There is hiding information at place;When need to open hide entry when, indicated according to the difference of cut-off rule, corresponding direction is counter mediates for selection, leads to
After crossing input clear crytpographic key, entry Automatic-expanding is hidden.If user be not desired to be unfolded it is all be hidden entry, merely desire to see entry
When content, cut-off rule can be hidden by click and input password, the content for being hidden entry is shown in the form of rolling in list,
After user finishes watching the content of entry, auto-returned is hiding and encrypted state, or need to only execute the recovery encryption of setting
State operates(Such as press back keys)Can auto-returned be to hide and encrypted state.
In addition to list of entries, gesture can be also carried out to word content and mediates realization enciphering hiding.
A simply example is given below.As shown in Fig. 2, to realize hidden to the encryption of list of entries 3 and list of entries 4
It hides, user only need to select entry 2 and entry 5 to carry out kneading operation with after two finger long-press, then 4 automatic hidden of entry 3 and entry
It hides, as shown in the right sides Fig. 2.Wherein, entry is hidden in order to prompt to exist between user's entry 2 and entry 5, it can be in entry 2 and item
Display reminding information between mesh 5, such as cut-off rule shown in Fig. 2, in each embodiment of the application, cut-off rule is as hidden identification
One example in practical application, can also show various types of hidden identifications of definition between entry 2 and entry 5, such as
"+" number.
The above is non-encrypted Stealth Modus, further, if user has selected enciphering hiding, when user selects
When entry 2 and entry 5 carry out kneading operation, that is, there is real-time encrypted password box, after inputting Crypted password(It is such as set as logical
With password i.e. without this prompt), entry 3 and entry 4 be automatically encrypted it is hiding, still as shown in the right sides Fig. 2, corresponding entry 2 and entry 5
Between there is separator to prompt have hiding entry at this, it is preferable if use enciphering hiding, can also show the encryption mark of setting
Knowledge is encrypted with the content for prompting user currently to hide, and a small lock is shown such as between entry 2 and entry 5.
When user needs that above-mentioned entry 3 and entry 4 is unfolded, hand is used on the separator between entry 2 and entry 5
Refer to it is anti-mediate as shown in the right sides Fig. 3, in the process, it may be necessary to click or the entry of long-press separator both sides, for example, click or
Then long-press executes anti-kneading operation close to the entry 2 and entry 5 of separator, certainly, execute the anti-kneading operation and be not limited to
The kneading position of finger, as long as the entry of cut-off rule both sides can be carried out instead mediating the operation that triggering restores hiding, for example,
Click or long-press entry 1 and entry 6, which can also be used as, carries out the anti-operation mediated triggering and entry 3 and entry 4 is unfolded.Further
If using enciphering hiding, while there is input clear crytpographic key frame and being hidden entry 3 and item after inputting proper password in ground
Mesh 4 realizes Automatic-expanding.Anti- kneading operation therein is to restore display operation.
In above-mentioned Stealth Modus, if the entry being hidden is deleted, for example, entry 4 is deleted, then it can in the application
With there are two types of processing modes:
1, the content of entry 4 is deleted, and entry 4 shows blank information;
2, it is moved up close to the entry 5 of entry 4.
In addition, for the entry of hiding information, exists if it is with dialogic operation, sent when being received again by same addresser
New information when, on the basis of hiding display receive the prompt of new information.Such as every short message is with right in message list
Existing for words form, if after the short message of certain contact person is hidden, when receiving the new message that the contact person sends, in the contact
Display receives the prompt of new message in the hidden identification of people's short message, to ensure that user will not leak the short message seen and newly received.
Although above-described embodiment one mainly describes the hiding processing mode mediated by long-press and realize list of entries,
The various processing modes such as various hiding modes of operation, recovery Stealth Modus, deletion entry described in the embodiment one, it is suitable
For under various other interfaces to the processing mode of object.
Embodiment two:It is rotated by gesture and realizes that list content is encrypted as ciphertext;
Entry or word content in selective listing rotate clockwise operation, to selected item by what is carried out on the touchscreen
Mesh or word realize encryption, and selected entry or content become ciphertext after encryption, and it is mess code or other plaintexts to show user.
That is in the present embodiment, the selection of protection entry or word content can be realized in the way of the long-press in embodiment one, then
Utilize the hiding instruction for rotating clockwise operation realization protection entry or word content.Other specific modes for carrying out encryption and decryption and
The mode for hiding, restoring display is identical as embodiment one.
A simply example is given below.As shown in figure 4, when user wishes to encrypt entry 2, entry 3 and entry 4, make
The selection entry 2 that uses gesture and entry 4 rotate clockwise, while Crypted password frame occur, by inputting Crypted password(As without adding
Close or password is default universal code, then is not required to this step)Afterwards, that is, it realizes as shown in the right sides Fig. 4, corresponding selected entry 2 arrives item
Entry realization between mesh 4 is encrypted as ciphertext or is shown as blank, it is preferable that can be with the essential information of reservation entry, for example, hair
Part people's information.
The rotation gesture can also directly apply to the entry Stealth Modus in previous embodiment one.When user needs to upper
It states when being encrypted as the entry of ciphertext and checking, rotation is as shown in the right sides Fig. 5 counterclockwise using gesture selection entry 2 and entry 4 by user, together
When there is input password box, after input is correct, i.e., ciphertext reverts to content before encryption.That is, what is carried out on the screen is inverse
Hour hands rotation process is to restore display operation.
All it is directly to be used as user by the content that operation is chosen to need to protect in above-described embodiment one and embodiment two
The content of shield.In fact, list content can also be grouped before user chooses, when user chooses the content in list
Afterwards, all entries being grouped where content or word content will be chosen all as entry to be protected or word content is needed, carried out
Covert marks.Illustrate the specific implementation of this mode below by embodiment three, four and five.
Embodiment three:The method for supporting scattered block encryption hiding
In the present embodiment, multiple entries or word content are selected first, the scattered entry or word content that will be selected
It is grouped as one.It can be realized by multiple selection operation when being specifically grouped operation, specific selection operation can be
Suspension procedure.For example, can be used as first entry of grouping using the selection any entry that suspends, then select thereon or under it
A certain entry be used as last entry automatically, two above entry automatically forms one group, this grouping is generally in choosing shape
State is shown as dynamic effect.Alternatively, form one group using suspension select items many times or word content, specifically, when being suspended in
When the entry or content, the entry or content are in selected state, are shown as dynamic effect, and by suspending, repeatedly selection is more
After a entry or content, i.e., the entry or content chosen at this time are combined into one group,
After completing to be grouped, in detecting user to grouping after the cancellation operation of any entry or word content, by phase
Entry or word content is answered to be deleted from grouping.For example, in above-mentioned scene, user delimit one point by suspension procedure
Group, and the grouping is made to be in selected state, user need to only click wherein some entry, you can with by the entry from grouping
It removes, this mode wishes to select many entries, but intermediate certain entries and unwanted situation for user.
After the completion of grouping, it is only necessary to be hidden operation to any entry in grouping or word content, system will incite somebody to action
All entries or word content being grouped where the entry or word content are hidden label, are subsequently carrying out list display
When, hide the entry or word content of respective packets.For example, choosing grouping in above-mentioned scene, make entirely to be grouped in choosing
Middle state has then by sliding this group of entry realization enciphering hiding or being encrypted as ciphertext at selected entry or content
Cut-off rule prompts, and is realized restore by the action of dragging again when needed.
In the selection of included entry or word content in being grouped, can also by once select multiple entries or
Word content is realized.For example, alternatively being operated using slide, multiple discontinuous entries at same interface can be made
It uses multiple finger simultaneous selections as one group and Slideslip realization to the right is concealed encrypted;In addition to the entry at same interface, by turning over
Dynamic list, can the entry at the other interfaces of simultaneous selection carry out half and slide, i.e. selected holding is in dynamic, after completing to select
It is automatically composed one group, then carries out the full sliding realization encryption of batch on the basis of half sliding to the group, realizes and restores to be same as above.
Two simply examples are given below, Fig. 6 is to be selected to realize the example of grouping by suspension procedure.Such as
Shown in Fig. 6, entry 2 is selected by suspension finger, then continues to suspension finger selection entry 4, i.e., between entry 2 and entry 4
All entries automatically form one group and in selected states, as shown in the right sides Fig. 6, when needing to delete a certain entry of the group such as entry
When 3, user need to only be selected to click the entry with finger to be to realize that the entries cancellation is selected state, remaining entry chosen(Item
Mesh 2 and entry 4)It can be encrypted by aforesaid operations as one group and hide or be encrypted as ciphertext.
Fig. 7 is to be selected to realize the example of grouping by slide.As shown in fig. 7, by multiple point touching, use
One, family finger selection entry 2 is done to be slided by a small margin, another finger simultaneous selection entry 4 is slided by a small margin, that is, is realized
Entry 2 and entry 4 automatically form one group and in selected states;It is to this group of entry by sliding any entry in the group
Operation sliding mode by a small margin before is increased into sliding amplitude and is realized to the enciphering hiding of this group of entry as shown in the right sides Fig. 7
Or it is encrypted as ciphertext.
Example IV:The grouping of index list is realized by kneading
For the more situation of entry in list, entry in list is carried out by quickly mediating selected entry in list
Grouping, selected number can be used as the radix of grouping, can be grouped by default rule, such as according to phonetic grouping or temporally
Sequential packet;Each group as a new entry(That is directory entry)Display in lists, can show in new entry and be wrapped
Information containing entry, new entry can show in the way of original list, can also be by the side of similar launcher desktop split screens
Formula is shown, is conducive to accurate positionin of the user to entry in this way.
A simply example is given below, is automatically grouping with 4 as utilized finger to mediate entry 1 and entry 4 in Fig. 8
Radix, i.e., every group includes 4 entries, is realized after kneading as shown list grouping or split screen grouping in the right sides Fig. 7.
Before the grouping for carrying out entry or word content, it is preferable that can also by the entry carry out sequence adjustment in list,
Selection to conveniently be grouped.Specifically, the specified entry in the list can be moved to according to the instruction of user
Specified entry in the list is moved to the finger at other interfaces by the designated position of current interface alternatively, by rolling screen
Positioning is set.The concrete mode of Entry order adjustment is introduced below by embodiment five and embodiment six.
Embodiment five:The sequence adjustment of list of entries is realized by suspension or multiple point touching
It is suspended in a certain entry in list using finger, i.e. the entry is in by finger adsorbed state;Immediately upwards or
Finger is moved down, realizes that the position of the entry in lists moves up and down, in the position that finger unclamps, which is moved
At to this, the sequence adjustment of entry in list is realized.
Realize distance dragging farther out using multiple point touching sliding type, as user wish to move a certain entry to distance compared with
Remote position, it is smaller to be confined to screen size, and a certain entry may be selected in one finger of user, and motionless, another rubber sleeve is chosen in holding
Dynamic screen makes list stir up and down, and when sliding into corresponding position, the entry chosen release is positioned over this position by the finger chosen.
A simply example is given below, as shown in figure 9, by entry 3 in finger suspension list, i.e. entry 3 is in
Selected state, it is to be adsorbed on finger to show form, by moving up and down finger, realizes that the sequence of list of entries changes.
When controlling screen scroll to realize that list or more is stirred, for the speed that list is stirred, touched by finger
The length of time controls.For example, touching, the time is longer, and the speed that list is stirred is bigger, and the time is shorter, and it is smaller to stir speed.
When finger touches in list, touching the time can be with instant playback on the screen, and such as setting touches list 1 second,
5 entries of automatic sliding touch list 2 seconds, slide 15 entries automatically, and so on, touch list time is longer, automatic sliding
The number of dynamic entry is more, i.e., speed is faster;And time dynamic shows that user selects the time more accurate, reaches on the screen
The purpose that User Control List stirs speed is arrived.
Above-mentioned is the specific implementation of list content guard method in the application.In the method, it removes to list content
It hides with outside encipherment protection, the above index list grouping, the adjustment of list of entries sequence, control list stir speed except itself is operated
List it is convenient outer, while to realizing that list content protection encryption provides more better choices, especially for scattered grouping
Fast and accurately selection and block encryption can be achieved in conjunction with above in encryption.
Relevant processing mode is hidden described in the above-mentioned each embodiment of the application, although being directed to different boundaries respectively
Object factory under face, but in practical application, hide relevant processing mode described in each embodiment, can also fit
For the object under other interfaces.
Present invention also provides a kind of device of protection interface content, which may be embodied in terminal device, server
Etc. in various types of equipment, it can be used in the list content guard method for implementing above-mentioned the application.Figure 10 is to be protected in the application
Protect the basic structure schematic diagram of interface content device.As shown in Figure 10, which includes:Selection unit, hide processing unit and
Display unit.
Wherein, selection unit, the object chosen for determining user in the interface including multiple objects.It is single to hide processing
The object tag of selection is hidden for detecting hiding operation of the user to selection object, and after detecting hiding operation by member
It hides.Display unit, for hiding the object for being hidden label in display interface.
Further, to restore the display of hidden object, processing unit is hidden, can be also used for detection user to selection pair
The recovery operation of elephant, and display unit is notified to show corresponding object.Display unit can be also used for receiving hiding processing list
After the notice of member, restores display and be marked as hiding object.
Furthermore it is preferred that device can further include encryption unit, for the object to hiding processing unit label
It is encrypted, is additionally operable to after the password authentification notice for receiving hiding processing unit, judges password input by user whether just
Really, and it will determine that result feeds back to hiding processing unit.Processing unit is hidden, for after receiving recovery operation, notice to add
Close unit carries out password authentification, and after the correct result of encryption unit feedback cipher, and notice display unit restores display and chooses
Object.Wherein, encryption unit can be added when being encrypted using the password or preset password that user inputs in real time
It is close.
Display unit in device can not show selected object in hidden object, alternatively, can also be selected
Object position on show blank information, alternatively, default or random production can also be shown on the position of selected object
Raw mess code.Wherein, when device includes encryption unit, display unit removes can carry out hiding for object in fashion described above
Outside, ciphertext can also be shown on the position of the object of selection.
Preferably, when determining the object that user chooses, concrete mode can be selection unit:Detect two fingers of user
Long press operation, the entry or word that all entries using two positions of long-press and therebetween or word content are chosen as user
Content, alternatively, using all entries or the entry chosen as user of word content or word content between two positions of long-press.
Hiding operation to choosing object can be kneading operation or rotation process etc..
Preferably, to realize the unified selection of multiple objects and hiding processing, it is single that device can further include grouping
Member, for the object in interface to be grouped.Selection unit is further used for after user selects an object, this is right
As all objects in the object group of place are as the object chosen.Wherein, when grouped element is grouped, user can be passed through
Setting operates the multiple objects selected simultaneously or several times as one group, and the operation of setting can be suspension procedure, sliding behaviour
The slide that work or multiple fingers are carried out at the same time.It, can be in detecting user to grouping after the cancellation operation of any object
Any object is deleted from grouping.
Alternatively, all objects in interface can also be grouped by grouped element according to the rule of setting, and it is each grouping
One directory entry is set;Each grouping includes N number of object, and N is user or the number of objects that system is arranged.Display unit can be shown
Show the directory entry of each grouping, alternatively, screen to be shown with split screen mode to the entry in each grouping.Wherein it is possible to will use
The entry sum that family selects in lists is as entry number N.
In addition, for convenience of the division operation carried out to list, mobile unit is can further include in device, is used for root
According to the instruction of user, the specified entry in list is moved to the designated position of current interface, alternatively, by rolling screen, it will
Specified entry in list is moved to the designated position at other interfaces.Wherein, when detecting that user's finger is suspended in an entry
When, it chooses the entry to be moved with finger, which is moved on the position of finger release.When rolling screen, it is preferable that mobile
Unit can be according to the speed for touching time determination and rolling screen to screen detected.
Further, display unit, can be by hiding entry or text when restoring perhaps word content in displayed entries
Word content is directly displayed in current interface, alternatively, can also show hiding entry contents or word content with roll mode
Show in list, and after receiving scheduled recovery and hiding instruction, entry or word content that will be hiding return to hidden state.
By the specific implementation of above-mentioned the application as it can be seen that by the processing of the application, can utilize sliding to list and point
The method of group realizes the protection to list content by kneading, gesture rotation, suspension, the sliding etc. to list content.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
With within principle, any modification, equivalent substitution, improvement and etc. done should be included within the scope of protection of the invention god.
Claims (24)
1. a kind of method of protection interface content, which is characterized in that including:
The object that user chooses is determined in the interface including multiple objects;
It is hiding by the object tag of selection, and described in display after detecting user to the hiding operation of selected object
It is hidden when interface and is marked as hiding object;
When detecting recovery operation of the user to being hidden object, restore pair being hidden described in display on the interface
As;The wherein described recovery operation is the operation carried out on the hiding generation position in the interface, the hiding behaviour
Make and the recovery operation is preset.
2. according to the method described in claim 1, it is characterized in that, after detecting for the hiding operation of selected object,
This method further comprises:The contents of object of the selection is encrypted;
Detect user to it is described be hidden the recovery operation of object after, restore the object being hidden described in display before, the party
Method further comprises:Judge whether password input by user is correct, and after judging that password is correct, executes the recovery display
Operation.
3. method according to claim 1 or 2, which is characterized in that described hide is marked as hiding object and includes:No
Hiding object is marked as described in display, alternatively, be marked as showing blank information on the position of hiding object described,
Alternatively, being marked as showing mess code that is default or randomly generating on the position of hiding object described.
4. according to the method described in claim 2, it is characterized in that, described hide is marked as hiding object and includes:Institute
It states and is marked as showing ciphertext on the position of hiding object.
5. according to the method described in claim 2, it is characterized in that, the password or preset password that are inputted in real time using user into
The row encryption.
6. according to the method described in claim 3, it is characterized in that, when by do not show it is described be marked as hiding object into
When row is hidden, it is marked as showing hidden identification on the position of hiding object described, it is hiding for prompting present bit to be equipped with
Object.
7. according to the method described in claim 1, it is characterized in that, described determine user's choosing in the interface including multiple objects
The object taken includes:The long press operation of two fingers of user is detected, object using two positions of long-press and therebetween is as user
The object of selection, alternatively, the object that the object between two positions of long-press is chosen as user;
The hiding operation to selected object includes kneading operation or rotation process.
8. according to the method described in claim 1, it is characterized in that, the object in the interface is grouped in advance;
It is described to determine that the object that user chooses includes in the interface including multiple objects:It is selected when determining user in the interface
After selecting an object, using the object in object group where the object as the object of the selection.
9. according to the method described in claim 8, it is characterized in that, when detecting cancellation behaviour of the user to any object in grouping
After work, any object is deleted from grouping.
10. according to the method described in claim 8, it is characterized in that, the object by the interface be grouped including:
Multiple objects that user is selected simultaneously or several times by the second operation are as one group.
11. according to the method described in claim 8, it is characterized in that, the object by the interface be grouped including:
The object in interface is grouped according to the rule of setting, each grouping includes N number of object;For each grouping, one index pair is set
As;The N is user or the natural number that system is arranged;
In display interface, the index object being each grouped is shown, alternatively, screen is shown with split screen mode in each grouping
Object.
12. according to the method described in claim 10, it is characterized in that, second operation includes suspension procedure, slide
Or the slide that multiple fingers are carried out at the same time.
13. according to the method described in claim 8, it is characterized in that, before the object in the interface is grouped, the party
Method further comprises:According to the instruction of user, the specified object in the interface is moved to the designated position of current interface, or
Specified object in the interface is moved to the designated position at other interfaces by person.
14. according to the method for claim 13, which is characterized in that when detecting that user's finger is suspended in above an object
When, choose the object to be moved with finger, by the object be moved to finger frame out detection range position on.
15. according to the method for claim 13, which is characterized in that realize that object is moved to other interfaces by rolling screen
Operation.
16. according to the method for claim 15, which is characterized in that when the rolling screen, according to the user hand detected
Refer to the speed that the time determination being located in screen detection range rolls screen.
17. according to the method described in claim 1,2 or 8, which is characterized in that described to restore to show the quilt on the interface
Hidden object includes:Hiding contents of object is directly displayed on the interface, alternatively, by the content of hiding object to roll
Flowing mode is shown on the interface.
18. according to the method for claim 17, which is characterized in that after restoring to be hidden object described in display, this method
Further comprise:After receiving scheduled recovery and hiding instruction, the object for restoring to show is enabled to return to hidden state.
19. according to the method described in claim 1,2 or 8, which is characterized in that the hiding operation packet to selected object
Include slide.
20. according to the method described in claim 1,2 or 8, which is characterized in that when being hidden object in the interface in hiding shape
When being deleted under state, blank is shown in described be hidden on the position of object, alternatively, by the subsequent object for being hidden object
Position shifts to an earlier date successively.
21. according to the method described in claim 1,2 or 8, which is characterized in that the interface including multiple objects includes list
Or file;
The object is entry or word content in list, alternatively, the object is the file in file.
22. a kind of device of protection interface content, which is characterized in that including:Selection unit hides processing unit and display list
Member;
The selection unit, the object chosen for determining user in the interface including multiple objects;
The hiding processing unit for detecting user to choosing the hiding operation of object, and is detecting the hiding operation
Afterwards, it is hiding by the object tag of the selection;It is further used for detecting user to being hidden the recovery operation of object, and notifies
Display unit shows the object being accordingly hidden;The wherein described recovery operation is in the interface in the hiding generation position
The operation of progress is set, the hiding operation and the recovery operation are preset;
The display unit is marked as hiding object for being hidden when showing the interface;It is further used for receiving
To after the notice of the hiding processing unit, restore the object being hidden described in display.
23. device according to claim 22, which is characterized in that described device further comprises encryption unit, for pair
The hiding processing unit is encrypted labeled as hiding object, is additionally operable in the password for receiving the hiding processing unit
After verification notice, judge whether password input by user is correct, and will determine that result feeds back to the hiding processing unit;
The hiding processing unit, for after receiving the recovery operation, notifying the encryption unit to carry out password authentification,
And after the correct result of encryption unit feedback cipher, the display unit is notified to restore pair being hidden described in display
As.
24. the device according to claim 22 or 23, which is characterized in that the device further comprises grouped element, is used for
Object in the interface is grouped;
The selection unit is further used for after user selects an object, and the object in object group where the object is made
For the object of the selection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310439032.7A CN104463004B (en) | 2013-09-24 | 2013-09-24 | A kind of method and apparatus of protection interface content |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310439032.7A CN104463004B (en) | 2013-09-24 | 2013-09-24 | A kind of method and apparatus of protection interface content |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104463004A CN104463004A (en) | 2015-03-25 |
CN104463004B true CN104463004B (en) | 2018-08-28 |
Family
ID=52909026
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310439032.7A Active CN104463004B (en) | 2013-09-24 | 2013-09-24 | A kind of method and apparatus of protection interface content |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104463004B (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104883436A (en) * | 2015-04-30 | 2015-09-02 | 广东欧珀移动通信有限公司 | Information hiding method and apparatus |
CN104898482A (en) * | 2015-05-04 | 2015-09-09 | 广东美的制冷设备有限公司 | Control interface displaying method and device |
CN106339636A (en) * | 2015-07-10 | 2017-01-18 | 阿里巴巴集团控股有限公司 | Hiding setting method and device, application program content processing method and device |
CN105068723B (en) * | 2015-07-27 | 2019-12-24 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN106649387B (en) * | 2015-11-02 | 2020-07-03 | 阿里巴巴集团控股有限公司 | Method and device for displaying information |
CN106445325B (en) * | 2016-08-30 | 2019-09-20 | 华为技术有限公司 | A kind of method and device creating group |
CN106650484A (en) * | 2016-08-31 | 2017-05-10 | 深圳天珑无线科技有限公司 | Picture library content processing method and apparatus, and mobile device |
CN106708375A (en) * | 2016-12-26 | 2017-05-24 | 惠州Tcl移动通信有限公司 | Interface filtering method and system |
CN107295186A (en) * | 2017-07-03 | 2017-10-24 | 广东欧珀移动通信有限公司 | Method for hidden controlling, device and the storage medium and mobile terminal of application message |
CN109521914A (en) * | 2017-09-19 | 2019-03-26 | 阿里巴巴集团控股有限公司 | Restore the methods, devices and systems of data in file |
CN109460672A (en) * | 2018-10-18 | 2019-03-12 | 北京邮电大学 | A kind of order encryption method of online shopping mall |
CN109947328B (en) * | 2019-03-21 | 2020-12-08 | 珠海格力电器股份有限公司 | Multi-parameter display method and device and air conditioning unit monitoring equipment |
CN110069304A (en) * | 2019-03-26 | 2019-07-30 | 维沃移动通信有限公司 | A kind of notification message display methods and terminal device |
CN110377219B (en) * | 2019-07-10 | 2021-04-20 | 维沃移动通信有限公司 | Interface interaction method and terminal |
CN111368329B (en) * | 2020-03-02 | 2023-06-23 | 北京达佳互联信息技术有限公司 | Message display method and device, electronic equipment and storage medium |
CN111399712A (en) * | 2020-03-11 | 2020-07-10 | 上海索辰信息科技有限公司 | System and method for processing sequence diagram packet |
CN111786876B (en) * | 2020-06-29 | 2022-11-04 | 北京字节跳动网络技术有限公司 | Information processing method, device, electronic equipment and computer readable medium |
CN112417483A (en) * | 2020-11-26 | 2021-02-26 | 珠海格力电器股份有限公司 | Data encryption method and device, electronic equipment and storage medium |
CN112948422A (en) * | 2021-03-11 | 2021-06-11 | 北京小米移动软件有限公司 | Contact person searching method and device and electronic equipment |
CN113050850A (en) * | 2021-03-29 | 2021-06-29 | 联想(北京)有限公司 | Output control method and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101248438A (en) * | 2005-06-24 | 2008-08-20 | 创新科技有限公司 | A method and apparatus for protecting private information on a user apparatus |
TW201019682A (en) * | 2008-11-12 | 2010-05-16 | Condel Internat Technologies Inc | Method and system for enhancing data encryption using multiple-key lists |
CN101754467A (en) * | 2008-12-22 | 2010-06-23 | 康佳集团股份有限公司 | Realizing method of privacy protection for dual-card cell phone |
CN101833625A (en) * | 2010-05-11 | 2010-09-15 | 上海众烁信息科技有限公司 | File and folder safety protection method based on dynamic password and system thereof |
CN102156614A (en) * | 2010-01-06 | 2011-08-17 | 苹果公司 | Device, method, and graphical user interface for manipulating tables using multi-contact gestures |
CN102880837A (en) * | 2012-08-24 | 2013-01-16 | 腾讯科技(深圳)有限公司 | Method for improving security of mobile terminal and mobile terminal |
-
2013
- 2013-09-24 CN CN201310439032.7A patent/CN104463004B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101248438A (en) * | 2005-06-24 | 2008-08-20 | 创新科技有限公司 | A method and apparatus for protecting private information on a user apparatus |
TW201019682A (en) * | 2008-11-12 | 2010-05-16 | Condel Internat Technologies Inc | Method and system for enhancing data encryption using multiple-key lists |
CN101754467A (en) * | 2008-12-22 | 2010-06-23 | 康佳集团股份有限公司 | Realizing method of privacy protection for dual-card cell phone |
CN102156614A (en) * | 2010-01-06 | 2011-08-17 | 苹果公司 | Device, method, and graphical user interface for manipulating tables using multi-contact gestures |
CN101833625A (en) * | 2010-05-11 | 2010-09-15 | 上海众烁信息科技有限公司 | File and folder safety protection method based on dynamic password and system thereof |
CN102880837A (en) * | 2012-08-24 | 2013-01-16 | 腾讯科技(深圳)有限公司 | Method for improving security of mobile terminal and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104463004A (en) | 2015-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104463004B (en) | A kind of method and apparatus of protection interface content | |
CN103324898B (en) | Method for encrypting/decrypting display content in touch screen, and communication terminal | |
EP2390812B1 (en) | Method and apparatus for controlling objects of a user interface | |
JP6590583B2 (en) | Security device and terminal device including the same | |
CN104834449B (en) | The icon management method and device of mobile terminal | |
US9003551B2 (en) | System and method for obscuring displayed information | |
CN104270517B (en) | Information ciphering method and mobile terminal | |
WO2012000092A1 (en) | Seamless end-to-end data obfuscation and encryption | |
CN104768148B (en) | A kind of message encryption method and device | |
CN106203061B (en) | Encryption method of application program and mobile terminal | |
CN104732121A (en) | Encryption setting method, decryption setting method and corresponding device of application program | |
KR20130087010A (en) | Method and device for secured entry of personal data | |
CN103092484A (en) | Method and device and terminal for unlocking screen | |
CN104408357A (en) | Fingerprint encryption device and method, fingerprint decryption device and method | |
CN104270353B (en) | information security transmission method and system, receiving terminal and sending terminal | |
CN103930899A (en) | A method for managing public and private data input at a device | |
CN110140336A (en) | Consecutive password technology | |
CN103455761A (en) | File encryption and decryption method and device and electronic device | |
CN104516645A (en) | Electronic device unlocking method | |
CN105243331A (en) | Encryption device and encryption method, and decryption device and decryption method | |
CN107832603A (en) | The startup method and mobile terminal of a kind of application program | |
CN106648583A (en) | Information processing method and terminal | |
EP3203407A1 (en) | Information processing method and information processing device | |
CN105893854A (en) | Encryption and decryption method and device | |
CN108491703A (en) | A kind of double verification unlocking method and system based on comprehensive screen equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |