disclosure of Invention
in view of the above problems, the present invention provides a method and an apparatus for limiting screenshot, which implement the function of limiting screenshot in a specific software, reduce the memory usage, and ensure that sensitive information is not stolen.
in a first aspect, the present invention provides a method for limiting screenshot, including the following steps:
receiving a request instruction for limiting screenshot of a dialog message interface initiated by any party terminal in a dialog;
and responding to the request instruction for limiting screenshot, applying for the permission of the exclusive screenshot module to a background system, and controlling the screenshot module to prohibit other programs from intercepting the current session message interface after confirming that the permission is obtained. When any user initiates a request for limiting screenshot to the receiving end, the local machine executes a command related to the limiting screenshot, and controls any program screenshot by obtaining the authority of the screenshot module, so that the purpose of limiting screenshot is achieved.
With reference to the first aspect, in a first embodiment of the first aspect, after confirming that the right is obtained, the method further includes:
And covering the conversation message interface with a preset picture. In this embodiment, when the dialog message interface is covered with a preset picture, even if some malicious programs obtain the screenshot authority of the screenshot module, the obtained screenshot is also the preset picture, not the real dialog message interface.
with reference to the first embodiment of the first aspect, in a second embodiment of the first aspect, the method further includes:
when detecting that other programs are to capture the screen of the dialogue message interface through the screen capture module, calling a local interactive function interface to provide a window for a user to input an authorized schematic message;
Acquiring an authorization indicating message input by a user in the window, and sending the authorization indicating message to an initiating terminal;
And removing the preset picture covered on the conversation message interface after the authorization confirmation message of the initiating terminal is acquired. In this embodiment, when it is detected that another program intends to perform screenshot on the dialog message interface through the screenshot module, a window for inputting an authorization schematic message is provided for a user, so that a decryption method is provided for the user who wants to acquire the screenshot of the dialog message interface, and the native computer removes a preset picture covered on the dialog message interface under the condition that an initiator agrees.
with reference to the second embodiment of the first aspect, in a third embodiment of the first aspect, when another program acquires a screenshot file of the dialog message interface through the screenshot module, a time stamp is added to the screenshot file. In this embodiment, the time stamp is added to the screenshot file to keep evidence and protect the user's rights.
With reference to the third embodiment of the first aspect, in a fourth embodiment of the first aspect, the method further includes:
and noting account information of the initiating terminal and the local machine on the screen capture file. And account information is added to the screen capture file, so that further confidentiality is facilitated.
With reference to the first embodiment of the first aspect, in a fifth embodiment of the first aspect, the preset picture includes any one of a mosaic picture, a black picture, and a blank picture.
With reference to the first embodiment to the fifth embodiment of the first aspect, in a sixth embodiment of the first aspect, the method further includes:
And when a request instruction for limiting the screenshot initiated by the initiating terminal is received, prohibiting displaying the account information of the initiating terminal. In this embodiment, prohibiting displaying the account information of the originating terminal helps to further protect the benefit of the originating terminal.
with reference to the first embodiment to the fifth embodiment of the first aspect, in a seventh embodiment of the first aspect, the method further includes:
when a request instruction for limiting screenshot initiated by an initiating terminal is received, a temporary number corresponding to the initiating terminal is displayed. In this embodiment, even if other malicious programs obtain the screenshot authority of the screenshot module by some means, the account information obtained in the obtained screenshot is also false, so that the benefit of the user can be further protected by using the method.
with reference to the first embodiment to the fifth embodiment of the first aspect, in an eighth embodiment of the first aspect, the method further includes:
The initiating terminal and the local machine adopt 4G or WiFi networks in the communication process.
With reference to the first embodiment to the fifth embodiment of the first aspect, in a ninth embodiment of the first aspect, the method further includes:
and after the permission is confirmed to be obtained, a reminding message pops up on the desktop to prompt the user. The user can master the current condition of the limited screenshot in a message reminding mode.
with reference to the first embodiment to the fifth embodiment of the first aspect, in a tenth embodiment of the first aspect, the method further includes:
The account number of the initiating terminal corresponds to the mobile phone number of the SIM card of the initiating terminal;
the local account number corresponds to the mobile phone number of the local SIM card.
In a second aspect, an embodiment of the present invention provides a restricted screenshot device, where the restricted screenshot device has a function of implementing a behavior of the restricted screenshot method in the first aspect. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software comprises one or more modules corresponding to the functions, and the limiting screenshot device comprises the following units:
The receiving unit is used for receiving a request instruction for limiting screenshot of a dialogue message interface initiated by any party terminal in a dialogue;
And the limiting unit is used for responding to the request instruction for limiting screenshot, applying the permission for monopolizing the screenshot module to a background system, and controlling the screenshot module to prohibit other programs from intercepting the current conversation message interface after confirming that the permission is obtained.
in this embodiment, when any user initiates a request for limiting screenshot to the receiving end, the local computer executes a command related to limiting screenshot, and controls any program screenshot by obtaining the authority of the screenshot module, thereby achieving the purpose of limiting screenshot.
with reference to the second aspect, in a first embodiment of the second aspect, after confirming that the right is obtained, the method further includes:
And covering the conversation message interface with a preset picture. In this embodiment, when the dialog message interface is covered with a preset picture, even if some malicious programs obtain the screenshot authority of the screenshot module, the obtained screenshot is also the preset picture, not the real dialog message interface.
With reference to the first embodiment of the second aspect, in a second embodiment of the second aspect, the method further includes:
The detection unit is used for calling the local interactive function interface to provide a window for a user to input an authorized schematic message when detecting that other programs are to perform screenshot on the conversation message interface through the screenshot module;
The acquisition unit is used for acquiring the authorization indicating message input by the user in the window and sending the authorization indicating message to the initiating terminal;
And the removing unit is used for removing the preset picture covered on the conversation message interface after the authorization confirmation message of the initiating terminal is acquired.
in this embodiment, when the detection module detects that another program intends to capture a screenshot of the dialog message interface through the screenshot module, a window for inputting an authorization instruction message is provided for a user, so as to provide a decryption method for the user who wants to obtain the screenshot of the dialog message interface.
with reference to the second embodiment of the second aspect, in a third embodiment of the second aspect, when another program acquires a screenshot file of the dialog message interface through the screenshot module, a time stamp is added to the screenshot file. In this embodiment, the time stamp is added to the screenshot file to keep evidence and protect the user's rights.
with reference to the third embodiment of the second aspect, in a fourth embodiment of the second aspect, the method further includes:
And noting account information of the initiating terminal and the local machine on the screen capture file.
With reference to the first embodiment of the second aspect, in a fifth embodiment of the second aspect, the preset picture includes any one of a mosaic picture, a black picture, and a blank picture.
With reference to the first embodiment and the fifth embodiment of the second aspect, in a sixth embodiment of the second aspect, the method further includes:
and when a request instruction for limiting the screenshot initiated by the initiating terminal is received, prohibiting displaying the account information of the initiating terminal. In this embodiment, prohibiting displaying the account information of the originating terminal helps to further protect the benefit of the originating terminal.
with reference to the first embodiment and the fifth embodiment of the second aspect, in a seventh embodiment of the second aspect, the method further includes:
When a request instruction for limiting screenshot initiated by an initiating terminal is received, a temporary number corresponding to the initiating terminal is displayed. In this embodiment, even if other malicious programs obtain the screenshot authority of the screenshot module by some means, the account information obtained in the obtained screenshot is also false, so that the benefit of the user can be further protected by using the method.
With reference to the first embodiment and the fifth embodiment of the second aspect, in an eighth embodiment of the second aspect, the method further includes:
The initiating terminal and the local machine adopt 4G or WiFi networks in the communication process.
With reference to the first embodiment and the fifth embodiment of the second aspect, in a ninth embodiment of the second aspect, the method further includes:
and after the permission is confirmed to be obtained, a reminding message pops up on the desktop to prompt the user. The user can master the current condition of the limited screenshot in a message reminding mode.
With reference to the first embodiment and the fifth embodiment of the second aspect, in a tenth embodiment of the second aspect, the method further includes:
The account number of the initiating terminal corresponds to the mobile phone number of the SIM card of the initiating terminal;
The local account number corresponds to the mobile phone number of the local SIM card.
in one possible design, the structure of the restriction screenshot device includes a processor and a memory, the memory is used for storing a program for supporting the transceiver device to execute the method, and the processor is configured to execute the program stored in the memory. The device for limiting screenshot can further comprise a communication interface used for limiting the screenshot device to communicate with other equipment or a communication network.
In a third aspect, an embodiment of the present invention provides a portable and movable terminal, including:
The touch-sensitive display is used for sensing an operation instruction and displaying a corresponding interface according to the instruction;
the memorizer, is used for storing and supporting the transceiver to carry out the above-mentioned procedure which limits the screenshot;
the communication interface is used for communicating the limiting screenshot device with other equipment or a communication network;
one or more processors for executing programs stored in the memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of restricting screen shots.
in a fourth aspect, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for the limited screenshot device, which includes a program for executing the program designed for the limited screenshot device in the above aspect.
Compared with the prior art, the scheme provided by the invention can limit the receiver from screenshot on the dialogue message interfaces of the two parties in the network dialogue. A user uses terminal equipment to initiate an instruction for limiting screenshot in a conversation process, when a receiving terminal receives the instruction for limiting the screenshot, the receiving terminal applies for the use permission of a screenshot module to a background, so that call recording is limited on the premise of controlling the permission of the screenshot module, and other programs cannot intercept a current conversation message interface by calling the screenshot module in the process of limiting the screenshot. In addition, in the invention, the preset picture is adopted to cover the current dialog message interface, even if other malicious programs acquire the screenshot authority of the screenshot module by some means, the acquired screenshot is the screenshot covered by the preset picture, thereby protecting the dialog message interface of the user from malicious screenshot to the maximum extent and maintaining the benefits of the user.
These and other aspects of the invention are apparent from and will be elucidated with reference to the embodiments described hereinafter.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention.
In some of the flows described in the present specification and claims and in the above figures, a number of operations are included that occur in a particular order, but it should be clearly understood that these operations may be performed out of order or in parallel as they occur herein, with the order of the operations being indicated as 101, 102, etc. merely to distinguish between the various operations, and the order of the operations by themselves does not represent any order of performance. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first", "second", etc. in this document are used for distinguishing different messages, devices, modules, etc., and do not represent a sequential order, nor limit the types of "first" and "second" to be different.
The inventor notices that the existing network telephone has great potential safety hazard in online chatting, compared with the traditional conversation mode, the network conversation encryption measure is deficient, the conversation content is easy to monitor, and the chat record in conversation is also easy to intercept as evidence, so that a network conversation mode with safe communication is urgently needed, and the screenshot function can be limited.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
the terms referred to in the present invention are explained below:
An interactive function interface: in the present invention, the interactive function interface refers to an interface for controlling a relevant human-computer interaction part, such as interface display, key control, and the like.
a screenshot module: for convenience of description, the terminal is provided with a function module with a screenshot function, namely a screenshot module, and the screenshot module has the screenshot function. For example, in the Android java layer, a person skilled in the art can control the screenshot by calling a native function, that is, obtain the authority of the screenshot module.
time cutting: a time stamp is a sequence of characters that uniquely identifies a time of a moment. The method and the device are used for marking the time of generating the screenshot.
account information: in the invention, the call is established on the basis of the network call, different users in the network call application program have different account information for distinguishing the identities of the different users, and the account information not only can verify the identity of the user, but also can be used as a part of an encryption key in an encryption algorithm.
mobile phone number of SIM card: when the mobile terminal in the call has the functions of both the network telephone and the ordinary telephone, the mobile terminal contains an SIM card, and the SIM card records the mobile phone number of the mobile terminal, namely the mobile phone number of the SIM card.
with the development of network technology, network chat becomes a new fashion, and people can send voice, text, video, pictures and the like through chat software, but with the accompanying problem of network security, as shown in fig. 1, two parties of a communication session are connected through the internet or other IP networks, then a source end 2000 transmits acquired signals such as graphics and texts and the like to the network through digital processing, compression coding and packaging, and the like, and the signals are processed through a network background server 1000, and a receiving end 2000 decompresses compression coding to restore the digital signals into graphics and texts for playing. The current network telephone and network chat are gradually mature and can be packaged in the same application program, and under the communication mode, not only can characters be input, but also voice, video and the like can be sent.
in a terminal system, for example, in an Android system, a screenshot is implemented by calling a specific screenshot function, for example, a DDMS performs screenshot by calling a framebuffer service provided by adbd (ADBdaemon) on a device side through adb, in a low-version Android system, a framebuffer service performs screenshot by directly reading a framebuffer device, and in a high-version Android system, a screenshot tool, screen, is called by the framebuffer service.
The screencap is a native self-contained tool of Android, is a C-write executable file, can be found on/system/bin/below the device, and can be stored as a PNG format file or an RGBRAW file stored in a local folder after being screenshot. The source code of the screen is in frame/base/cmss/screen, which realizes the screen capture function by calling a screen capture interface, provided by SurfaceFlinger, wherein the source code of SurfaceFlinger is in frame/native/gui/SurfaceCompletionClient cpp, the screen capture Client realizes the screen capture function by inter-process communication, and the source code of SurfaceFlinger realizes the function SurfaceFlinger:: captureSCCREN in frame/native/service/surfefinger/SurfaceFlinger. Among various screen capture methods, the mode of reading the frame buffer device may not capture some pictures on some devices using hardware overlay display, but the screen capture interface provided by the surfefinger can perfectly capture any screen picture, so that the screen capture method is relatively the most normal and perfect screen capture method on Android. Other programs also implement screenshots by calling screen. It can be said that almost any program needs to call a specific screenshot module to implement the screenshot. The invention modularly limits the screenshot function to be a screenshot module.
A first embodiment of the present invention provides a method for limiting screenshot, including the following steps:
s101, receiving a request instruction for limiting screenshot of a dialogue message interface initiated by any one terminal in a dialogue. In general, the invention is based on the chat conversation on the network, the user can set the limited screenshot at any time, when the user initiates the request instruction of the limited screenshot from the terminal initiating the limited screenshot, the initiating terminal sends the request instruction to the local, the local will recognize the request instruction of the limited screenshot and execute the subsequent operation.
S102, responding to the request instruction for limiting screenshot, applying for the permission of monopolizing the screenshot module to a background system, and after confirming that the permission is obtained, controlling the screenshot module to prohibit other programs from intercepting the current conversation message interface. In the embodiment of the invention, when the local computer receives a request instruction for limiting screenshot, the local computer applies for the permission of the exclusive screenshot module to the background system at first, and controls the module not to be called by other programs so as to prevent other programs from screenshot the call content. Those skilled in the art can understand that any screenshot operation is realized through some fixed functions in the system, and the screenshot function of the screenshot module can be controlled not to be called only by acquiring the authority of using the screenshot module. When any user initiates a request for limiting screenshot to the receiving end, the local machine executes a command related to the limiting screenshot, and controls any program screenshot by obtaining the authority of the screenshot module, so that the purpose of limiting screenshot is achieved.
Further, after confirming that the right is obtained, the method further comprises the following steps:
And covering the conversation message interface with a preset picture. In this embodiment, a preset picture is covered on the dialog message interface, the size and the type of the preset picture are not limited as long as the preset picture can cover the current dialog message interface, and when the dialog message interface is covered by the preset picture, even if some malicious programs obtain the screenshot authority of the screenshot module, the obtained screenshot is also the preset picture, not the real dialog message interface.
In an embodiment of the present invention, the step of covering the dialog message interface with the preset picture includes the following steps:
s201, when detecting that other programs are to capture the screen of the dialogue message interface through the screen capture module, calling a local interactive function interface to provide a window for a user to input an authorization schematic message. In this embodiment, under the condition that the permission for limiting the screenshot function has been obtained, when it is found that another program calls the screenshot module through some function, it indicates that another program wants to screenshot an interface through the screenshot module, and at this time, the local computer calls the local computer interactive function interface to provide a window for the user to input an authorized instruction message. For example, call a native inter-function interface, display a window on the native display screen, and prompt in the window whether to send a request.
S202, obtaining the authorization indicating message input by the user in the window, and sending the authorization indicating message to the initiating terminal. In this embodiment, after the user inputs the authorization indication message, the local computer sends the authorization indication message to the initiating terminal, so as to remove the picture covered on the dialog message interface under the condition of obtaining the approval of the user initiating the restriction screenshot.
and S203, removing the preset picture covered on the conversation message interface after the authorization confirmation message of the initiating terminal is acquired. And when the user initiating the restriction screenshot inputs an authorization confirmation message, the local computer receives the authorization message and removes the preset picture covered on the conversation message interface. In this embodiment, when it is detected that another program intends to perform screenshot on the dialog message interface through the screenshot module, a window for inputting an authorization schematic message is provided for a user, so that a decryption method is provided for the user who wants to acquire the screenshot of the dialog message interface, and the native computer removes a preset picture covered on the dialog message interface under the condition that an initiator agrees.
Preferably, when other programs acquire the screen capture file of the dialog message interface through the screen capture module, the screen capture file is added with a time capture. Time truncated refers to a sequence of characters that uniquely identifies a moment in time. In this embodiment, the time stamp is added to the screenshot file to keep evidence and protect the user's rights.
further, account information of the initiating terminal and the local computer is noted on the screen capture file. And account information is added to the screen capture file, so that further confidentiality is facilitated.
Further, the preset picture comprises any one of a mosaic picture, a black picture and a blank picture. In this embodiment, the preset picture may be a picture preset by the system, or may be set by the user.
in one embodiment of the invention, when a request instruction for limiting screenshot initiated by an initiating terminal is received, the account information of the initiating terminal is prohibited from being displayed. The account information of the originating terminal is prohibited from being displayed, that is, the account information of the originating terminal is hidden during a conversation.
In another embodiment of the present invention, when a request instruction for restricting screen shots initiated by an originating terminal is received, a temporary number corresponding to the originating terminal is displayed. In this embodiment, even if other malicious programs obtain the screenshot authority of the screenshot module by some means, the account information obtained in the obtained screenshot is also false, so that the benefit of the user can be further protected by using the method.
Preferably, the initiating terminal and the local terminal adopt 4G or WiFi networks in the conversation process. In one embodiment of the present invention, the session is based on the internet or other IP network, preferably a 4G or WiFi network is used in the present invention.
In one embodiment of the invention, after confirming that the authority is obtained, a reminding message pops up on the desktop to prompt the user. The user can master the current condition of the limited screenshot in a message reminding mode.
preferably, the account number of the initiating terminal corresponds to the mobile phone number of the SIM card of the initiating terminal; the local account number corresponds to the mobile phone number of the local SIM card.
in a second embodiment of the present invention, an embodiment of the present invention provides a limited screenshot device, where the limited screenshot device has a function of implementing a behavior of the limited screenshot method in the first embodiment. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software comprises one or more modules corresponding to the functions, and the limiting screenshot device comprises the following units:
The receiving unit 101 is configured to receive a request instruction for limiting screenshot of a dialog message interface, where the request instruction is initiated by any one terminal in a dialog. Generally, the invention is based on the online chat conversation, the user can set the limited screenshot at any time, when the user initiates the request instruction of the limited screenshot from the terminal initiating the limited screenshot, the initiating terminal sends the request instruction to the local, the receiving unit 101 receives the request instruction of the limited screenshot and identifies the request instruction of the limited screenshot to execute the subsequent operation.
and the limiting unit 102 is configured to apply an authority to monopolize the screenshot module to a background system in response to the request instruction for limiting screenshot, and after the authority is confirmed to be obtained, control the screenshot module to prohibit other programs from intercepting the current session message interface. In the embodiment of the present invention, when the receiving module 101 receives a request instruction for limiting screenshot, the limiting unit 102 will first apply for the background system for monopolizing the permission of the screenshot module, and control the module not to be called by other programs, so as to prevent other programs from screenshot the call content. Those skilled in the art can understand that any screenshot operation is realized through some fixed functions in the system, and the screenshot function of the screenshot module can be controlled not to be called only by acquiring the authority of using the screenshot module. When any user initiates a request for limiting screenshot to the receiving end, the limiting module 102 executes a command related to limiting screenshot, and controls any program screenshot by obtaining the authority of the screenshot module, so that the purpose of limiting screenshot is achieved.
Further, in an embodiment of the present invention, the dialog message interface is overlaid with a preset picture. In this embodiment, a preset picture is covered on the dialog message interface, in this embodiment, the size of the preset picture is not limited as long as it can cover the current dialog message interface, and when the dialog message interface is covered by the preset picture, even if some malicious program obtains the screenshot authority of the screenshot module, the obtained screenshot is also the preset picture, not the real dialog message interface.
in one embodiment of the present invention, the following units are further included:
the detecting unit 201 is configured to, when it is detected that another program intends to perform screenshot on the dialog message interface through the screenshot module, call the native interactive function interface to provide a window for a user to input an authorization gesture message. In this embodiment, under the condition that the detection unit 201 has obtained the permission to limit the screenshot function, when it is found that another program calls the screenshot module through some function, it indicates that another program wants to screenshot an interface through the screenshot module, and at this time, the local computer calls the local computer interaction function interface to provide a window for the user to input an authorization instruction message. For example, call a native inter-function interface, display a window on the native display screen, and prompt in the window whether to send a request.
an obtaining unit 202, configured to obtain an authorization indication message input in the window by the user, and send the authorization indication message to the initiating terminal. In this embodiment, after the user inputs the authorization indication message, the obtaining unit 202 obtains the authorization indication message input by the user in the window, and the local computer sends the authorization indication message to the initiating terminal, so as to remove the picture covered on the dialog message interface when obtaining the approval of the user initiating the restriction screenshot.
A removing unit 203, configured to remove the preset picture covered on the dialog message interface after the authorization confirmation message of the initiating terminal is acquired. When the user who initiates the restriction screenshot inputs an authorization confirmation message, the local computer receives the authorization message, and the removing unit 203 removes the preset picture covered on the dialog message interface. In this embodiment, when it is detected that another program intends to perform screenshot on the dialog message interface through the screenshot module, a window for inputting an authorization schematic message is provided for a user, so that a decryption method is provided for the user who wants to acquire the screenshot of the dialog message interface, and the native computer removes a preset picture covered on the dialog message interface under the condition that an initiator agrees.
Further, when other programs acquire the screen capture file of the conversation message interface through the screen capture module, time capture is added to the screen capture file. In this embodiment, the time stamp is a sequence of characters that uniquely identifies a time of a certain moment. In this embodiment, the time stamp is added to the screenshot file to keep evidence and protect the user's rights.
In one embodiment of the invention, account information of the initiating terminal and the local machine is noted on the screen capture file. And account information is added to the screen capture file, so that further confidentiality is facilitated.
further, the preset picture comprises any one of a mosaic picture, a black picture and a blank picture. In this embodiment, the preset picture may be a picture preset by the system, or may be set by the user.
Further, when a request instruction for limiting the screenshot initiated by the initiating terminal is received, the account information of the initiating terminal is prohibited from being displayed. The account information of the originating terminal is prohibited from being displayed, that is, the account information of the originating terminal is hidden during a conversation.
preferably, when a request instruction for restricting screen capture initiated by an originating terminal is received, a temporary number corresponding to the originating terminal is displayed. In this embodiment, even if other malicious programs obtain the screenshot authority of the screenshot module by some means, the account information obtained in the obtained screenshot is also false, so that the benefit of the user can be further protected by using the method.
preferably, the initiating terminal and the local terminal adopt 4G or WiFi networks in the conversation process. The initiating terminal and the local terminal adopt 4G or WiFi networks in the conversation process, in one embodiment of the invention, the conversation is established on the basis of the Internet or other IP networks, and preferably, the 4G or WiFi networks are adopted in the invention.
Further, after the permission is confirmed to be obtained, a reminding message pops up on the desktop to prompt the user. The user can master the current condition of the limited screenshot in a message reminding mode.
In an embodiment of the present invention, the account number of the initiating terminal corresponds to the mobile phone number of the SIM card of the initiating terminal; the local account number corresponds to the mobile phone number of the local SIM card.
Further, the structure of the screenshot limiting device comprises a processor and a memory, wherein the memory is used for storing a program for supporting the transceiver device to execute the method, and the processor is configured to execute the program stored in the memory. The device for limiting screenshot can further comprise a communication interface used for limiting the screenshot device to communicate with other equipment or a communication network.
fig. 6 is a diagram showing only a portion related to an embodiment of the present invention for convenience of description, and please refer to the method portion of the embodiment of the present invention for details that are not disclosed. The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, etc., taking the terminal as the mobile phone as an example:
Fig. 6 is a block diagram illustrating a partial structure of a mobile phone related to a terminal provided in an embodiment of the present invention. Referring to fig. 6, the handset includes: radio Frequency (RF) circuit 610, memory 620, input unit 630, display unit 640, sensor 650, audio circuit 660, wireless fidelity (WiFi) module 670, processor 680, and power supply 690. Those skilled in the art will appreciate that the handset configuration shown in fig. 6 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 6:
The RF circuit 610 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 680; in addition, the data for designing uplink is transmitted to the base station. In general, the RF circuit 610 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 610 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to global system for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
the memory 620 may be used to store software programs and modules, and the processor 680 may execute various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 620. The memory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 620 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
the input unit 630 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 630 may include a touch panel 631 and other input devices 632. The touch panel 631, also referred to as a touch screen, may collect touch operations of a user (e.g., operations of the user on the touch panel 631 or near the touch panel 631 by using any suitable object or accessory such as a finger or a stylus) thereon or nearby, and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 631 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 680, and can receive and execute commands sent by the processor 680. In addition, the touch panel 631 may be implemented using various types, such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 630 may include other input devices 632 in addition to the touch panel 631. In particular, other input devices 632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 640 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The display unit 640 may include a display panel 641, and optionally, the display panel 641 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 631 can cover the display panel 641, and when the touch panel 631 detects a touch operation thereon or nearby, the touch panel is transmitted to the processor 680 to determine the type of the touch event, and then the processor 680 provides a corresponding visual output on the display panel 641 according to the type of the touch event. Although in fig. 6, the touch panel 631 and the display panel 641 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 631 and the display panel 641 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 650, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 641 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 641 and/or the backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuit 660, speaker 661, microphone 662 can provide an audio interface between a user and a cell phone. The audio circuit 660 may transmit the electrical signal converted from the received audio data to the speaker 661, and convert the electrical signal into an audio signal through the speaker 661 for output; on the other hand, the microphone 662 converts the collected sound signals into electrical signals, which are received by the audio circuit 660 and converted into audio data, which are processed by the audio data output processor 680 and then transmitted via the RF circuit 610 to, for example, another cellular phone, or output to the memory 620 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 670, and provides wireless broadband Internet access for the user. Although fig. 6 shows the WiFi module 670, it is understood that it does not belong to the essential constitution of the handset, and can be omitted entirely as needed within the scope not changing the essence of the invention.
the processor 680 is a control center of the mobile phone, and connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 620 and calling data stored in the memory 620, thereby performing overall monitoring of the mobile phone. Optionally, processor 680 may include one or more processing units; preferably, the processor 680 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 680.
the handset also includes a power supply 690 (e.g., a battery) for powering the various components, which may preferably be logically connected to the processor 680 via a power management system, such that the power management system may be used to manage charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In the embodiment of the present invention, the processor 680 included in the terminal further has the following functions:
Receiving a request instruction for limiting screenshot of a dialog message interface initiated by any party terminal in a dialog;
And responding to the request instruction for limiting screenshot, applying for the permission of the exclusive screenshot module to a background system, and controlling the screenshot module to prohibit other programs from intercepting the current session message interface after confirming that the permission is obtained.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
in the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
in addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic or optical disk, or the like.
It will be understood by those skilled in the art that all or part of the steps in the method for implementing the above embodiments may be implemented by hardware that is instructed to implement by a program, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
in summary, the technical solution of the present invention is as follows:
a1, a method for limiting screenshot, comprising the following steps:
Receiving a request instruction for limiting screenshot of a dialog message interface initiated by any party terminal in a dialog;
And responding to the request instruction for limiting screenshot, applying for the permission of the exclusive screenshot module to a background system, and controlling the screenshot module to prohibit other programs from intercepting the current session message interface after confirming that the permission is obtained.
A2, the method for limiting screenshot according to claim A1, further comprising, after confirming that the right is taken:
And covering the conversation message interface with a preset picture.
A3, the method for limiting screen shots of claim a2, further comprising:
When detecting that other programs are to capture the screen of the dialogue message interface through the screen capture module, calling a local interactive function interface to provide a window for a user to input an authorized schematic message;
Acquiring an authorization indicating message input by a user in the window, and sending the authorization indicating message to an initiating terminal;
and removing the preset picture covered on the conversation message interface after the authorization confirmation message of the initiating terminal is acquired.
A4, the method for limiting screen shots according to the claim A3, when other programs obtain the screen shot file of the dialogue information interface through the screen shot module, the screen shot file is filled with time shots.
A5, the method for limiting screen shots of claim a4, further comprising:
And noting account information of the initiating terminal and the local machine on the screen capture file.
a6, the method for limiting screen shots according to the claim A2, wherein the preset pictures comprise any one of mosaic pictures, black pictures and blank pictures.
A7, the method for limiting screenshots according to any one of claims a1 to a5, further comprising:
and when a request instruction for limiting the screenshot initiated by the initiating terminal is received, prohibiting displaying the account information of the initiating terminal.
a8, the method for limiting screenshots according to any one of claims a1 to a5, further comprising:
When a request instruction for limiting screenshot initiated by an initiating terminal is received, a temporary number corresponding to the initiating terminal is displayed.
A9, the method for limiting screenshots according to any one of claims a1 to a5, further comprising:
the initiating terminal and the local machine adopt 4G or WiFi networks in the communication process.
A10, the method for limiting screenshots according to any one of claims a1 to a5, further comprising:
And after the permission is confirmed to be obtained, a reminding message pops up on the desktop to prompt the user.
A11, the method for limiting screenshots according to any one of claims a1 to a5, further comprising:
the account number of the initiating terminal corresponds to the mobile phone number of the SIM card of the initiating terminal;
The local account number corresponds to the mobile phone number of the local SIM card.
B12, a restriction screenshot device, comprising the following units:
The receiving unit is used for receiving a request instruction for limiting screenshot of a dialogue message interface initiated by any party terminal in a dialogue;
and the limiting unit is used for responding to the request instruction for limiting screenshot, applying the permission for monopolizing the screenshot module to a background system, and controlling the screenshot module to prohibit other programs from intercepting the current conversation message interface after confirming that the permission is obtained.
B13, the device for limiting screenshot according to claim B12, further comprising after confirming that said right is taken:
and covering the conversation message interface with a preset picture.
b14, the device for limiting screen shots according to claim B13, further comprising:
The detection unit is used for calling the local interactive function interface to provide a window for a user to input an authorized schematic message when detecting that other programs are to perform screenshot on the conversation message interface through the screenshot module;
The acquisition unit is used for acquiring the authorization indicating message input by the user in the window and sending the authorization indicating message to the initiating terminal;
and the removing unit is used for removing the preset picture covered on the conversation message interface after the authorization confirmation message of the initiating terminal is acquired.
b15, the device for limiting screen shots according to the claim B14, when other programs acquire the screen shot file of the dialogue information interface through the screen shot module, the screen shot file is filled with time shots.
B16, the device for limiting screen shots according to claim B15, further comprising:
And noting account information of the initiating terminal and the local machine on the screen capture file.
B17, the device for limiting screenshot according to claim B13, wherein said preset picture includes any one of a mosaic picture, a black picture and a blank picture.
B18, the screen capture device of any one of claims B12-B16, further comprising:
And when a request instruction for limiting the screenshot initiated by the initiating terminal is received, prohibiting displaying the account information of the initiating terminal.
B19, the screen capture device of any one of claims B12-B16, further comprising:
When a request instruction for limiting screenshot initiated by an initiating terminal is received, a temporary number corresponding to the initiating terminal is displayed.
b20, the screen capture device of any one of claims B12-B16, further comprising:
The initiating terminal and the local machine adopt 4G or WiFi networks in the communication process.
b21, the screen capture device of any one of claims B12-B16, further comprising:
and after the permission is confirmed to be obtained, a reminding message pops up on the desktop to prompt the user.
B22, the screen capture device of any one of claims B12-B16, further comprising:
The account number of the initiating terminal corresponds to the mobile phone number of the SIM card of the initiating terminal;
The local account number corresponds to the mobile phone number of the local SIM card.
c23, a portable mobile terminal, comprising:
The touch-sensitive display is used for sensing an operation instruction and displaying a corresponding interface according to the instruction;
The memorizer, is used for storing and supporting the transceiver to carry out the above-mentioned procedure which limits the screenshot;
the communication interface is used for communicating the limiting screenshot device with other equipment or a communication network;
one or more processors for executing programs stored in the memory;
One or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims a 1-a 11.
the above detailed description is provided for a limited screenshot, and a person skilled in the art may change the concept of the embodiment of the present invention in terms of the specific implementation and the application scope, and in summary, the content of the present specification should not be construed as limiting the present invention.