CN106295389A - Screen content encryption method and the electronic installation of use the method - Google Patents
Screen content encryption method and the electronic installation of use the method Download PDFInfo
- Publication number
- CN106295389A CN106295389A CN201510304156.3A CN201510304156A CN106295389A CN 106295389 A CN106295389 A CN 106295389A CN 201510304156 A CN201510304156 A CN 201510304156A CN 106295389 A CN106295389 A CN 106295389A
- Authority
- CN
- China
- Prior art keywords
- content
- user
- button
- picture
- encrypt
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
A kind of screen content encryption method and the electronic installation of use the method.The method is applicable to the electronic installation with screen.The method is prior to showing a content on screen, then the operation of detection user triggers signal to produce, and is shown in the content-encrypt in this picture according to triggering signal afterwards.
Description
Technical field
The application relates to a kind of encryption method and device, and particularly to a kind of screen content encryption method and
Use the electronic installation of the method.
Background technology
For coordinate modern's busy life rhythm, various do not take up space and mobile device easy to carry also
Weed out the old and bring forth the new.With smart mobile phone (Smart phone), personal digital assistant (Personal Digital
Assistant, PDA) mobile phone, tablet PC (Tablet PC), as a example by mobile computer, it is not
Only possess the various functions of conventional apparatus, user more can be allowed to pass through its built-in operating system or application
Program reaches to write file, sends and receive e-mail, browse webpage or do the purposes such as instant messaging.
User is when using mobile phone to browse important information or archives, it may be necessary to screen content
(on-screen contents) achieves and encrypts.Archives for some specific formats (such as, shine
Sheet), mobile phone may have corresponding application program, it is possible to provide user performs encryption by menu operation.
But, for many unspecific screen contents (such as, webpage), then may need to change into specific shelves
Case form, the action being just encrypted.
On the other hand, when user uses camera or has the mobile device of camera function and shoots some privacies
When photo or classified papers, in order to avoid content of shooting is never actually viewed by others, replicates and even steal, generally
Some encryption functions can be performed before shooting or after shooting.But, these encryption functions typically require use
Person needs complicated operation with manually opened or after the picture is taken for certain content special setting before shooting.
Summary of the invention
Current cryptographic operation needs complicated operation for the user, and need to preset or
Open, often result in the inconvenience of user and be negligent of significant data is encrypted.Because being this, this
Application provides a kind of screen content encryption method, and it provides a kind of easy mode of operation, and can distinguish not
Screen content is encrypted by same cipher mode.
The application provides a kind of screen content encryption method, it is adaptable to have the electronic installation of screen.This side
Method is prior to showing a picture on screen, then the operation of detection user triggers signal, afterwards basis to produce
Trigger signal and be shown in the content-encrypt in this picture.
In an embodiment of the application, the above-mentioned content being shown in this picture according to triggering signal adds
Close step is the content whether including meeting preset format in first identification picture.Wherein, if including meeting
The content of preset format, will meet the content-encrypt of preset format;If not including meeting the interior of preset format
Hold, then the sectional drawing of picture is encrypted.
In an embodiment of the application, above-mentioned detection user operation with produce trigger signal and according to
The step triggering the content-encrypt that signal is shown in this picture is first with being configured on electronic installation
The operation of the first button detection user, to produce the first triggering signal, utilizes the first button to extract simultaneously and makes
The biological characteristic of user, wherein the first button includes biometric sensor.It follows that according to biological special
Levy this content-encrypt.
In an embodiment of the application, above-mentioned detection user operation with produce trigger signal and according to
Triggering the step of content-encrypt that signal is shown in this picture is to utilize the be configured on electronic installation
The operation of one button detection user, to produce the first triggering signal, is shown in this most in the first way
Content-encrypt in picture, and utilize the behaviour of the second button detection user being configured on electronic installation
Make, to produce the second triggering signal, to be shown in the content-encrypt in this picture or not the most in a second manner
Encrypted content.
In an embodiment of the application, above-mentioned first button includes biometric sensor, and utilizes and join
Be placed on electronic installation first button detection user operation with produce first triggering signal, according to this with
First method is shown in the step of the content-encrypt in this picture for extracting user first with the first button
Biological characteristic, further according to the biological feature encryption content extracted.
In an embodiment of the application, above-mentioned electronic installation is exposal model, and wherein detects user
Operate and trigger signal to produce, and be shown in the step of the content-encrypt in this picture according to triggering signal
Rapid for utilizing the operation of the first tripper detection user being configured on screen of electronic device to produce the
One triggers signal, shoots the first photo according to this and encrypts the first photo, and utilization is configured at electronic installation
The operation of the second tripper detection user on screen, to produce the second triggering signal, shoots the according to this
Two photos but do not encrypt the second photo.
In an embodiment of the application, the operation of above-mentioned detection user triggers signal, Yi Jigen to produce
According to triggering signal, the step being shown in the content-encrypt in this picture is that utilization is configured on electronic installation
First button detection user operation with produce first triggering signal, be shown according to this in this picture
Content-encrypt, and utilize be configured on electronic installation second button detection user operation with produce
Raw second triggering signal, extracts the sectional drawing of picture according to this and encrypts sectional drawing.
The application provides a kind of electronic installation, and it includes screen, at least one button and processor.
Screen is for display one picture.Button detection user operation triggers signal to produce.Processor connects screen
Curtain and button, be shown in the content-encrypt in this picture according to the signal that triggers that button is detected.
In an embodiment of the application, whether above-mentioned processor can include meeting default lattice in identification picture
The content of formula.Wherein, if including, the content-encrypt meeting preset format meets content described in preset format;
If not including the sectional drawing meeting the content-encrypt picture of preset format.
In an embodiment of the application, above-mentioned preset format includes Email, note, word, literary composition
Part, photo, image, audio or video.
In an embodiment of the application, above-mentioned button includes biometric sensor, in order to extract use
The biological characteristic of person utilizes biological feature encryption content with offer processor.
In an embodiment of the application, above-mentioned button includes the first button and the second button.First button
The operation of detection user is to produce the first triggering signal.The operation of the second button detection user is to produce
Second triggers signal.
In an embodiment of the application, above-mentioned processor includes triggering signal in the first way according to first
It is shown in the content-encrypt in this picture and is shown in this in a second manner according to the second triggering signal
Content-encrypt in picture or non-encrypted content.
In an embodiment of the application, above-mentioned first button includes biometric sensor, and processor
The biological characteristic of user is extracted to utilize biological feature encryption content including utilizing the first button.
In an embodiment of the application, above-mentioned electronic installation is exposal model, and button includes that first is fast
Door button and the second tripper.The operation of the first tripper detection user is to produce the first triggering letter
Number, and shot the first photo by processor according to this and encrypt the first photo.Second tripper detection uses
The operation of person is to produce the second triggering signal, and is shot the second photo by processor according to this and do not encrypt second
Photo.
In an embodiment of the application, above-mentioned processor includes that triggering signal according to first is shown in this
Content-encrypt in picture and according to the second sectional drawing triggering signal extraction picture and encrypt sectional drawing.
The application provides a kind of computer readable recording medium storing program for performing, in order to logging program, carries via electronic installation
Enter and perform step.First, display picture is in the screen of electronic installation.It follows that detection user behaviour
Make to trigger signal to produce.Afterwards, it is shown in the content-encrypt in this picture according to triggering signal.
Based on above-mentioned, the screen content encryption method that the embodiment of the present application proposes can pressing by electronic installation
Key arranges the encryption of identification user and sets, or directly arranging multiple button carrys out corresponding different encryption
Mode.Consequently, it is possible to when user screen content to be encrypted, do not need complicated operating and setting, and can
With more intuition and intelligently desired data is encrypted.
For the features described above of the application and advantage can be become apparent, special embodiment below, and coordinate
Accompanying drawing is described in detail below.
Accompanying drawing explanation
Fig. 1 is the block chart according to the electronic installation depicted in the application one embodiment.
Fig. 2 is the flow chart according to the screen content encryption method depicted in the application one embodiment.
Fig. 3 A~3C is based on the schematic diagram of the encryption screen content that embodiments herein illustrates.
Fig. 4 is the flow chart according to the screen content encryption method depicted in the application one embodiment.
Fig. 5 is according to the screen content encryption method under exposal model depicted in the application one embodiment
Flow chart.
Fig. 6 is the flow chart according to the screen content encryption method depicted in the application one embodiment.
[symbol description]
100: electronic installation
110: screen
120,120a~120c: button
130: processor
32,34,36: picture
342: film
362: webpage
364: word
S210~S230, S410~S420, S510~S520, S610~S620: step
Detailed description of the invention
Complicated encipheror is reduced to the single or operation of a fewer keys by the application, and combines biological special
The detection levied, it is possible to provide different cipher modes selects to user, and user can intuitively be extracted
And encrypt watched screen content (on-screen contents).Thereby, complicated behaviour can not only be saved
Make, be more provided that user depends on its demand and selects different modes to be encrypted easily, increase data
Safety.
Fig. 1 is the block chart according to the electronic installation depicted in the application one embodiment.Refer to Fig. 1,
The electronic installation 100 e.g. smart mobile phone (Smart phone) of the present embodiment or personal digital assistant
(Personal Digital Assistant, PDA) mobile phone, tablet PC (Tablet PC), notes type
Computer, digital camera, digital camera, digital audio tape or other any electronic installations, wherein wrap
Including screen 110, at least one button 120 and processor 130, its function is described below.
Screen 110 can be general display, e.g. liquid crystal display (Liquid-Crystal
Display, LCD), plasma display, vacuum fluorescent display, light emitting diode (Light-Emitting
Diode, LED) display, field-emitter display (Field Emission Display, FED) and/
Or the display of other suitable species.Screen 110 can also be touch control screen, e.g. by resistance-type,
Condenser type or other kinds of touch sensing element are integrated with liquid crystal display and are formed.In the middle of the disclosure,
Either the screen of which kind of form all can be used for the screen content of display electronics assemblies 100.
Button 120a, 120b, 120c can be disposed on the physical button on electronic installation 100 or display
Virtual key on the screen 110 of electronic installation 100.In the middle of the disclosure, button 120a, 120b,
120c is used for detecting user operation and triggers signal to produce.
Processor 130 e.g. CPU (Central Processing Unit, CPU), or
The microprocessor (Microprocessor) of other programmable general services or specific use, digital signal
Processor (Digital Signal Processor, DSP), Programmable Logic Controller, ASIC
(Application Specific Integrated Circuits, ASIC), programmable logic device
(Programmable Logic Device, PLD) or other similar devices or the combination of these devices.Place
Reason unit 130 couples screen 110 and button 120, and triggers signal according to button 120 is produced
Perform the encryption function of screen content.Hereinafter i.e. screen content is performed for embodiment explanation electronic installation 100
The detailed step of encryption method.
Fig. 2 is the flow chart according to the screen content encryption method depicted in the application one embodiment.Please join
According to Fig. 2, the method for the present embodiment is applicable to the electronic installation 100 of Fig. 1, electronic installation of the most i.e. arranging in pairs or groups
The detailed step of the screen content encryption method of the every component description the application in 100.
First, in step S210, electronic installation 100 shows any picture by screen 110.Then,
In step S220, button 120 detect user and operate to produce triggering signal.In step S230
In, processor 130 is shown in the content-encrypt in this picture according to triggering signal.Wherein, button 120
Can be one or more.In one embodiment, user is touched different buttons 120 and can be produced different touching
Signaling, processor 130 then can be according to being received the kind triggering signal, it is judged that the be intended to reality of user
The cipher mode executed or the screen content to be encrypted (part or all of content), thus screen content is entered
Row encryption.
In detail, in an embodiment of the application, when the screen shown by user screen to be encrypted 110
During curtain content, can press or touch key-press 120 or one of them button 120 trigger signal to produce.?
In one embodiment, user pushes button 120 can use fixing cipher mode and flow process.At another
In embodiment, whether processor 130 can include in the content shown by identification screen according to triggering signal
Meet the archives of preset format.Described preset format can be Email, note, word, file,
Photo, image, audio or video etc., the present embodiment is not limited to this, and carries out different cipher modes
And flow process.And in another embodiment, processor 130 can be according to triggering signal, identification institute at present is
Function, software or the program performed, such as browser, file routine, picture browsing program, film are clear
Looking at program, camera etc., the present embodiment is not limited to this, and carries out different cipher modes and flow process.
Above-mentioned identification result can be used to the File Format after determining encryption, or determines how to be encrypted
Process.If screen content meets preset format, then can be encrypted only for this content and be saved as specific
Archives;If not meeting preset format, then can transfer extract whole screen content and be classified as picture
File Format, and screen content is encrypted and is saved as picture.
For example, Fig. 3 A~3C is based on the signal of the encryption screen content that embodiments herein illustrates
Figure.Refer to Fig. 3 A, when screen 110 shows the picture 32 of Fig. 3 A, processor 130 can be drawn in identification
The content in face 32, and judge that it is word, therefore picture 32 encrypted and store into character file;Or
Person, processor 130 identification its be a browsing file software, and to current picture 32 open file carry out
Encryption.Refer to Fig. 3 B, when screen 110 shows the picture 34 of Fig. 3 B, processor 130 can identification
The content of picture 34, and judge wherein to contain film 342, therefore film 342 encrypted and store into shadow
Sheet archives;Or, processor 130 identification its be that a film browses software, and current picture 32 is opened
Film archive or film link be encrypted.Refer to Fig. 3 C, when screen 110 shows Fig. 3 C's
During picture 36, owing to picture 36 contains webpage 362 and word 364 simultaneously, processor 130 cannot be sentenced
The File Format belonging to content of disconnected picture 36, therefore can extract whole screen content, and encryption is saved as figure
Sheet archives;Or, processor 130 identification picture 36 is a webpage or current program is a browser,
And the webpage network address opening current picture 32 is encrypted, such as, can the network address of this webpage be existed specific
And in the data folder encrypted, such as, there is the user my favorite via encryption.
In addition, the File Format belonging to the screen content of screen 110 cannot be determined when processor 130
Time, in other embodiments, it is also possible to by the way of additionally opening menu, allow user select to be intended to
File Format (such as, Email, note, word, file, photo, image, the audio frequency of storage
Or video etc.).It will be apparent to a skilled person that above-described embodiment is merely illustrative,
The application is not limited thereto.
On the other hand, in the above-described embodiments, the mode of encryption can be by user sets itself.Citing
For, the mode of encryption can be that requirement user inputs a password, then adds according to input password
Close.And time to be deciphered, only need to input again and be previously entered password and can be decrypted.The mode of encryption also may be used
To be that the picture being intended to encryption is stored in specific data folder, wherein this specific data folder is to need input spy
Determine password or the secured fashion with other, such as specific gesture (gesture), specific pattern (pattern)
Could enter.It will be appreciated that those skilled in the art that the mode of above-mentioned encryption is merely illustrative
Bright, the application is not limited thereto.
In addition, in one embodiment, the application also can the identity of identification user, and perform according to this
Cipher mode set by this user.Wherein, the application utilizes biological characteristic to have the spy being difficult to replicate
Property, the button 120 of electronic installation 100 arranges biometric sensor (such as, fingerprint further
Sensor, but the application is not limited), to utilize the different user of biological characteristic identification, and perform
Cipher mode set by user.Button 120 can be physical button, can be maybe to have biological characteristic to distinguish
Know the virtual key shown by Touch Screen of function.It is said that in general, biological characteristic need registration in advance or
It is stored for comparison.Be ready for registration biological attribute data after, when have biometric sensor by
When key senses the biological characteristic of user, so that it may directly compare with registered biological attribute data,
To determine whether the biological attribute data being consistent.
When screen content shown by arbitrary user screen to be encrypted 110, if user pressing or touch
Touching the button 120 with biometric sensor, this button also can sense while producing triggering signal
The biological characteristic of user, and compare with biological attribute data registered in advance.If with registered in advance
Biological attribute data be consistent, then can use the encryption set by the user that this biological attribute data is corresponding
Screen content is encrypted by mode.Otherwise, if not being inconsistent with biological attribute data registered in advance, then will
In the way of default, screen content it is encrypted or is not encrypted, or not producing any action.
It should be noted that, the biological characteristic of above-described embodiment can be used to the different user of identification to select
Cipher mode.Such as, the screen content being intended to encryption is stored in the data folder corresponding with user, makes
Encrypt screen content with specific cryptosystem or specific shelves are encrypted and stored into the screen content being intended to encrypt
Case form.Above-mentioned biological characteristic also can be used directly to encryption, i.e. using biological characteristic as encrypted screen
The password of content.It will be appreciated that those skilled in the art that the application mode of above-mentioned biological characteristic is only
For exemplary illustration the application, the application is not limited thereto.
On the other hand, in another embodiment of the application, electronic installation 100 also can arrange at least two
Button distinguishes corresponding different cipher mode.For example, Fig. 4 is according to the application one embodiment institute
The flow chart of the screen content encryption method illustrated.Refer to Fig. 4, the method for the present embodiment is applicable to Fig. 1
Electronic installation 100, the most i.e. the screen of every component description the application in collocation electronic installation 100
The detailed step of content enciphering method.
In step S410, electronic installation 100 utilize first button 120a detection user operation with
Produce the first triggering signal, and be shown in the content in this picture according to this with first party by processor 130
Formula is encrypted.In the step s 420, electronic installation 100 utilizes the second button 120b detection user
Operate to produce the second triggering signal, and the content being shown in this picture according to this by processor 130 adds
Close encrypt in a second manner or do not encrypt this content.The detection of above-mentioned steps S410 and S420 and encryption
Mode is same or similar with step S220 in previous embodiment~S230 respectively, therefore does not repeats them here.
Unlike previous embodiment, the present embodiment is to arrange two buttons in electronic installation 100 to divide
Corresponding two kinds of different cipher modes, two wherein said buttons can all have encryption function or
Only have a button and there is encryption function.For example, in one embodiment, may select at a button
Biosensing apparatus is set, and by the most corresponding for another button encryption function.Therefore, touch when user
When touching or press the button with biosensing apparatus, can determine according to the biological attribute data sensed
Corresponding cipher mode.This means, according to the identity of the biological attribute data identification user sensed,
To apply mechanically the cipher mode corresponding with picked out user.On the other hand, another is touched when user
During button, screen content is encrypted by the cipher mode the most directly using this button corresponding.Real at another
Execute in example, a button correspondence encryption function can be only had, and at this button, biosensing apparatus is set to carry
Take the biological characteristic of user and determine cipher mode according to this.Another button is the most only in order to extract screen content
And be not encrypted.It will be appreciated that those skilled in the art that above-mentioned button and corresponding encryption side
Formula is merely illustrative, and the application is not limited thereto.
In the another embodiment of the application, when electronic installation 100 performs specific application program, electricity
The screen content shown when can be performed this application program by said method equally of sub-device 100 is entered
Row encryption.For example, the camera function of electronic installation 100 is started when user so that electronic installation
100 when being in exposal model, can be encrypted for the photo captured by electronic installation 100.
In detail, Fig. 5 is to add according to the screen content under exposal model depicted in the application one embodiment
The flow chart of decryption method.Refer to Fig. 5, the method for the present embodiment is applicable to the electronic installation 100 of Fig. 1,
Below screen content encryption method detailed of i.e. every component description the application in collocation electronic installation 100
Thin step.
In step S510, utilize and be configured at the first tripper on electronic installation 100 screen 110
The operation of 120a detection user is to produce the first triggering signal, and is shot first according to this by processor 130
Photo also encrypts the first photo.In step S520, utilize and be configured on electronic installation 100 screen 110
The operation of the second tripper 120b detection user to produce the second triggering signal, and by processor
130 shoot the second photo according to this does not encrypt the second photo.Above-mentioned steps S510 and the detection of S520 and
Cipher mode is same or similar with step S410 in previous embodiment and S420 respectively, therefore at this no longer
Repeat.
Unlike previous embodiment, the present embodiment is when electronic installation 100 is in exposal model, same
Sample ground arranges two buttons at electronic installation 100 and carrys out corresponding different cipher mode, and wherein the first shutter is pressed
Key 120a has the function taking pictures and encrypting screen content, and the second tripper 120b the most only has bat
According to function.First tripper 120a or the second tripper 120b can be shown in electronic installation 100
Screen 110 on virtual key or be arranged in the physical button on electronic installation 100, but the application is also
It is not limited to this.Thereby, user can be according to its encryption requirements at the first tripper 120a and the second shutter
Selecting in button 120b and press, its photo shot will be performed corresponding by electronic installation 100
Cipher mode, thus simplify the process that captured photo is encrypted by user.
Additionally, the encryption method of each embodiment above-mentioned also apply be applicable to function of making video recording, and to being made video recording
Film is encrypted.Such as, in one embodiment, in the first tripper has and makes video recording and encrypt and make video recording
The function held, the second tripper the most only has function of making video recording.And user can depend on its encryption requirements
Selecting in the first tripper and the second tripper and press, electronic installation 100 will be to it
The content made video recording performs corresponding cipher mode, thus simplifies what made video recording content was encrypted by user
Process.
And aforesaid film and the application of encryption of making video recording, it is possible to apply sharing of the most live film.Such as,
In one embodiment, when user presses the first button, live film then can be encrypted, and works as
When user presses the second button, live film is not encrypted.Wherein, on-the-spot broadcasting film adds
Close mode can the most only allow specific user can see this on-the-spot broadcasting film encrypted,
Wherein specific user can be such as in the specific website sharing live film or the use of service registry
Person, or belong to the user etc. of the same group with the live film of shooting.
Similarly, the encryption method of each embodiment above-mentioned also apply be applicable to sound-recording function, and to being recorded
Content be encrypted.Such as, in one embodiment, the first button has recording and encrypts recording substance
Function, the second button the most only has sound-recording function.And user can be according to its encryption requirements first
Selecting in button and the second button and press, its content recorded will be performed by electronic installation 100
Corresponding cipher mode, thus simplify the process that institute's recording substance is encrypted by user.
In the another embodiment of the application, electronic installation 100 may also set up two buttons and is respectively directed to
Partial content and the sectional drawing of whole picture in picture shown by screen are encrypted.For example, figure
6 is the flow chart according to the screen content encryption method depicted in the application one embodiment.Refer to Fig. 6,
The method of the present embodiment is applicable in the electronic installation 100 of Fig. 1, the most i.e. collocation electronic installation 100
The detailed step of the screen content encryption method of every component description the application.
In step S610, the first button 120a detection being configured on electronic installation 100 is utilized to use
The operation of person triggers signal to produce first, and in being shown according to this in this picture by processor 130
Hold encryption.In step S620, utilize the second button 120b detection being configured on electronic installation 100
The operation of user is to produce the second triggering signal, and is extracted the sectional drawing of picture according to this also by processor 130
This sectional drawing is encrypted.Above-mentioned steps S610 and the detection of S620 and cipher mode respectively with aforementioned reality
Execute step S410 in example and S420 is same or similar, therefore do not repeat them here.
Unlike previous embodiment, the present embodiment in two buttons that electronic installation 100 is arranged is point
Partial content in picture shown by not corresponding screen and full content (that is, whole picture).Work as user
See that screen content comprises Email, note, word, file, photo, image, audio or video
Etc. the archives of known File Format time, can directly press the first button 120a to produce the first triggering signal,
Now processor 130 i.e. can pick out the archives meeting known File Format from screen content, and only pin
The archives of institute's identification are encrypted.On the other hand, when user needs to preserve the content of whole picture and
When being not limited to archives therein, then can press the second button 120b to produce the second triggering signal, now
Processor 130 will the sectional drawing of extracting directly picture, and be encrypted for the sectional drawing extracted.
The application also provides for a kind of non-volatile computer readable recording medium storing program for performing, wherein logger computer journey
Sequence, this computer program is each step performing above-mentioned screen content encryption method, this computer
Program is made up of multiple code segment (such as sets up organization charts's code segment, sign-off
List code segment, setting program code snippet and deployment program code snippet), and these
Code segment, in being loaded into electronic installation and after execution, can complete above-mentioned screen content encryption side
The step of method.
Those skilled in the art are it should be appreciated that each button used in preceding embodiment and number thereof
Setting, application program and File Format, only in order to illustrate, are not limited to the embodiment of the application.
It is to say, the form of button be not limited in the physical button used in preceding embodiment, virtual by
Biometric sensor on key and button, the form of application program is also not limited only to the camera of electronic installation
Pattern, and the form of File Format be also not limited only to Email, note, word, file, photo,
Image, audio or video etc..
In sum, the screen content encryption method that the embodiment of the present application the proposes button by electronic installation
The mode (such as general encryption or biological feature encryption) distinguishing encryption or the content distinguishing encryption are set
(partial content or screen shot).Consequently, it is possible to when user screen content to be encrypted, only need to select
Corresponding button, to press or to touch, does not need complicated operation can realize the encryption of required content.
Although the application is open as above with embodiment, so it is not limited to the application, this area skill
Art personnel are without departing from spirit and scope, when making a little change and retouching, therefore this Shen
Protection domain please is when being as the criterion depending on appended claims confining spectrum.
Claims (19)
1. a screen content encryption method, it is adaptable to there is the electronic installation of screen, under the method includes
Row step:
Display picture is in this screen;
Detection user operation triggers signal to produce;And
According to this triggering signal, it is shown in the content-encrypt in this picture.
2. the method for claim 1, wherein according to this triggering signal, is shown in this picture
The step of content-encrypt include:
Whether this picture of identification includes the described content meeting preset format;And
If including meeting the described content of this preset format, encryption meets the described content of this preset format.
3. method as claimed in claim 2, also includes:
If not including the described content meeting this preset format, encrypt the sectional drawing of this picture.
4. method as claimed in claim 2, wherein this preset format includes Email, note, literary composition
Word, file, photo, image, audio or video.
5. the method for claim 1, wherein according to this triggering signal, is shown in this picture
The step of content-encrypt include:
Whether the application program performed by identification is specific application program;And
If performed application program is this application program specific, then according to the encryption of this application program
Content.
6. the method for claim 1, wherein detects this user and operates to produce this triggering signal,
And according to this triggering signal, the step being shown in the content-encrypt in this picture includes:
Utilize the first button being configured on this electronic installation to detect the operation of this user to touch to produce first
Signal, utilize this first button to extract the biological characteristic of this user, wherein this first button bag simultaneously
Include biometric sensor;And
It is shown in the content-encrypt in this picture according to this biological characteristic.
7. the method for claim 1, wherein detects this user and operates to produce this triggering signal,
And according to this triggering signal, the step being shown in the content-encrypt in this picture includes:
Utilize the first button being configured on this electronic installation to detect the operation of this user to touch to produce first
Signaling, the content being shown in this picture according to this is encrypted in the first way;And
Utilize the second button being configured on this electronic installation to detect the operation of this user to touch to produce second
Signal, be shown in the content in this picture according to this and encrypt in a second manner or do not encrypt described content.
8. method as claimed in claim 7, wherein this first button includes biometric sensor, and
Utilize this first button of being configured on this electronic installation to detect the operation of this user first to touch producing this
Signaling, the step that the content being shown according to this in this picture is encrypted with this first method also includes:
This first button is utilized to extract the biological characteristic of this user;And
According to content described in the biological feature encryption of this extraction.
9. the method for claim 1, wherein this electronic installation is exposal model, and wherein examines
Survey this user to operate to produce this triggering signal, and according to this triggering signal, be shown in this picture
In the step of content-encrypt include:
The first tripper being configured on this screen of electronic device is utilized to detect the operation of this user to produce
Raw first triggering signal, shoots the first photo according to this and encrypts described first photo;And
The second tripper being configured on this screen of electronic device is utilized to detect the operation of this user to produce
Raw second triggering signal, shoots the second photo according to this and does not encrypt described second photo.
10. an electronic installation, including:
Screen, shows picture;
At least one button, detection user operation triggers signal to produce;And
Processor, couples this screen and described button, this triggering signal detected according to described button,
It is shown in the content-encrypt in this picture.
11. electronic installations as claimed in claim 10, wherein this processor in including this picture of identification is
The no described content including meeting preset format, wherein
If including meeting the described content of this preset format, encryption meets the described content of this preset format.
12. electronic installations as claimed in claim 11, wherein
If not including the described content meeting this preset format, the sectional drawing of this picture encrypted by this processor.
13. electronic installations as claimed in claim 10, wherein this preset format includes Email, short
Letter, word, file, photo, image, audio or video.
14. electronic installations as claimed in claim 10, wherein said button includes:
Biometric sensor, extracts the biological characteristic of this user, to provide this processor according to this life
Content described in thing feature encryption.
15. electronic installations as claimed in claim 10, wherein this processor includes answering performed by identification
By program, if performed application program is specific application program, then encrypt institute according to this application program
State content.
16. electronic installations as claimed in claim 10, wherein said button includes:
First button, detects the operation of this user to produce the first triggering signal;And
Second button, detects the operation of this user to produce the second triggering signal.
17. electronic installations as claimed in claim 16, wherein this processor includes according to this first triggering
Signal, the content being shown in this picture encrypts in the first way, and second triggers signal according to this,
It is shown in the content in this picture encrypt in a second manner or do not encrypt described content.
18. electronic installations as claimed in claim 17, wherein this first button includes that biological characteristic senses
Device, and this processor includes the biological characteristic that utilizes this first button to extract this user, to carry according to this
Content described in the biological feature encryption taken.
19. electronic installations as claimed in claim 10, wherein this electronic installation is exposal model, and is somebody's turn to do
Button includes:
First tripper, the operation detecting this user triggers signal to produce one first, and by this
Reason device shoots the first photo according to this and encrypts described first photo;And
Second tripper, the operation detecting this user triggers signal to produce second, and by this process
Device shoots the second photo according to this and does not encrypt described second photo.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510304156.3A CN106295389B (en) | 2015-06-04 | 2015-06-04 | Screen content encryption method and electronic device using same |
CN202110075402.8A CN112765625A (en) | 2015-06-04 | 2015-06-04 | Screen content encryption method and electronic device using same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510304156.3A CN106295389B (en) | 2015-06-04 | 2015-06-04 | Screen content encryption method and electronic device using same |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110075402.8A Division CN112765625A (en) | 2015-06-04 | 2015-06-04 | Screen content encryption method and electronic device using same |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106295389A true CN106295389A (en) | 2017-01-04 |
CN106295389B CN106295389B (en) | 2021-02-09 |
Family
ID=57658695
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510304156.3A Active CN106295389B (en) | 2015-06-04 | 2015-06-04 | Screen content encryption method and electronic device using same |
CN202110075402.8A Pending CN112765625A (en) | 2015-06-04 | 2015-06-04 | Screen content encryption method and electronic device using same |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110075402.8A Pending CN112765625A (en) | 2015-06-04 | 2015-06-04 | Screen content encryption method and electronic device using same |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN106295389B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107833175A (en) * | 2017-11-27 | 2018-03-23 | 重庆邮电大学 | A kind of computer desktop suspension watermark adaptive generation method |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050210390A1 (en) * | 2004-03-04 | 2005-09-22 | Sony Corporation | Image display apparatus, image display system, and image display method |
CN101860438A (en) * | 2010-06-30 | 2010-10-13 | 上海华御信息技术有限公司 | Local data secret leakage prevention system and method based on secret-related data flow direction encryption |
CN101931785A (en) * | 2010-08-27 | 2010-12-29 | 深圳市同洲电子股份有限公司 | Encrypting method of television programs, mobile terminal and system |
CN101989444A (en) * | 2009-07-31 | 2011-03-23 | 索尼公司 | Recording medium, method for manufacturing the same and apparatus for reproducting the same |
CN102034049A (en) * | 2010-12-30 | 2011-04-27 | 华中科技大学 | Mass data compression, encryption, storage and retrieval system and using method thereof |
CN102999568A (en) * | 2012-11-09 | 2013-03-27 | 北京京东世纪贸易有限公司 | Method and device for displaying list on mobile terminal |
CN103067441A (en) * | 2012-11-27 | 2013-04-24 | 北京小米科技有限责任公司 | Method, device and equipment of picture sharing |
CN103106205A (en) * | 2011-11-10 | 2013-05-15 | 腾讯科技(深圳)有限公司 | Method and device for browsing files on mobile terminal |
CN103186761A (en) * | 2011-12-28 | 2013-07-03 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint encryption method of private file and communication terminal |
CN104010269A (en) * | 2014-05-21 | 2014-08-27 | 广州三星通信技术研究有限公司 | Method and device for sending file in communication terminal |
CN104078069A (en) * | 2014-06-25 | 2014-10-01 | 广东欧珀移动通信有限公司 | Method and equipment for playing file based on DLNA |
CN104135605A (en) * | 2013-06-21 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Method and device for taking a picture |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101600118B (en) * | 2008-06-06 | 2012-09-19 | 株式会社日立制作所 | Device and method for extracting audio/video content information |
CN101727561A (en) * | 2009-12-04 | 2010-06-09 | 强敏 | File security management system and file security management method |
US9247286B2 (en) * | 2009-12-31 | 2016-01-26 | Broadcom Corporation | Frame formatting supporting mixed two and three dimensional video data communication |
WO2012099558A1 (en) * | 2011-01-18 | 2012-07-26 | Thomson Licensing | An apparatus and method for performing video screen scrape |
KR102061881B1 (en) * | 2012-10-10 | 2020-01-06 | 삼성전자주식회사 | Multi display apparatus and method for controlling display operation |
US20150058369A1 (en) * | 2013-08-23 | 2015-02-26 | Samsung Electronics Co., Ltd. | Electronic device and method for using captured image in electronic device |
KR20140061340A (en) * | 2014-04-25 | 2014-05-21 | 주식회사 엔씨소프트 | Apparatus and method of managing game screenshot based on exif meta-data |
-
2015
- 2015-06-04 CN CN201510304156.3A patent/CN106295389B/en active Active
- 2015-06-04 CN CN202110075402.8A patent/CN112765625A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050210390A1 (en) * | 2004-03-04 | 2005-09-22 | Sony Corporation | Image display apparatus, image display system, and image display method |
CN101989444A (en) * | 2009-07-31 | 2011-03-23 | 索尼公司 | Recording medium, method for manufacturing the same and apparatus for reproducting the same |
CN101860438A (en) * | 2010-06-30 | 2010-10-13 | 上海华御信息技术有限公司 | Local data secret leakage prevention system and method based on secret-related data flow direction encryption |
CN101931785A (en) * | 2010-08-27 | 2010-12-29 | 深圳市同洲电子股份有限公司 | Encrypting method of television programs, mobile terminal and system |
CN102034049A (en) * | 2010-12-30 | 2011-04-27 | 华中科技大学 | Mass data compression, encryption, storage and retrieval system and using method thereof |
CN103106205A (en) * | 2011-11-10 | 2013-05-15 | 腾讯科技(深圳)有限公司 | Method and device for browsing files on mobile terminal |
CN103186761A (en) * | 2011-12-28 | 2013-07-03 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint encryption method of private file and communication terminal |
CN102999568A (en) * | 2012-11-09 | 2013-03-27 | 北京京东世纪贸易有限公司 | Method and device for displaying list on mobile terminal |
CN103067441A (en) * | 2012-11-27 | 2013-04-24 | 北京小米科技有限责任公司 | Method, device and equipment of picture sharing |
CN104135605A (en) * | 2013-06-21 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Method and device for taking a picture |
CN104010269A (en) * | 2014-05-21 | 2014-08-27 | 广州三星通信技术研究有限公司 | Method and device for sending file in communication terminal |
CN104078069A (en) * | 2014-06-25 | 2014-10-01 | 广东欧珀移动通信有限公司 | Method and equipment for playing file based on DLNA |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107833175A (en) * | 2017-11-27 | 2018-03-23 | 重庆邮电大学 | A kind of computer desktop suspension watermark adaptive generation method |
Also Published As
Publication number | Publication date |
---|---|
CN106295389B (en) | 2021-02-09 |
CN112765625A (en) | 2021-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101529366B (en) | Identification and visualization of trusted user interface objects | |
CN112804445B (en) | Display method and device and electronic equipment | |
KR20190072655A (en) | Authentication methods and electronic devices | |
CN106020784A (en) | Method and device for displaying application message, and terminal | |
CN107784089B (en) | Multimedia data storage method, processing method and mobile terminal | |
CN105975864A (en) | Operation system starting method and device, and terminal | |
CN106709399A (en) | Fingerprint identification method and device | |
CN103543906B (en) | Application icon interaction management method and touch terminal | |
WO2017000523A1 (en) | Security method and apparatus for application program, and electronic device | |
CN105426717A (en) | Interface display method and apparatus | |
US9654607B2 (en) | Method and apparatus for generating application icon | |
WO2017092291A1 (en) | Method and apparatus for acquiring certification material | |
CN107632870A (en) | The startup method and terminal of a kind of application | |
WO2017143911A1 (en) | Icon processing method and device for applications | |
CN106951757A (en) | A kind of method and apparatus for operating application program | |
TWI474705B (en) | Handheld device and unlocking method thereof | |
CN107360322B (en) | Information prompting method and device | |
CN111897474A (en) | File processing method and electronic equipment | |
CN106250757A (en) | The control method of a kind of application program and mobile terminal | |
US20170249450A1 (en) | Device and Method for Authenticating a User | |
CN107506198A (en) | The display methods and mobile terminal of a kind of mobile terminal | |
CN106845199A (en) | Object authentication method and device | |
CN106126991B (en) | Information protection processing method and device and terminal equipment | |
CN106295389A (en) | Screen content encryption method and the electronic installation of use the method | |
CN106529338A (en) | Safe processing method and equipment of data file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |