CN106295389A - Screen content encryption method and the electronic installation of use the method - Google Patents

Screen content encryption method and the electronic installation of use the method Download PDF

Info

Publication number
CN106295389A
CN106295389A CN201510304156.3A CN201510304156A CN106295389A CN 106295389 A CN106295389 A CN 106295389A CN 201510304156 A CN201510304156 A CN 201510304156A CN 106295389 A CN106295389 A CN 106295389A
Authority
CN
China
Prior art keywords
content
user
button
picture
encrypt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510304156.3A
Other languages
Chinese (zh)
Other versions
CN106295389B (en
Inventor
李冠慰
曾俊豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HTC Corp
Original Assignee
High Tech Computer Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by High Tech Computer Corp filed Critical High Tech Computer Corp
Priority to CN201510304156.3A priority Critical patent/CN106295389B/en
Priority to CN202110075402.8A priority patent/CN112765625A/en
Publication of CN106295389A publication Critical patent/CN106295389A/en
Application granted granted Critical
Publication of CN106295389B publication Critical patent/CN106295389B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A kind of screen content encryption method and the electronic installation of use the method.The method is applicable to the electronic installation with screen.The method is prior to showing a content on screen, then the operation of detection user triggers signal to produce, and is shown in the content-encrypt in this picture according to triggering signal afterwards.

Description

Screen content encryption method and the electronic installation of use the method
Technical field
The application relates to a kind of encryption method and device, and particularly to a kind of screen content encryption method and Use the electronic installation of the method.
Background technology
For coordinate modern's busy life rhythm, various do not take up space and mobile device easy to carry also Weed out the old and bring forth the new.With smart mobile phone (Smart phone), personal digital assistant (Personal Digital Assistant, PDA) mobile phone, tablet PC (Tablet PC), as a example by mobile computer, it is not Only possess the various functions of conventional apparatus, user more can be allowed to pass through its built-in operating system or application Program reaches to write file, sends and receive e-mail, browse webpage or do the purposes such as instant messaging.
User is when using mobile phone to browse important information or archives, it may be necessary to screen content (on-screen contents) achieves and encrypts.Archives for some specific formats (such as, shine Sheet), mobile phone may have corresponding application program, it is possible to provide user performs encryption by menu operation. But, for many unspecific screen contents (such as, webpage), then may need to change into specific shelves Case form, the action being just encrypted.
On the other hand, when user uses camera or has the mobile device of camera function and shoots some privacies When photo or classified papers, in order to avoid content of shooting is never actually viewed by others, replicates and even steal, generally Some encryption functions can be performed before shooting or after shooting.But, these encryption functions typically require use Person needs complicated operation with manually opened or after the picture is taken for certain content special setting before shooting.
Summary of the invention
Current cryptographic operation needs complicated operation for the user, and need to preset or Open, often result in the inconvenience of user and be negligent of significant data is encrypted.Because being this, this Application provides a kind of screen content encryption method, and it provides a kind of easy mode of operation, and can distinguish not Screen content is encrypted by same cipher mode.
The application provides a kind of screen content encryption method, it is adaptable to have the electronic installation of screen.This side Method is prior to showing a picture on screen, then the operation of detection user triggers signal, afterwards basis to produce Trigger signal and be shown in the content-encrypt in this picture.
In an embodiment of the application, the above-mentioned content being shown in this picture according to triggering signal adds Close step is the content whether including meeting preset format in first identification picture.Wherein, if including meeting The content of preset format, will meet the content-encrypt of preset format;If not including meeting the interior of preset format Hold, then the sectional drawing of picture is encrypted.
In an embodiment of the application, above-mentioned detection user operation with produce trigger signal and according to The step triggering the content-encrypt that signal is shown in this picture is first with being configured on electronic installation The operation of the first button detection user, to produce the first triggering signal, utilizes the first button to extract simultaneously and makes The biological characteristic of user, wherein the first button includes biometric sensor.It follows that according to biological special Levy this content-encrypt.
In an embodiment of the application, above-mentioned detection user operation with produce trigger signal and according to Triggering the step of content-encrypt that signal is shown in this picture is to utilize the be configured on electronic installation The operation of one button detection user, to produce the first triggering signal, is shown in this most in the first way Content-encrypt in picture, and utilize the behaviour of the second button detection user being configured on electronic installation Make, to produce the second triggering signal, to be shown in the content-encrypt in this picture or not the most in a second manner Encrypted content.
In an embodiment of the application, above-mentioned first button includes biometric sensor, and utilizes and join Be placed on electronic installation first button detection user operation with produce first triggering signal, according to this with First method is shown in the step of the content-encrypt in this picture for extracting user first with the first button Biological characteristic, further according to the biological feature encryption content extracted.
In an embodiment of the application, above-mentioned electronic installation is exposal model, and wherein detects user Operate and trigger signal to produce, and be shown in the step of the content-encrypt in this picture according to triggering signal Rapid for utilizing the operation of the first tripper detection user being configured on screen of electronic device to produce the One triggers signal, shoots the first photo according to this and encrypts the first photo, and utilization is configured at electronic installation The operation of the second tripper detection user on screen, to produce the second triggering signal, shoots the according to this Two photos but do not encrypt the second photo.
In an embodiment of the application, the operation of above-mentioned detection user triggers signal, Yi Jigen to produce According to triggering signal, the step being shown in the content-encrypt in this picture is that utilization is configured on electronic installation First button detection user operation with produce first triggering signal, be shown according to this in this picture Content-encrypt, and utilize be configured on electronic installation second button detection user operation with produce Raw second triggering signal, extracts the sectional drawing of picture according to this and encrypts sectional drawing.
The application provides a kind of electronic installation, and it includes screen, at least one button and processor. Screen is for display one picture.Button detection user operation triggers signal to produce.Processor connects screen Curtain and button, be shown in the content-encrypt in this picture according to the signal that triggers that button is detected.
In an embodiment of the application, whether above-mentioned processor can include meeting default lattice in identification picture The content of formula.Wherein, if including, the content-encrypt meeting preset format meets content described in preset format; If not including the sectional drawing meeting the content-encrypt picture of preset format.
In an embodiment of the application, above-mentioned preset format includes Email, note, word, literary composition Part, photo, image, audio or video.
In an embodiment of the application, above-mentioned button includes biometric sensor, in order to extract use The biological characteristic of person utilizes biological feature encryption content with offer processor.
In an embodiment of the application, above-mentioned button includes the first button and the second button.First button The operation of detection user is to produce the first triggering signal.The operation of the second button detection user is to produce Second triggers signal.
In an embodiment of the application, above-mentioned processor includes triggering signal in the first way according to first It is shown in the content-encrypt in this picture and is shown in this in a second manner according to the second triggering signal Content-encrypt in picture or non-encrypted content.
In an embodiment of the application, above-mentioned first button includes biometric sensor, and processor The biological characteristic of user is extracted to utilize biological feature encryption content including utilizing the first button.
In an embodiment of the application, above-mentioned electronic installation is exposal model, and button includes that first is fast Door button and the second tripper.The operation of the first tripper detection user is to produce the first triggering letter Number, and shot the first photo by processor according to this and encrypt the first photo.Second tripper detection uses The operation of person is to produce the second triggering signal, and is shot the second photo by processor according to this and do not encrypt second Photo.
In an embodiment of the application, above-mentioned processor includes that triggering signal according to first is shown in this Content-encrypt in picture and according to the second sectional drawing triggering signal extraction picture and encrypt sectional drawing.
The application provides a kind of computer readable recording medium storing program for performing, in order to logging program, carries via electronic installation Enter and perform step.First, display picture is in the screen of electronic installation.It follows that detection user behaviour Make to trigger signal to produce.Afterwards, it is shown in the content-encrypt in this picture according to triggering signal.
Based on above-mentioned, the screen content encryption method that the embodiment of the present application proposes can pressing by electronic installation Key arranges the encryption of identification user and sets, or directly arranging multiple button carrys out corresponding different encryption Mode.Consequently, it is possible to when user screen content to be encrypted, do not need complicated operating and setting, and can With more intuition and intelligently desired data is encrypted.
For the features described above of the application and advantage can be become apparent, special embodiment below, and coordinate Accompanying drawing is described in detail below.
Accompanying drawing explanation
Fig. 1 is the block chart according to the electronic installation depicted in the application one embodiment.
Fig. 2 is the flow chart according to the screen content encryption method depicted in the application one embodiment.
Fig. 3 A~3C is based on the schematic diagram of the encryption screen content that embodiments herein illustrates.
Fig. 4 is the flow chart according to the screen content encryption method depicted in the application one embodiment.
Fig. 5 is according to the screen content encryption method under exposal model depicted in the application one embodiment Flow chart.
Fig. 6 is the flow chart according to the screen content encryption method depicted in the application one embodiment.
[symbol description]
100: electronic installation
110: screen
120,120a~120c: button
130: processor
32,34,36: picture
342: film
362: webpage
364: word
S210~S230, S410~S420, S510~S520, S610~S620: step
Detailed description of the invention
Complicated encipheror is reduced to the single or operation of a fewer keys by the application, and combines biological special The detection levied, it is possible to provide different cipher modes selects to user, and user can intuitively be extracted And encrypt watched screen content (on-screen contents).Thereby, complicated behaviour can not only be saved Make, be more provided that user depends on its demand and selects different modes to be encrypted easily, increase data Safety.
Fig. 1 is the block chart according to the electronic installation depicted in the application one embodiment.Refer to Fig. 1, The electronic installation 100 e.g. smart mobile phone (Smart phone) of the present embodiment or personal digital assistant (Personal Digital Assistant, PDA) mobile phone, tablet PC (Tablet PC), notes type Computer, digital camera, digital camera, digital audio tape or other any electronic installations, wherein wrap Including screen 110, at least one button 120 and processor 130, its function is described below.
Screen 110 can be general display, e.g. liquid crystal display (Liquid-Crystal Display, LCD), plasma display, vacuum fluorescent display, light emitting diode (Light-Emitting Diode, LED) display, field-emitter display (Field Emission Display, FED) and/ Or the display of other suitable species.Screen 110 can also be touch control screen, e.g. by resistance-type, Condenser type or other kinds of touch sensing element are integrated with liquid crystal display and are formed.In the middle of the disclosure, Either the screen of which kind of form all can be used for the screen content of display electronics assemblies 100.
Button 120a, 120b, 120c can be disposed on the physical button on electronic installation 100 or display Virtual key on the screen 110 of electronic installation 100.In the middle of the disclosure, button 120a, 120b, 120c is used for detecting user operation and triggers signal to produce.
Processor 130 e.g. CPU (Central Processing Unit, CPU), or The microprocessor (Microprocessor) of other programmable general services or specific use, digital signal Processor (Digital Signal Processor, DSP), Programmable Logic Controller, ASIC (Application Specific Integrated Circuits, ASIC), programmable logic device (Programmable Logic Device, PLD) or other similar devices or the combination of these devices.Place Reason unit 130 couples screen 110 and button 120, and triggers signal according to button 120 is produced Perform the encryption function of screen content.Hereinafter i.e. screen content is performed for embodiment explanation electronic installation 100 The detailed step of encryption method.
Fig. 2 is the flow chart according to the screen content encryption method depicted in the application one embodiment.Please join According to Fig. 2, the method for the present embodiment is applicable to the electronic installation 100 of Fig. 1, electronic installation of the most i.e. arranging in pairs or groups The detailed step of the screen content encryption method of the every component description the application in 100.
First, in step S210, electronic installation 100 shows any picture by screen 110.Then, In step S220, button 120 detect user and operate to produce triggering signal.In step S230 In, processor 130 is shown in the content-encrypt in this picture according to triggering signal.Wherein, button 120 Can be one or more.In one embodiment, user is touched different buttons 120 and can be produced different touching Signaling, processor 130 then can be according to being received the kind triggering signal, it is judged that the be intended to reality of user The cipher mode executed or the screen content to be encrypted (part or all of content), thus screen content is entered Row encryption.
In detail, in an embodiment of the application, when the screen shown by user screen to be encrypted 110 During curtain content, can press or touch key-press 120 or one of them button 120 trigger signal to produce.? In one embodiment, user pushes button 120 can use fixing cipher mode and flow process.At another In embodiment, whether processor 130 can include in the content shown by identification screen according to triggering signal Meet the archives of preset format.Described preset format can be Email, note, word, file, Photo, image, audio or video etc., the present embodiment is not limited to this, and carries out different cipher modes And flow process.And in another embodiment, processor 130 can be according to triggering signal, identification institute at present is Function, software or the program performed, such as browser, file routine, picture browsing program, film are clear Looking at program, camera etc., the present embodiment is not limited to this, and carries out different cipher modes and flow process.
Above-mentioned identification result can be used to the File Format after determining encryption, or determines how to be encrypted Process.If screen content meets preset format, then can be encrypted only for this content and be saved as specific Archives;If not meeting preset format, then can transfer extract whole screen content and be classified as picture File Format, and screen content is encrypted and is saved as picture.
For example, Fig. 3 A~3C is based on the signal of the encryption screen content that embodiments herein illustrates Figure.Refer to Fig. 3 A, when screen 110 shows the picture 32 of Fig. 3 A, processor 130 can be drawn in identification The content in face 32, and judge that it is word, therefore picture 32 encrypted and store into character file;Or Person, processor 130 identification its be a browsing file software, and to current picture 32 open file carry out Encryption.Refer to Fig. 3 B, when screen 110 shows the picture 34 of Fig. 3 B, processor 130 can identification The content of picture 34, and judge wherein to contain film 342, therefore film 342 encrypted and store into shadow Sheet archives;Or, processor 130 identification its be that a film browses software, and current picture 32 is opened Film archive or film link be encrypted.Refer to Fig. 3 C, when screen 110 shows Fig. 3 C's During picture 36, owing to picture 36 contains webpage 362 and word 364 simultaneously, processor 130 cannot be sentenced The File Format belonging to content of disconnected picture 36, therefore can extract whole screen content, and encryption is saved as figure Sheet archives;Or, processor 130 identification picture 36 is a webpage or current program is a browser, And the webpage network address opening current picture 32 is encrypted, such as, can the network address of this webpage be existed specific And in the data folder encrypted, such as, there is the user my favorite via encryption.
In addition, the File Format belonging to the screen content of screen 110 cannot be determined when processor 130 Time, in other embodiments, it is also possible to by the way of additionally opening menu, allow user select to be intended to File Format (such as, Email, note, word, file, photo, image, the audio frequency of storage Or video etc.).It will be apparent to a skilled person that above-described embodiment is merely illustrative, The application is not limited thereto.
On the other hand, in the above-described embodiments, the mode of encryption can be by user sets itself.Citing For, the mode of encryption can be that requirement user inputs a password, then adds according to input password Close.And time to be deciphered, only need to input again and be previously entered password and can be decrypted.The mode of encryption also may be used To be that the picture being intended to encryption is stored in specific data folder, wherein this specific data folder is to need input spy Determine password or the secured fashion with other, such as specific gesture (gesture), specific pattern (pattern) Could enter.It will be appreciated that those skilled in the art that the mode of above-mentioned encryption is merely illustrative Bright, the application is not limited thereto.
In addition, in one embodiment, the application also can the identity of identification user, and perform according to this Cipher mode set by this user.Wherein, the application utilizes biological characteristic to have the spy being difficult to replicate Property, the button 120 of electronic installation 100 arranges biometric sensor (such as, fingerprint further Sensor, but the application is not limited), to utilize the different user of biological characteristic identification, and perform Cipher mode set by user.Button 120 can be physical button, can be maybe to have biological characteristic to distinguish Know the virtual key shown by Touch Screen of function.It is said that in general, biological characteristic need registration in advance or It is stored for comparison.Be ready for registration biological attribute data after, when have biometric sensor by When key senses the biological characteristic of user, so that it may directly compare with registered biological attribute data, To determine whether the biological attribute data being consistent.
When screen content shown by arbitrary user screen to be encrypted 110, if user pressing or touch Touching the button 120 with biometric sensor, this button also can sense while producing triggering signal The biological characteristic of user, and compare with biological attribute data registered in advance.If with registered in advance Biological attribute data be consistent, then can use the encryption set by the user that this biological attribute data is corresponding Screen content is encrypted by mode.Otherwise, if not being inconsistent with biological attribute data registered in advance, then will In the way of default, screen content it is encrypted or is not encrypted, or not producing any action.
It should be noted that, the biological characteristic of above-described embodiment can be used to the different user of identification to select Cipher mode.Such as, the screen content being intended to encryption is stored in the data folder corresponding with user, makes Encrypt screen content with specific cryptosystem or specific shelves are encrypted and stored into the screen content being intended to encrypt Case form.Above-mentioned biological characteristic also can be used directly to encryption, i.e. using biological characteristic as encrypted screen The password of content.It will be appreciated that those skilled in the art that the application mode of above-mentioned biological characteristic is only For exemplary illustration the application, the application is not limited thereto.
On the other hand, in another embodiment of the application, electronic installation 100 also can arrange at least two Button distinguishes corresponding different cipher mode.For example, Fig. 4 is according to the application one embodiment institute The flow chart of the screen content encryption method illustrated.Refer to Fig. 4, the method for the present embodiment is applicable to Fig. 1 Electronic installation 100, the most i.e. the screen of every component description the application in collocation electronic installation 100 The detailed step of content enciphering method.
In step S410, electronic installation 100 utilize first button 120a detection user operation with Produce the first triggering signal, and be shown in the content in this picture according to this with first party by processor 130 Formula is encrypted.In the step s 420, electronic installation 100 utilizes the second button 120b detection user Operate to produce the second triggering signal, and the content being shown in this picture according to this by processor 130 adds Close encrypt in a second manner or do not encrypt this content.The detection of above-mentioned steps S410 and S420 and encryption Mode is same or similar with step S220 in previous embodiment~S230 respectively, therefore does not repeats them here.
Unlike previous embodiment, the present embodiment is to arrange two buttons in electronic installation 100 to divide Corresponding two kinds of different cipher modes, two wherein said buttons can all have encryption function or Only have a button and there is encryption function.For example, in one embodiment, may select at a button Biosensing apparatus is set, and by the most corresponding for another button encryption function.Therefore, touch when user When touching or press the button with biosensing apparatus, can determine according to the biological attribute data sensed Corresponding cipher mode.This means, according to the identity of the biological attribute data identification user sensed, To apply mechanically the cipher mode corresponding with picked out user.On the other hand, another is touched when user During button, screen content is encrypted by the cipher mode the most directly using this button corresponding.Real at another Execute in example, a button correspondence encryption function can be only had, and at this button, biosensing apparatus is set to carry Take the biological characteristic of user and determine cipher mode according to this.Another button is the most only in order to extract screen content And be not encrypted.It will be appreciated that those skilled in the art that above-mentioned button and corresponding encryption side Formula is merely illustrative, and the application is not limited thereto.
In the another embodiment of the application, when electronic installation 100 performs specific application program, electricity The screen content shown when can be performed this application program by said method equally of sub-device 100 is entered Row encryption.For example, the camera function of electronic installation 100 is started when user so that electronic installation 100 when being in exposal model, can be encrypted for the photo captured by electronic installation 100.
In detail, Fig. 5 is to add according to the screen content under exposal model depicted in the application one embodiment The flow chart of decryption method.Refer to Fig. 5, the method for the present embodiment is applicable to the electronic installation 100 of Fig. 1, Below screen content encryption method detailed of i.e. every component description the application in collocation electronic installation 100 Thin step.
In step S510, utilize and be configured at the first tripper on electronic installation 100 screen 110 The operation of 120a detection user is to produce the first triggering signal, and is shot first according to this by processor 130 Photo also encrypts the first photo.In step S520, utilize and be configured on electronic installation 100 screen 110 The operation of the second tripper 120b detection user to produce the second triggering signal, and by processor 130 shoot the second photo according to this does not encrypt the second photo.Above-mentioned steps S510 and the detection of S520 and Cipher mode is same or similar with step S410 in previous embodiment and S420 respectively, therefore at this no longer Repeat.
Unlike previous embodiment, the present embodiment is when electronic installation 100 is in exposal model, same Sample ground arranges two buttons at electronic installation 100 and carrys out corresponding different cipher mode, and wherein the first shutter is pressed Key 120a has the function taking pictures and encrypting screen content, and the second tripper 120b the most only has bat According to function.First tripper 120a or the second tripper 120b can be shown in electronic installation 100 Screen 110 on virtual key or be arranged in the physical button on electronic installation 100, but the application is also It is not limited to this.Thereby, user can be according to its encryption requirements at the first tripper 120a and the second shutter Selecting in button 120b and press, its photo shot will be performed corresponding by electronic installation 100 Cipher mode, thus simplify the process that captured photo is encrypted by user.
Additionally, the encryption method of each embodiment above-mentioned also apply be applicable to function of making video recording, and to being made video recording Film is encrypted.Such as, in one embodiment, in the first tripper has and makes video recording and encrypt and make video recording The function held, the second tripper the most only has function of making video recording.And user can depend on its encryption requirements Selecting in the first tripper and the second tripper and press, electronic installation 100 will be to it The content made video recording performs corresponding cipher mode, thus simplifies what made video recording content was encrypted by user Process.
And aforesaid film and the application of encryption of making video recording, it is possible to apply sharing of the most live film.Such as, In one embodiment, when user presses the first button, live film then can be encrypted, and works as When user presses the second button, live film is not encrypted.Wherein, on-the-spot broadcasting film adds Close mode can the most only allow specific user can see this on-the-spot broadcasting film encrypted, Wherein specific user can be such as in the specific website sharing live film or the use of service registry Person, or belong to the user etc. of the same group with the live film of shooting.
Similarly, the encryption method of each embodiment above-mentioned also apply be applicable to sound-recording function, and to being recorded Content be encrypted.Such as, in one embodiment, the first button has recording and encrypts recording substance Function, the second button the most only has sound-recording function.And user can be according to its encryption requirements first Selecting in button and the second button and press, its content recorded will be performed by electronic installation 100 Corresponding cipher mode, thus simplify the process that institute's recording substance is encrypted by user.
In the another embodiment of the application, electronic installation 100 may also set up two buttons and is respectively directed to Partial content and the sectional drawing of whole picture in picture shown by screen are encrypted.For example, figure 6 is the flow chart according to the screen content encryption method depicted in the application one embodiment.Refer to Fig. 6, The method of the present embodiment is applicable in the electronic installation 100 of Fig. 1, the most i.e. collocation electronic installation 100 The detailed step of the screen content encryption method of every component description the application.
In step S610, the first button 120a detection being configured on electronic installation 100 is utilized to use The operation of person triggers signal to produce first, and in being shown according to this in this picture by processor 130 Hold encryption.In step S620, utilize the second button 120b detection being configured on electronic installation 100 The operation of user is to produce the second triggering signal, and is extracted the sectional drawing of picture according to this also by processor 130 This sectional drawing is encrypted.Above-mentioned steps S610 and the detection of S620 and cipher mode respectively with aforementioned reality Execute step S410 in example and S420 is same or similar, therefore do not repeat them here.
Unlike previous embodiment, the present embodiment in two buttons that electronic installation 100 is arranged is point Partial content in picture shown by not corresponding screen and full content (that is, whole picture).Work as user See that screen content comprises Email, note, word, file, photo, image, audio or video Etc. the archives of known File Format time, can directly press the first button 120a to produce the first triggering signal, Now processor 130 i.e. can pick out the archives meeting known File Format from screen content, and only pin The archives of institute's identification are encrypted.On the other hand, when user needs to preserve the content of whole picture and When being not limited to archives therein, then can press the second button 120b to produce the second triggering signal, now Processor 130 will the sectional drawing of extracting directly picture, and be encrypted for the sectional drawing extracted.
The application also provides for a kind of non-volatile computer readable recording medium storing program for performing, wherein logger computer journey Sequence, this computer program is each step performing above-mentioned screen content encryption method, this computer Program is made up of multiple code segment (such as sets up organization charts's code segment, sign-off List code segment, setting program code snippet and deployment program code snippet), and these Code segment, in being loaded into electronic installation and after execution, can complete above-mentioned screen content encryption side The step of method.
Those skilled in the art are it should be appreciated that each button used in preceding embodiment and number thereof Setting, application program and File Format, only in order to illustrate, are not limited to the embodiment of the application. It is to say, the form of button be not limited in the physical button used in preceding embodiment, virtual by Biometric sensor on key and button, the form of application program is also not limited only to the camera of electronic installation Pattern, and the form of File Format be also not limited only to Email, note, word, file, photo, Image, audio or video etc..
In sum, the screen content encryption method that the embodiment of the present application the proposes button by electronic installation The mode (such as general encryption or biological feature encryption) distinguishing encryption or the content distinguishing encryption are set (partial content or screen shot).Consequently, it is possible to when user screen content to be encrypted, only need to select Corresponding button, to press or to touch, does not need complicated operation can realize the encryption of required content.
Although the application is open as above with embodiment, so it is not limited to the application, this area skill Art personnel are without departing from spirit and scope, when making a little change and retouching, therefore this Shen Protection domain please is when being as the criterion depending on appended claims confining spectrum.

Claims (19)

1. a screen content encryption method, it is adaptable to there is the electronic installation of screen, under the method includes Row step:
Display picture is in this screen;
Detection user operation triggers signal to produce;And
According to this triggering signal, it is shown in the content-encrypt in this picture.
2. the method for claim 1, wherein according to this triggering signal, is shown in this picture The step of content-encrypt include:
Whether this picture of identification includes the described content meeting preset format;And
If including meeting the described content of this preset format, encryption meets the described content of this preset format.
3. method as claimed in claim 2, also includes:
If not including the described content meeting this preset format, encrypt the sectional drawing of this picture.
4. method as claimed in claim 2, wherein this preset format includes Email, note, literary composition Word, file, photo, image, audio or video.
5. the method for claim 1, wherein according to this triggering signal, is shown in this picture The step of content-encrypt include:
Whether the application program performed by identification is specific application program;And
If performed application program is this application program specific, then according to the encryption of this application program Content.
6. the method for claim 1, wherein detects this user and operates to produce this triggering signal, And according to this triggering signal, the step being shown in the content-encrypt in this picture includes:
Utilize the first button being configured on this electronic installation to detect the operation of this user to touch to produce first Signal, utilize this first button to extract the biological characteristic of this user, wherein this first button bag simultaneously Include biometric sensor;And
It is shown in the content-encrypt in this picture according to this biological characteristic.
7. the method for claim 1, wherein detects this user and operates to produce this triggering signal, And according to this triggering signal, the step being shown in the content-encrypt in this picture includes:
Utilize the first button being configured on this electronic installation to detect the operation of this user to touch to produce first Signaling, the content being shown in this picture according to this is encrypted in the first way;And
Utilize the second button being configured on this electronic installation to detect the operation of this user to touch to produce second Signal, be shown in the content in this picture according to this and encrypt in a second manner or do not encrypt described content.
8. method as claimed in claim 7, wherein this first button includes biometric sensor, and Utilize this first button of being configured on this electronic installation to detect the operation of this user first to touch producing this Signaling, the step that the content being shown according to this in this picture is encrypted with this first method also includes:
This first button is utilized to extract the biological characteristic of this user;And
According to content described in the biological feature encryption of this extraction.
9. the method for claim 1, wherein this electronic installation is exposal model, and wherein examines Survey this user to operate to produce this triggering signal, and according to this triggering signal, be shown in this picture In the step of content-encrypt include:
The first tripper being configured on this screen of electronic device is utilized to detect the operation of this user to produce Raw first triggering signal, shoots the first photo according to this and encrypts described first photo;And
The second tripper being configured on this screen of electronic device is utilized to detect the operation of this user to produce Raw second triggering signal, shoots the second photo according to this and does not encrypt described second photo.
10. an electronic installation, including:
Screen, shows picture;
At least one button, detection user operation triggers signal to produce;And
Processor, couples this screen and described button, this triggering signal detected according to described button, It is shown in the content-encrypt in this picture.
11. electronic installations as claimed in claim 10, wherein this processor in including this picture of identification is The no described content including meeting preset format, wherein
If including meeting the described content of this preset format, encryption meets the described content of this preset format.
12. electronic installations as claimed in claim 11, wherein
If not including the described content meeting this preset format, the sectional drawing of this picture encrypted by this processor.
13. electronic installations as claimed in claim 10, wherein this preset format includes Email, short Letter, word, file, photo, image, audio or video.
14. electronic installations as claimed in claim 10, wherein said button includes:
Biometric sensor, extracts the biological characteristic of this user, to provide this processor according to this life Content described in thing feature encryption.
15. electronic installations as claimed in claim 10, wherein this processor includes answering performed by identification By program, if performed application program is specific application program, then encrypt institute according to this application program State content.
16. electronic installations as claimed in claim 10, wherein said button includes:
First button, detects the operation of this user to produce the first triggering signal;And
Second button, detects the operation of this user to produce the second triggering signal.
17. electronic installations as claimed in claim 16, wherein this processor includes according to this first triggering Signal, the content being shown in this picture encrypts in the first way, and second triggers signal according to this, It is shown in the content in this picture encrypt in a second manner or do not encrypt described content.
18. electronic installations as claimed in claim 17, wherein this first button includes that biological characteristic senses Device, and this processor includes the biological characteristic that utilizes this first button to extract this user, to carry according to this Content described in the biological feature encryption taken.
19. electronic installations as claimed in claim 10, wherein this electronic installation is exposal model, and is somebody's turn to do Button includes:
First tripper, the operation detecting this user triggers signal to produce one first, and by this Reason device shoots the first photo according to this and encrypts described first photo;And
Second tripper, the operation detecting this user triggers signal to produce second, and by this process Device shoots the second photo according to this and does not encrypt described second photo.
CN201510304156.3A 2015-06-04 2015-06-04 Screen content encryption method and electronic device using same Active CN106295389B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510304156.3A CN106295389B (en) 2015-06-04 2015-06-04 Screen content encryption method and electronic device using same
CN202110075402.8A CN112765625A (en) 2015-06-04 2015-06-04 Screen content encryption method and electronic device using same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510304156.3A CN106295389B (en) 2015-06-04 2015-06-04 Screen content encryption method and electronic device using same

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202110075402.8A Division CN112765625A (en) 2015-06-04 2015-06-04 Screen content encryption method and electronic device using same

Publications (2)

Publication Number Publication Date
CN106295389A true CN106295389A (en) 2017-01-04
CN106295389B CN106295389B (en) 2021-02-09

Family

ID=57658695

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201510304156.3A Active CN106295389B (en) 2015-06-04 2015-06-04 Screen content encryption method and electronic device using same
CN202110075402.8A Pending CN112765625A (en) 2015-06-04 2015-06-04 Screen content encryption method and electronic device using same

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202110075402.8A Pending CN112765625A (en) 2015-06-04 2015-06-04 Screen content encryption method and electronic device using same

Country Status (1)

Country Link
CN (2) CN106295389B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107833175A (en) * 2017-11-27 2018-03-23 重庆邮电大学 A kind of computer desktop suspension watermark adaptive generation method

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050210390A1 (en) * 2004-03-04 2005-09-22 Sony Corporation Image display apparatus, image display system, and image display method
CN101860438A (en) * 2010-06-30 2010-10-13 上海华御信息技术有限公司 Local data secret leakage prevention system and method based on secret-related data flow direction encryption
CN101931785A (en) * 2010-08-27 2010-12-29 深圳市同洲电子股份有限公司 Encrypting method of television programs, mobile terminal and system
CN101989444A (en) * 2009-07-31 2011-03-23 索尼公司 Recording medium, method for manufacturing the same and apparatus for reproducting the same
CN102034049A (en) * 2010-12-30 2011-04-27 华中科技大学 Mass data compression, encryption, storage and retrieval system and using method thereof
CN102999568A (en) * 2012-11-09 2013-03-27 北京京东世纪贸易有限公司 Method and device for displaying list on mobile terminal
CN103067441A (en) * 2012-11-27 2013-04-24 北京小米科技有限责任公司 Method, device and equipment of picture sharing
CN103106205A (en) * 2011-11-10 2013-05-15 腾讯科技(深圳)有限公司 Method and device for browsing files on mobile terminal
CN103186761A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Fingerprint encryption method of private file and communication terminal
CN104010269A (en) * 2014-05-21 2014-08-27 广州三星通信技术研究有限公司 Method and device for sending file in communication terminal
CN104078069A (en) * 2014-06-25 2014-10-01 广东欧珀移动通信有限公司 Method and equipment for playing file based on DLNA
CN104135605A (en) * 2013-06-21 2014-11-05 腾讯科技(深圳)有限公司 Method and device for taking a picture

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101600118B (en) * 2008-06-06 2012-09-19 株式会社日立制作所 Device and method for extracting audio/video content information
CN101727561A (en) * 2009-12-04 2010-06-09 强敏 File security management system and file security management method
US9247286B2 (en) * 2009-12-31 2016-01-26 Broadcom Corporation Frame formatting supporting mixed two and three dimensional video data communication
WO2012099558A1 (en) * 2011-01-18 2012-07-26 Thomson Licensing An apparatus and method for performing video screen scrape
KR102061881B1 (en) * 2012-10-10 2020-01-06 삼성전자주식회사 Multi display apparatus and method for controlling display operation
US20150058369A1 (en) * 2013-08-23 2015-02-26 Samsung Electronics Co., Ltd. Electronic device and method for using captured image in electronic device
KR20140061340A (en) * 2014-04-25 2014-05-21 주식회사 엔씨소프트 Apparatus and method of managing game screenshot based on exif meta-data

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050210390A1 (en) * 2004-03-04 2005-09-22 Sony Corporation Image display apparatus, image display system, and image display method
CN101989444A (en) * 2009-07-31 2011-03-23 索尼公司 Recording medium, method for manufacturing the same and apparatus for reproducting the same
CN101860438A (en) * 2010-06-30 2010-10-13 上海华御信息技术有限公司 Local data secret leakage prevention system and method based on secret-related data flow direction encryption
CN101931785A (en) * 2010-08-27 2010-12-29 深圳市同洲电子股份有限公司 Encrypting method of television programs, mobile terminal and system
CN102034049A (en) * 2010-12-30 2011-04-27 华中科技大学 Mass data compression, encryption, storage and retrieval system and using method thereof
CN103106205A (en) * 2011-11-10 2013-05-15 腾讯科技(深圳)有限公司 Method and device for browsing files on mobile terminal
CN103186761A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Fingerprint encryption method of private file and communication terminal
CN102999568A (en) * 2012-11-09 2013-03-27 北京京东世纪贸易有限公司 Method and device for displaying list on mobile terminal
CN103067441A (en) * 2012-11-27 2013-04-24 北京小米科技有限责任公司 Method, device and equipment of picture sharing
CN104135605A (en) * 2013-06-21 2014-11-05 腾讯科技(深圳)有限公司 Method and device for taking a picture
CN104010269A (en) * 2014-05-21 2014-08-27 广州三星通信技术研究有限公司 Method and device for sending file in communication terminal
CN104078069A (en) * 2014-06-25 2014-10-01 广东欧珀移动通信有限公司 Method and equipment for playing file based on DLNA

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107833175A (en) * 2017-11-27 2018-03-23 重庆邮电大学 A kind of computer desktop suspension watermark adaptive generation method

Also Published As

Publication number Publication date
CN106295389B (en) 2021-02-09
CN112765625A (en) 2021-05-07

Similar Documents

Publication Publication Date Title
CN101529366B (en) Identification and visualization of trusted user interface objects
CN112804445B (en) Display method and device and electronic equipment
KR20190072655A (en) Authentication methods and electronic devices
CN106020784A (en) Method and device for displaying application message, and terminal
CN107784089B (en) Multimedia data storage method, processing method and mobile terminal
CN105975864A (en) Operation system starting method and device, and terminal
CN106709399A (en) Fingerprint identification method and device
CN103543906B (en) Application icon interaction management method and touch terminal
WO2017000523A1 (en) Security method and apparatus for application program, and electronic device
CN105426717A (en) Interface display method and apparatus
US9654607B2 (en) Method and apparatus for generating application icon
WO2017092291A1 (en) Method and apparatus for acquiring certification material
CN107632870A (en) The startup method and terminal of a kind of application
WO2017143911A1 (en) Icon processing method and device for applications
CN106951757A (en) A kind of method and apparatus for operating application program
TWI474705B (en) Handheld device and unlocking method thereof
CN107360322B (en) Information prompting method and device
CN111897474A (en) File processing method and electronic equipment
CN106250757A (en) The control method of a kind of application program and mobile terminal
US20170249450A1 (en) Device and Method for Authenticating a User
CN107506198A (en) The display methods and mobile terminal of a kind of mobile terminal
CN106845199A (en) Object authentication method and device
CN106126991B (en) Information protection processing method and device and terminal equipment
CN106295389A (en) Screen content encryption method and the electronic installation of use the method
CN106529338A (en) Safe processing method and equipment of data file

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant