CN106355068A - Individual security information displaying method and device - Google Patents

Individual security information displaying method and device Download PDF

Info

Publication number
CN106355068A
CN106355068A CN201610798908.0A CN201610798908A CN106355068A CN 106355068 A CN106355068 A CN 106355068A CN 201610798908 A CN201610798908 A CN 201610798908A CN 106355068 A CN106355068 A CN 106355068A
Authority
CN
China
Prior art keywords
user
content
presented
mobile terminal
sign data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610798908.0A
Other languages
Chinese (zh)
Inventor
甘程奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610798908.0A priority Critical patent/CN106355068A/en
Publication of CN106355068A publication Critical patent/CN106355068A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides an individual security information displaying method and device. The method includes the steps of detecting that individual security information exists in to-be-displayed content of the mobile terminal, recognizing whether a current user of the mobile terminal is a set user or not, and if not, hiding the to-be-displayed content. The to-be-displayed content is hidden when the current user is not a set user, the leakage of individual security information is avoided, and the security of individual property information and identity information is protected.

Description

A kind of methods of exhibiting of personal security's information and device
Technical field
The present invention relates to personal security's message area, more particularly to a kind of methods of exhibiting of personal security's information and dress Put.
Background technology
Nowadays with the popularization of intelligent mobile terminal equipment, increasing people carries out every business using mobile terminal Handle, such as mobile payment, personal information registration, account number cipher management, mobile phone checking etc., this is very easy to ours Life, but bring great hidden danger equally also to personal information and property safety.
Existing mobile terminal device scheme is related to personal information and wealth for such as bank validation code, identity account etc. at present Produce the important information content of safety, be not directed to different users and carry out distinguishing the measure of protection, once mobile terminal is stolen Walk, the important safety information inside mobile terminal such as identifying code, account etc. are just compromised.Therefore, use for mobile terminal The protection that owner carries out personal information security just becomes problem demanding prompt solution.
Content of the invention
The embodiment of the present invention provides a kind of methods of exhibiting of personal security's information and device, is not had with solving current mobile terminal There is the problem distinguishing protection personal security's information for different user.
According to one aspect of the present invention, there is provided a kind of methods of exhibiting of personal security's information, it is applied to mobile terminal, Methods described includes:
Detect described mobile terminal content to be presented in there is personal security's information;
Identify whether the active user of described mobile terminal is to set user;
If identifying, the active user of described mobile terminal is not to set user, hides described content to be presented.
Alternatively, described detect described mobile terminal content to be presented in there is personal security's information and include:
Detect described content to be presented comprise key word, judge described content to be presented in there is described personal security's letter Breath.
Alternatively, described key word includes at least one of identifying code, account, password, user name, the amount of money.
Alternatively, whether the described active user identifying described mobile terminal is to set user to include:
User's sign data of collection active user;
User's sign data of user's sign data of described active user and the setting user prestoring is compared.
Alternatively, described detect described mobile terminal content to be presented in there is personal security's information before, institute Method of stating also includes:
User's sign data of collection first user;
Described first user is added to described setting user, and stores corresponding user's sign data.
Alternatively, described, described first user is added to described setting user, and store corresponding user's sign number According to afterwards, methods described also includes:
Receive the instruction of the described user's sign data setting user's mandate collection second user;
Described second user is added to described setting user and stores corresponding user's sign data.
Alternatively, described user's sign packet includes at least one of iris feature, facial characteristics.
Alternatively, described hiding described inclusion content to be presented:
Do not show described content to be presented;
Or, shown described content to be presented with mess code or noise form.
According to another aspect of the present invention, there is provided a kind of exhibiting device of personal security's information, it is deployed in mobile whole End, described device includes:
Personal security's information detecting module, for detect described mobile terminal content to be presented in there is personal security Information;
Set subscriber identification module, whether the active user for identifying described mobile terminal is to set user;
Show content hidden module, if for identifying that the active user of described mobile terminal is not to set user, hiding institute State content to be presented.
Alternatively, described personal security's information detecting module, described content to be presented comprises key specifically for detecting Word, judge described content to be presented in there is described personal security's information.
Alternatively, described key word includes at least one of identifying code, account, password, user name, the amount of money.
Alternatively, described setting subscriber identification module includes:
Sign data gathers submodule, for gathering user's sign data of active user;
Data comparison sub-module, for by user's sign data of described active user and prestore setting user user Sign data is compared.
Alternatively, before described personal security's information detecting module, described device also includes:
Sign data acquisition module, user's sign data of collection first user;
First setting user's add module, for adding described first user to described setting user, and stores correspondence User's sign data.
Alternatively, after described first sets user's add module, described device also includes:
Authorized order receiver module, for receiving the described user's sign data setting user's mandate collection second user Instruction;
Second setting user's add module, for adding described second user to described setting user and storing corresponding User's sign data.
Alternatively, described user's sign packet includes at least one of iris feature, facial characteristics.
Alternatively, described displaying content hidden module includes:
Show that content hides submodule, described content to be presented for not showing;
Show content Special display submodule, described content to be presented for being shown with mess code or noise form.
According to the embodiment of the present invention, detect described mobile terminal content to be presented in whether there is personal security's information, After personal security's information is detected, whether identification active user is to set user, if active user is not to set user, Hide content to be presented.Content to be presented by hiding for non-setting user, it is to avoid the leakage of personal security's information, thus Protect personal property information and the safety of identity information.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
Brief description
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by institute in the description to the embodiment of the present invention Need use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only the present invention some enforcement Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is a kind of flow chart of the methods of exhibiting of personal security's information of one embodiment of the invention;
Fig. 2 is a kind of flow chart of the methods of exhibiting of personal security's information of another embodiment of the present invention;
Fig. 3 is a kind of block diagram of the exhibiting device of personal security's information of one embodiment of the invention;
Fig. 4 is a kind of block diagram of the exhibiting device of personal security's information of another embodiment of the present invention;
Fig. 5 is the block diagram of the mobile terminal of another embodiment of the present invention;
Fig. 6 is the structural representation of the mobile terminal of another embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation description is it is clear that described embodiment a part of embodiment that is the present invention, rather than whole embodiments.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of not making creative work Example, broadly falls into the scope of protection of the invention.
Embodiment one
A kind of methods of exhibiting of provided in an embodiment of the present invention personal security information is discussed in detail.
With reference to Fig. 1, the flow chart showing the methods of exhibiting of one of embodiment of the present invention personal security's information, application In mobile terminal, methods described includes:
Step 101, detect described mobile terminal content to be presented in there is personal security's information.
In the present embodiment, personal security's information is the content being related to personal property information and identity information, specifically can wrap Containing bank account, identification card number, password, identifying code, amount of money etc..The personal peace of content to be presented middle presence of mobile terminal is detected Full information, can carry out special handling to content to be presented, it is to avoid cause personal property information and the leakage of identity information.If Detect mobile terminal content to be presented in there is not personal security's information, then need not carry out special place to content to be presented Reason, is directly shown on the screen of the mobile terminal.
Step 102, identifies whether the active user of described mobile terminal is to set user.
In the present embodiment, set user be set in advance in the terminal can be with normal presentation personal security's information User, non-setting user is that do not preset in the terminal can be with the user of normal presentation personal security's information.In detection To mobile terminal content to be presented in exist after personal security's information, whether identification active user is to set user, personal peace Full information sets user for setting user and non-and carries out difference displaying.
Step 103, if identifying, the active user of described mobile terminal is not to set user, hides described content to be presented.
In the present embodiment, when detect mobile terminal content to be presented in there is personal security's information, and currently use User set in advance in family immobile terminal, then hide content to be presented, thus avoiding personal security to active user Information leakage is to active user.
In sum, the embodiment of the present invention by detect mobile terminal content to be presented in exist personal security letter Breath, whether identification active user is to set user, if identifying, the active user of described mobile terminal is not to set user, to current User hides content to be presented, it is to avoid the leakage of personal property information and identity information, thus protect personal property safety.
Embodiment two
With reference to Fig. 2, the flow chart showing the methods of exhibiting of one of embodiment of the present invention personal security's information.
Step 201, user's sign data of collection first user.
In the present embodiment, user's sign data is the data message from body local feature extraction, due to Different Individual it Between local feature all differ, therefore user's sign data can be used as the mark of mobile terminal identifying user.User's sign Data specifically can include being easy to iris feature, facial characteristics of mobile terminal front-end collection etc..For example, harvester primary user body When levying data, mobile terminal opens front-facing camera, and front-facing camera can gather the iris feature of first user.
Step 202, described first user is added to described setting user, and stores corresponding user's sign data.
In the present embodiment, after user's sign data of collection first user, mobile terminal adds first user to setting In user, user's sign data also is stored in the user's sign data set user.Alternatively, mobile terminal is in storage first During user's sign data of user and first user, the storage mark of prompt machine primary input user's sign data, such as by user Sign data is stored as owner.
Step 203, receives the instruction of the described user's sign data setting user's mandate collection second user.
In the present embodiment, mobile terminal not only can be to setting user's normal presentation personal security's information it is also possible to setting Determine user's normal presentation personal security's information of users to trust.To the user's normal presentation personal security's information setting users to trust Before, owner need to authorize mobile terminal to gather user's sign data of second user, and mobile terminal receives the mandate setting user After instruction, user's sign data of collection second user.For example, owner indicates that mobile terminal gathers user's sign of second user Data, mobile terminal opens front-facing camera after receiving instruction, gathers the iris feature of second user by front-facing camera.
Step 204, described second user is added to described setting user and stores corresponding user's sign data.
In the present embodiment, mobile terminal collects user's sign data of second user, subsequently by second user add to Set in user, by user's sign data storage of second user in the sign data setting user.Second user also becomes Set one of user, mobile terminal is also to second user normal presentation personal security's information.
Step 205, detect described content to be presented comprise key word, judge described content to be presented in have described People's safety information.
In the present embodiment, get content to be presented after, by detect content to be presented in whether comprise key word and sentence Disconnected content to be presented whether comprise personal security's information, key word include identifying code, account, password, user name, in the amount of money at least A kind of.For example, user receives note, detects and comprises random verification code in note, then judge that this note comprises key word, should Note is content to be presented to have personal security's information.
Step 206, user's sign data of collection active user.
In the present embodiment, detect content to be presented there is personal security's information, mobile terminal gathers the use of active user Family sign data.For example, mobile terminal detects and comprises random verification code in the note receiving, before notifying mobile terminal to open Put photographic head, gather the iris feature of active user by front-facing camera.
Step 207, user's sign data of user's sign data of described active user and the setting user prestoring is entered Row compares.
In the present embodiment, store the user's sign data setting user in mobile terminal, by the user's body of active user Levying data and compare with user's sign data of the setting user prestoring, if setting user's more than one, needing to enter one by one Row compares.For example, prestored in mobile terminal user's sign data of owner, the user's body of owner household a and b that simultaneously prestored Levy data, need user's sign data of the sign data of active user and owner, a, b is compared one by one.
In the present embodiment, whether active user is judged as setting user according to comparison result, if comparison result all differs Cause, the setting user of active user immobile terminal is described.For example, user's sign data of user c is prestored with mobile terminal Owner, a, b user's sign comparing result inconsistent, user c immobile terminal can be with normal presentation personal security The setting user of information.
Step 208, does not show described content to be presented, or, shown described content to be presented with mess code or noise form.
In the present embodiment, when mobile terminal recognizes active user and not sets user, mobile terminal needs to hide to be treated Show content, hide inclusion content to be presented do not show content to be presented, alternatively, content to be presented in a special way show treat Show content, show content to be presented such as in the form of mess code or noise.
In sum, the embodiment of the present invention detect mobile terminal content to be presented in there is personal security's information, know It is clipped to whether active user is to set user, if active user not sets user, active user is hidden content to be presented, Avoid personal property information and the leakage of identity information, thus protecting personal property safety.
It should be noted that for aforesaid embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, and the present invention is not limited by described sequence of movement, because according to According to the present invention, some steps can be carried out using other orders or simultaneously.Secondly, those skilled in the art also should know, Embodiment described in this description belongs to preferred embodiment, and involved action is not necessarily essential to the invention.
Embodiment three
A kind of exhibiting device of provided in an embodiment of the present invention personal security information is discussed in detail.
With reference to Fig. 3, show the block diagram of the exhibiting device of one of embodiment of the present invention personal security's information, be deployed in Mobile terminal 300, described device includes personal security's information detecting module 301, sets subscriber identification module 302, shows content Hidden module 303:
Personal security's information detecting module 301, the content to be presented middle presence for described mobile terminal is detected is personal Safety information;
Set subscriber identification module 302, whether the active user for identifying described mobile terminal is to set user;
Show content hidden module 303, if for identifying that the active user of described mobile terminal is not to set user, hiding Described content to be presented.
On the basis of Fig. 3, described personal security's information detecting module 301, described to be presented interior specifically for detecting Hold and comprise key word, judge described content to be presented in there is described personal security's information.
In the embodiment of the present invention, alternatively, described key word include identifying code, account, password, user name, in the amount of money extremely Few one kind.
On the basis of Fig. 3, described setting subscriber identification module 302 includes sign data collection submodule 3021, data Comparison sub-module 3022, is shown in Fig. 4:
Sign data gathers submodule 3021, for gathering user's sign data of active user;
Data comparison sub-module 3022, for by user's sign data of described active user and the setting user prestoring User's sign data is compared.
On the basis of Fig. 3, before described personal security's information detecting module 301, described device also includes sign number Set user's add module 305 according to acquisition module 304, first, see Fig. 4:
Sign data acquisition module 304, for gathering user's sign data of first user;
First setting user's add module 305, for described first user is added to described setting user, and store right The user's sign data answered.
On the basis of Fig. 3, after described first sets user's add module 305, described device also includes mandate and refers to Make receiver module 306, second set user's add module 307, see Fig. 4:
Authorized order receiver module 306, for receiving the described user's sign number setting user's mandate collection second user According to instruction;
Second setting user's add module 307, for by described second user add to described setting user and store right The user's sign data answered.
In the embodiment of the present invention, alternatively, described user's sign packet includes iris feature, at least one in facial characteristics Kind.
On the basis of Fig. 3, alternatively, described displaying content hidden module 303 includes showing that content hides submodule 3031st, show content Special display submodule 3032, see Fig. 4:
Show that content hides submodule 3031, described content to be presented for not showing;
Show content Special display submodule 3032, described content to be presented for being shown with mess code or noise form.
In sum, in the embodiment of the present invention mobile terminal by detect mobile terminal content to be presented middle presence People's safety information, whether be set user, active user is hidden content to be presented if recognizing active user, it is to avoid personal wealth Product information and the leakage of identity information, thus protect personal property safety.
Example IV
Fig. 5 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 500 shown in Fig. 5 includes: at least One processor 501, memorizer 502, at least one network interface 504 and user interface 503.Each in mobile terminal 500 Assembly is coupled by bus system 505.It is understood that the connection that bus system 505 is used for realizing between these assemblies is led to Letter.Bus system 505, in addition to including data/address bus, also includes power bus, controlling bus and status signal bus in addition.It but is For the sake of clear explanation, in Figure 5 various buses are all designated as bus system 505.
Wherein, user interface 503 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or flexible screen etc..
It is appreciated that the memorizer 502 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (read- Onlymemory, rom), programmable read only memory (programmablerom, prom), Erasable Programmable Read Only Memory EPROM (erasableprom, eprom), Electrically Erasable Read Only Memory (electricallyeprom, eeprom) or sudden strain of a muscle Deposit.Volatile memory can be random access memory (randomaccessmemory, ram), and it is used as outside slow at a high speed Deposit.By exemplary but be not restricted explanation, the ram of many forms can use, such as static RAM (staticram, sram), dynamic random access memory (dynamicram, dram), Synchronous Dynamic Random Access Memory (synchronousdram, sdram), double data speed synchronous dynamic RAM (doubledatarate Sdram, ddrsdram), enhancement mode Synchronous Dynamic Random Access Memory (enhanced sdram, esdram), synchronized links Dynamic random access memory (synchlinkdram, sldram) and direct rambus random access memory (directrambusram, drram).The memorizer 502 of the system and method for embodiment of the present invention description is intended to including but does not limit In these memorizeies with any other suitable type.
In some embodiments, memorizer 502 stores following element, executable module or data structure, or Their subset of person, or their superset: operating system 5021 and application program 5022.
Wherein, operating system 5021, comprise various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and process hardware based task.Application program 5022, comprises various application programs, such as media Player (mediaplayer), browser (browser) etc., are used for realizing various applied business.Realize embodiment of the present invention side The program of method may be embodied in application program 5022.
In embodiments of the present invention, can be by calling program or the instruction of memorizer 502 storage, specifically, application The program of storage or instruction in program 5022, processor 501 is used for the content to be presented middle presence of described mobile terminal is detected Personal security's information;Identify whether the active user of described mobile terminal is to set user;If identifying working as of described mobile terminal Front user is not to set user, hides described content to be presented.
The method that the embodiments of the present invention disclose can apply in processor 501, or is realized by processor 501. Processor 501 is probably a kind of IC chip, has the disposal ability of signal.Realize during, said method each Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 501 or software form.Above-mentioned process Device 501 can be general processor, digital signal processor (digitalsignalprocessor, dsp), special IC (applicationspecific integratedcircuit, asic), ready-made programmable gate array (fieldprogrammable gatearray, fpga) or other PLDs, discrete gate or transistor logic Device, discrete hardware components.Can realize or execute disclosed each method in the embodiment of the present invention, step and box Figure.General processor can be microprocessor or this processor can also be any conventional processor etc..In conjunction with the present invention The step of the method disclosed in embodiment can be embodied directly in hardware decoding processor execution and complete, or uses decoding processor In hardware and software module combination execution complete.Software module may be located at random access memory, and flash memory, read only memory can In the ripe storage medium in this area such as program read-only memory or electrically erasable programmable memory, depositor.This storage Medium is located at memorizer 502, and processor 501 reads the information in memorizer 502, completes the step of said method in conjunction with its hardware Suddenly.
It is understood that the embodiment of the present invention description these embodiments can with hardware, software, firmware, middleware, Microcode or a combination thereof are realizing.Hardware is realized, processing unit can be implemented in one or more special ICs (applicationspecificintegratedcircuits, asic), digital signal processor (digitalsignalprocessing, dsp), digital signal processing appts (dspdevice, dspd), programmable logic device (programmablelogicdevice, pld), field programmable gate array (field-programmablegatearray, Fpga), general processor, controller, microcontroller, microprocessor, the other electronics lists for executing herein described function In unit or a combination thereof.
Software is realized, can be come by executing the module (such as process, function etc.) of function described in the embodiment of the present invention Realize the technology described in the embodiment of the present invention.Software code is storable in memorizer and passes through computing device.Memorizer can To realize within a processor or outside processor.
Alternatively, processor 501 is additionally operable to: detect described content to be presented comprise key word, judge described to be presented There is described personal security's information in content.
Alternatively, described key word includes at least one of identifying code, account, password, user name, the amount of money.
Alternatively, processor 501 is additionally operable to: user's sign data of collection active user;Use by described active user Family sign data is compared with the user's sign data setting user prestoring.
Alternatively, processor 501 is additionally operable to: user's sign data of collection first user;Described first user is added To described setting user, and store corresponding user's sign data.
Alternatively, processor 501 is additionally operable to: receives the described user's sign data setting user's mandate collection second user Instruction;Described second user is added to described setting user and stores corresponding user's sign data.
Alternatively, described user's sign packet includes at least one of iris feature, facial characteristics.
Alternatively, processor 501 is additionally operable to: does not show described content to be presented;Or, institute is shown with mess code or noise form State content to be presented.
Mobile terminal 500 is capable of each process that in previous embodiment, mobile terminal is realized, for avoiding repeating, here Repeat no more.In the embodiment of the present invention, mobile terminal 500 is by the personal peace of content to be presented middle presence of mobile terminal is detected Full information, whether identification active user is to set user, if active user is not to set user, active user is hidden to be presented Content, it is to avoid the leakage of personal property information and identity information, thus protect personal property safety.
Embodiment five
Fig. 6 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 6 600 can be mobile phone, panel computer, personal digital assistant (personaldigital assistant, pda) or vehicle-mounted computer Deng.
Mobile terminal 600 in Fig. 6 includes radio frequency (radiofrequency, rf) circuit 610, memorizer 620, input list Unit 630, display unit 640, processor 660, voicefrequency circuit 670, wifi (wirelessfidelity) module 680 and power supply 690.
Wherein, input block 630 can be used for numeral or the character information of receiving user's input, and produces and mobile terminal 600 user setup and the relevant signal input of function control.Specifically, in the embodiment of the present invention, this input block 630 can To include contact panel 631.Contact panel 631, can collect user thereon or neighbouring touch operation (such as user uses handss The operation on contact panel 631 of any suitable object such as finger, stylus or adnexa), and driven according to formula set in advance Corresponding attachment means.Optionally, contact panel 631 may include touch detecting apparatus and two parts of touch controller.Wherein, Touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, and transmit a signal to touch control Device;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives this processor 660, and can the order sent of receiving processor 660 being executed.Furthermore, it is possible to adopt resistance-type, condenser type, infrared ray with And the polytype such as surface acoustic wave realizes contact panel 631.Except contact panel 631, input block 630 can also include other Input equipment 632, other input equipments 632 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, one or more of action bars etc..
Wherein, display unit 640 can be used for showing by the information of user input or the information and the movement that are supplied to user The various menu interfaces of terminal 600.Display unit 640 may include display floater 641, optionally, can adopt lcd or organic The forms such as optical diode (organiclight-emittingdiode, oled) are configuring display floater 641.
It should be noted that contact panel 631 can cover display floater 641, form touch display screen, when the inspection of this touch display screen Measure thereon or after neighbouring touch operation, send processor 660 to determine the type of touch event, with preprocessor 660 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.This Application Program Interface viewing area And the arrangement mode of this conventional control viewing area does not limit, can for being arranged above and below, left-right situs etc. can distinguish two and show Show the arrangement mode in area.This Application Program Interface viewing area is displayed for the interface of application program.Each interface is permissible Comprise the interface elements such as icon and/or the widget desktop control of at least one application program.This Application Program Interface viewing area It can also be the empty interface not comprising any content.This conventional control viewing area is used for showing the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 660 is the control centre of mobile terminal 600, using various interfaces and connection whole mobile phone Various pieces, by running or executing software program and/or the module being stored in first memory 621, and call storage Data in second memory 622, the various functions of execution mobile terminal 600 and processing data, thus to mobile terminal 600 Carry out integral monitoring.Optionally, processor 660 may include one or more processing units.
In embodiments of the present invention, by call store this first memory 621 in software program and/or module and/ Or the data in this second memory 622, processor 660 is used for: the content to be presented middle presence of described mobile terminal is detected Personal security's information;Identify whether the active user of described mobile terminal is to set user;If identifying working as of described mobile terminal Front user is not to set user, hides described content to be presented.
Alternatively, processor 660 is additionally operable to: detect described content to be presented comprise key word, judge described to be presented There is described personal security's information in content.
Alternatively, described key word includes at least one of identifying code, account, password, user name, the amount of money.
Alternatively, processor 660 is additionally operable to: user's sign data of collection active user;Use by described active user Family sign data is compared with the user's sign data setting user prestoring.
Alternatively, processor 660 is additionally operable to: user's sign data of collection first user;Described first user is added To described setting user, and store corresponding user's sign data.
Alternatively, processor 660 is additionally operable to: receives the described user's sign data setting user's mandate collection second user Instruction;Described second user is added to described setting user and stores corresponding user's sign data.
Alternatively, described user's sign packet includes at least one of iris feature, facial characteristics.
Alternatively, processor 660 is additionally operable to: does not show described content to be presented;Or, institute is shown with mess code or noise form State content to be presented.
It can be seen that, in the embodiment of the present invention, mobile terminal 600 is by the content to be presented middle presence of mobile terminal is detected People's safety information, whether be set user, active user is hidden content to be presented if recognizing active user, it is to avoid personal wealth Product information and the leakage of identity information, thus protect personal property safety.
For above-mentioned personal security's information displaying realize device embodiment for, because it is basic with embodiment of the method Similar, so description is fairly simple, in place of correlation, the part referring to embodiment of the method illustrates.
Each embodiment in this specification is all described by the way of going forward one by one, what each embodiment stressed be with The difference of other embodiment, between each embodiment identical similar partly mutually referring to.
Those skilled in the art will be readily apparent: the combination in any application of each embodiment above-mentioned is all feasible, therefore Combination in any between each embodiment above-mentioned is all embodiment of the present invention, but this specification exists as space is limited, This does not just detail one by one.
Provided herein the implementation of the displaying of personal security's information not with any certain computer, virtual system or Miscellaneous equipment is inherently related.Various general-purpose systems can also be used together with based on teaching in this.As described above, structure The structure made required by the system with the present invention program is obvious.Additionally, the present invention is also not for any specific volume Cheng Yuyan.It is understood that, it is possible to use various programming languages realize the content of invention described herein, and above to specific The description that language is done is the preferred forms in order to disclose the present invention.
In description mentioned herein, illustrate a large amount of details.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of not having these details.In some instances, known method, structure are not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly it will be appreciated that in order to simplify the disclosure and help understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect an intention that i.e. required guarantor The application claims of shield more features than the feature being expressly recited in each claim.More precisely, as right As claim is reflected, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool Claims of body embodiment are thus expressly incorporated in this specific embodiment, wherein each claim conduct itself The separate embodiments of the present invention.
Those skilled in the art are appreciated that and the module in the equipment in embodiment can be carried out adaptively Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list Unit or assembly be combined into a module or unit or assembly, and can be divided in addition multiple submodule or subelement or Sub-component.In addition to such feature and/or at least some of process or unit exclude each other, can adopt any Combination is to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can carry out generation by the alternative features providing identical, equivalent or similar purpose Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiment means to be in the present invention's Within the scope of and form different embodiments.For example, in detail in the claims, embodiment required for protection one of arbitrarily Can in any combination mode using.
The all parts embodiment of the present invention can be realized with hardware, or to run on one or more processor Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (dsp) are realizing the reality of the displaying of personal security's information according to embodiments of the present invention The some or all functions of some or all parts in existing scheme.The present invention is also implemented as execution institute here (for example, computer program and computer program produce for some or all equipment of method of description or program of device Product).Such program realizing the present invention can store on a computer-readable medium, or can have one or more The form of signal.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or to appoint What other forms provides.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware including some different elements and by means of properly programmed computer Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.

Claims (16)

1. a kind of methods of exhibiting of personal security's information, is applied to mobile terminal it is characterised in that methods described includes:
Detect described mobile terminal content to be presented in there is personal security's information;
Identify whether the active user of described mobile terminal is to set user;
If identifying, the active user of described mobile terminal is not to set user, hides described content to be presented.
2. methods of exhibiting according to claim 1 is it is characterised in that described detect the to be presented interior of described mobile terminal There is personal security's information in appearance to include:
Detect described content to be presented comprise key word, judge described content to be presented in there is described personal security's information.
3. method according to claim 2 is it is characterised in that described key word includes identifying code, account, password, user At least one of name, amount of money.
4. methods of exhibiting according to claim 1 is it is characterised in that the active user of the described mobile terminal of described identification is No for set user include:
User's sign data of collection active user;
User's sign data of user's sign data of described active user and the setting user prestoring is compared.
5. methods of exhibiting according to claim 4 is it is characterised in that the to be presented of described mobile terminal is detected described Before there is personal security's information in content, methods described also includes:
User's sign data of collection first user;
Described first user is added to described setting user, and stores corresponding user's sign data.
6. methods of exhibiting according to claim 5 is it is characterised in that set to described in described add described first user Determine user, and after storing corresponding user's sign data, methods described also include:
Receive the instruction of the described user's sign data setting user's mandate collection second user;
Described second user is added to described setting user and stores corresponding user's sign data.
7. the methods of exhibiting according to any one of claim 4-6 is it is characterised in that described user's sign packet includes iris At least one of feature, facial characteristics.
8. method according to claim 1 it is characterised in that described hide described inclusion content to be presented:
Do not show described content to be presented;
Or, shown described content to be presented with mess code or noise form.
9. a kind of exhibiting device of personal security's information, is deployed in mobile terminal it is characterised in that described device includes:
Personal security's information detecting module, for detect described mobile terminal content to be presented in exist personal security letter Breath;
Set subscriber identification module, whether the active user for identifying described mobile terminal is to set user;
Show content hidden module, if for identify described mobile terminal active user be not set user, hide described in treat Show content.
10. device according to claim 9 it is characterised in that
Described personal security's information detecting module, specifically for detect described content to be presented comprise key word, judge described There is described personal security's information in content to be presented.
11. devices according to claim 10 are it is characterised in that described key word includes identifying code, account, password, use At least one of name in an account book, amount of money.
12. devices according to claim 9 are it is characterised in that described setting subscriber identification module includes:
Sign data gathers submodule, for gathering user's sign data of active user;
Data comparison sub-module, for by user's sign data of described active user and prestore setting user user's sign Data is compared.
13. devices according to claim 12 it is characterised in that before described personal security's information detecting module, institute State device also to include:
Sign data acquisition module, user's sign data of collection first user;
First setting user's add module, for adding described first user to described setting user, and stores corresponding use Family sign data.
14. devices according to claim 13 it is characterised in that described first set user's add module after, institute State device also to include:
Authorized order receiver module, for receiving the finger of the described user's sign data setting user's mandate collection second user Order;
Second setting user's add module, for adding described second user to described setting user and storing corresponding user Sign data.
15. devices according to claim 12-14 are it is characterised in that described user's sign packet includes iris feature, face At least one of portion's feature.
16. devices according to claim 9 are it is characterised in that described displaying content hidden module includes:
Show that content hides submodule, described content to be presented for not showing;
Show content Special display submodule, described content to be presented for being shown with mess code or noise form.
CN201610798908.0A 2016-08-31 2016-08-31 Individual security information displaying method and device Pending CN106355068A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610798908.0A CN106355068A (en) 2016-08-31 2016-08-31 Individual security information displaying method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610798908.0A CN106355068A (en) 2016-08-31 2016-08-31 Individual security information displaying method and device

Publications (1)

Publication Number Publication Date
CN106355068A true CN106355068A (en) 2017-01-25

Family

ID=57858816

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610798908.0A Pending CN106355068A (en) 2016-08-31 2016-08-31 Individual security information displaying method and device

Country Status (1)

Country Link
CN (1) CN106355068A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107748848A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN107798230A (en) * 2017-10-24 2018-03-13 广东欧珀移动通信有限公司 Terminal control method, device, terminal and computer-readable recording medium
CN109858274A (en) * 2018-12-04 2019-06-07 上海碳蓝网络科技有限公司 The method and apparatus that message is shown

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880560A (en) * 2011-07-11 2013-01-16 三星电子(中国)研发中心 User privacy data protection method and mobile terminal using user privacy data protection method
CN103677638A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for processing private documents
CN104077517A (en) * 2014-06-30 2014-10-01 惠州Tcl移动通信有限公司 Mobile terminal user mode start method and system based on iris identification
CN104268455A (en) * 2014-10-13 2015-01-07 深圳市中兴移动通信有限公司 Mobile terminal, and information protection method and device thereof
CN104615920A (en) * 2014-12-30 2015-05-13 小米科技有限责任公司 Notification message display method and device
CN104657643A (en) * 2015-03-13 2015-05-27 广东欧珀移动通信有限公司 Privacy protection method, wearable device and mobile terminal
CN105426745A (en) * 2015-10-28 2016-03-23 小米科技有限责任公司 Information display method and apparatus
CN105678180A (en) * 2015-11-30 2016-06-15 上海闻泰电子科技有限公司 Privacy protection system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880560A (en) * 2011-07-11 2013-01-16 三星电子(中国)研发中心 User privacy data protection method and mobile terminal using user privacy data protection method
CN103677638A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for processing private documents
CN104077517A (en) * 2014-06-30 2014-10-01 惠州Tcl移动通信有限公司 Mobile terminal user mode start method and system based on iris identification
CN104268455A (en) * 2014-10-13 2015-01-07 深圳市中兴移动通信有限公司 Mobile terminal, and information protection method and device thereof
CN104615920A (en) * 2014-12-30 2015-05-13 小米科技有限责任公司 Notification message display method and device
CN104657643A (en) * 2015-03-13 2015-05-27 广东欧珀移动通信有限公司 Privacy protection method, wearable device and mobile terminal
CN105426745A (en) * 2015-10-28 2016-03-23 小米科技有限责任公司 Information display method and apparatus
CN105678180A (en) * 2015-11-30 2016-06-15 上海闻泰电子科技有限公司 Privacy protection system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107748848A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN107798230A (en) * 2017-10-24 2018-03-13 广东欧珀移动通信有限公司 Terminal control method, device, terminal and computer-readable recording medium
CN107798230B (en) * 2017-10-24 2020-04-17 Oppo广东移动通信有限公司 Terminal control method, device, terminal and computer readable storage medium
CN109858274A (en) * 2018-12-04 2019-06-07 上海碳蓝网络科技有限公司 The method and apparatus that message is shown

Similar Documents

Publication Publication Date Title
CN106126077A (en) A kind of application program image target display control method and mobile terminal
CN106326710A (en) Method for rapidly starting payment interface and mobile terminal
CN106503555A (en) A kind of method for ensureing safety of payment and mobile terminal
CN105975144A (en) Information processing method and apparatus
CN107329688A (en) A kind of fingerprint collecting method and terminal
CN106650367A (en) Private content display method and mobile terminal
CN106127003A (en) A kind of fingerprint recognition unlocking method and mobile terminal
CN107798228A (en) A kind of face identification method and mobile terminal
CN105956431A (en) Application protection processing method and mobile terminal
CN105868617A (en) Application encryption method and mobile terminal
CN106484301A (en) A kind of method of hiden application and terminal
CN106991306B (en) A kind of method and mobile terminal inputting password
CN106355068A (en) Individual security information displaying method and device
CN106779722A (en) The method of payment and mobile terminal of a kind of mobile terminal
CN106569662A (en) Display method of application interface and mobile terminal
CN106228085A (en) The method for secret protection of application program and mobile terminal
CN106250757A (en) The control method of a kind of application program and mobile terminal
CN106156600A (en) The unlocking method of a kind of application program and mobile terminal
CN106446614A (en) Permission management method of application program, and mobile terminal
CN106709320A (en) Identity authentication method and mobile terminal
CN106503554A (en) A kind of method of safety detection and mobile terminal
CN106529943A (en) Method of guaranteeing payment security and mobile terminal
CN106775421A (en) Method and mobile terminal that a kind of sectional drawing interface is recovered
CN106529262A (en) Data protection method for mobile terminal and mobile terminal
CN106445294A (en) Control method of application program and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170125