CN106570408A - Sensitive information display method and apparatus - Google Patents
Sensitive information display method and apparatus Download PDFInfo
- Publication number
- CN106570408A CN106570408A CN201510645122.0A CN201510645122A CN106570408A CN 106570408 A CN106570408 A CN 106570408A CN 201510645122 A CN201510645122 A CN 201510645122A CN 106570408 A CN106570408 A CN 106570408A
- Authority
- CN
- China
- Prior art keywords
- sensitive information
- user
- shielded image
- information
- sensitive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000001747 exhibiting effect Effects 0.000 claims description 6
- 230000000903 blocking effect Effects 0.000 claims description 5
- 230000035945 sensitivity Effects 0.000 claims description 3
- 238000012216 screening Methods 0.000 claims 1
- 238000003860 storage Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 239000011248 coating agent Substances 0.000 description 5
- 238000000576 coating method Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- PLXMOAALOJOTIY-FPTXNFDTSA-N Aesculin Natural products OC[C@@H]1[C@@H](O)[C@H](O)[C@@H](O)[C@H](O)[C@H]1Oc2cc3C=CC(=O)Oc3cc2O PLXMOAALOJOTIY-FPTXNFDTSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000007790 scraping Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention provides a sensitive information display method applied to a terminal. The sensitive information display method comprises the steps of displaying a shielded image on a coverage region of sensitive information, wherein the coverage region comprises a part of or all display regions of the sensitive information; and after a predetermined operation on the shielded image from a user is received, displaying at least a part of the sensitive information associated with the predetermined operation. By adoption of the technical scheme of the sensitive information display method, the probability of obtaining the sensitive information by other person is reduced, user privacy protection is strengthened, and safety of user sensitive information is improved.
Description
Technical field
The application is related to field of computer technology, more particularly to a kind of exhibiting method and device of sensitive information.
Background technology
With the development and popularization of intelligent terminal, work and life that user can be completed with mobile terminal
Item is more and more, also increasingly gets used to these functions of using mobile terminal to provide anywhere or anytime.
But, these functions also increase the general of user sensitive information leakage while offering convenience for user
Rate.
For example, user the operation such as can at any time carry out account inquiries, transfer accounts, pay the fees by Mobile banking.
When user carries out on a public occasion these operations, other people can on hand see the account being displayed on screen
The information such as family remaining sum, account of transferring accounts and the amount of money, cause the privacy leakage of user, it is also possible to related account
The safety at family constitutes a threat to.
The content of the invention
In view of this, the application provides a kind of exhibiting method of sensitive information, applies in terminal, including:
Shielded image is shown in the overlay area of sensitive information;The overlay area includes the portion of sensitive information
Divide or whole viewing areas;
After scheduled operation of the user to the shielded image is received, displaying is associated at least with scheduled operation
Part sensitive information.
Present invention also provides a kind of demonstration device of sensitive information, apply in terminal, including:
Shielded image display unit, for showing shielded image in the overlay area of sensitive information;It is described to cover
Cover area includes the part or all of viewing area of sensitive information;
Sensitive information display unit, for after scheduled operation of the user to the shielded image is received, opening up
Show at least part of sensitive information associated with scheduled operation.
From above technical scheme, embodiments herein hides the sensitive letter of user by shielded image
Breath, after user performs scheduled operation sensitive information is just shown, can be reduced other people and be obtained sensitive information
Possibility, strengthens the protection to privacy of user, and improves the security of user sensitive information.
Description of the drawings
Fig. 1 is a kind of flow chart of the exhibiting method of sensitive information in the embodiment of the present application;
Fig. 2 is that sensitive information is coated in the application application example block after display interface figure;
Fig. 3 is that user dashes out the display interface figure after partial occlusion coating in the application application example;
Fig. 4 is a kind of hardware structure diagram of terminal;
Fig. 5 is a kind of building-block of logic of the demonstration device of the sensitive information in the embodiment of the present application.
Specific embodiment
Embodiments herein proposes a kind of exhibiting method of new sensitive information, being capable of concealed terminal screen
User sensitive information, strengthen protection to privacy of user, to solve the problems, such as prior art.This
Method in application embodiment can be applied in various terminals, such as mobile phone, panel computer, PC,
Notebook etc., its flow process is as shown in Figure 1.
Step 110, in the overlay area of sensitive information shielded image is shown;The overlay area of sensitive information
Including the part or all of viewing area of sensitive information.
Sensitive information can be the display information of the sensitive items arranged in terminal.Can transport in terminal
Be set to sensitive items to multiple display projects by one in capable application program, then this or these it is sensitive
The display information (content being particularly shown) of project becomes sensitive information.For example, by account balance
Sensitive items is set to, then the concrete amount of money numerical value of account balance is exactly sensitive information.
It is sensitive items which project can be specified in the installation kit of application program, is so pacified in application program
Dress up the setting that sensitive items is just completed after work(;Setting can also be provided a user with by application program sensitive
The approach of project, is specified by user and shows project as sensitive items which;To with C/S
The application program of (Client/Server, client/server) mode operation, can be being referred to by server
Make which display project is set to sensitive items by client.The display information of sensitive items can be preserved
The data received in the data of terminal local, or from network, such as from the data of server.
Do not limit in embodiments herein.
Sensitive information can be the sensitive information specified by server under C/S model.Server can be to end
While end issues data, it is intended which data is sensitive information.
Conventional sensitive information includes:The title or numbering of user account, the numerical value of account amount of money, account
Numerical value, ID card No. of income etc..
Cover determining the overlay area of sensitive information viewing area of the terminal according to sensitive information on interface
Cover area can include part viewing area, it is also possible to including whole viewing areas, overlay area and display
The overlap part in region can include the display location of a part of sensitive information.Specifically, can be with
Directly using the viewing area of sensitive information as overlay area, it is also possible to according to certain algorithm or random
Viewing area is mapped as overlay area by algorithm, and embodiments herein is not limited.
It is determined that behind overlay area, terminal shows shielded image in overlay area, to avoid sensitive information complete
Whole is directly illustrated on screen.Shielded image can be the monochromatic or polychrome filling to overlay area,
Can be various pictures, embodiments herein is not limited.
Step 120, after scheduled operation of the user to shielded image is received, displaying is associated with scheduled operation
At least part of sensitive information.
User can when sensitive information is wished to, perform associate with sensitive information, to blocking
The scheduled operation of image.Terminal shows association after scheduled operation of the user to shielded image is received
Part or all of sensitive information.So, user at the convenient time can again check sensitive information, to keep away
Exempt to be seen by other people.The interface of sensitive information is shown according to terminal, the various types of of terminal support can be adopted
The operation of type is used as scheduled operation.For example, can with mouse-click or double-click shielded image be used as with
The scheduled operation that the sensitive information hidden by the shielded image is associated;For another example, to touch screen terminal, can
Using by the slip on shielded image as predetermined with what is be associated by the sensitive information that the shielded image is hidden
Operation.
In one example, user can be smeared action as scheduled operation on shielded image,
After receiving the operation that user smears shielded image, the position smeared in user shows should be in the position display
Part or all of sensitive information.Seem to smear out shielded image in user, expose and hidden
The sensitive information of gear is the same, and its effect is similar to scraping scratch card off, it is seen that the password being covered by the coating.This
Individual example not only can avoid the privacy leakage of user, improve the security of sensitive information, and user exists
The interest of game is obtained in that when checking sensitive information, can be very good to lift Consumer's Experience.
Previous example can there are ways to realize.In one implementation, can first in sensitive information
Sensitive information is plotted as background by viewing area, then makees shielded image in the overlay area of sensitive information
For mask drafting;After the operation for receiving user and smearing shielded image, by what user smeared position illiteracy is blocked
Layer is plotted as transparent mask, can so expose user and smear on position as the part or all of quick of background
Sense information.In another implementation, shielded image can be drawn in the overlay area of sensitive information, is being received
After the operation of shielded image is smeared to user, user is smeared into the sensitivity that position is plotted as being shown on the position
Information.
It can be seen that, in embodiments herein, user is hidden with shielded image in the overlay area of sensitive information
Sensitive information, user can be in the environment of safety by the way that scheduled operation is performed to shielded image checking
Hiding sensitive information, so as to enhance the protection to privacy of user, reduces other people and obtains sensitive information
Chance, improves security.
One of the application using example in, in the payment client terminal App (application program) of mobile terminal,
For example by functional item therein in Alipay APP, income yesterday of such as Yuebao functional item is arranged
For sensitive items, wherein Alipay APP is one and pays application, and Yuebao functional item is therein one
Individual function, for showing the balance of funding etc. of user.When user opens on mobile terminals display Yuebao
Yesterday income the page when, server request yesterday avail data of the user terminal to Alipay.Receiving
The yesterday that server is returned is after avail data, and because avail data yesterday is sensitive information, terminal was by yesterday
Avail data is plotted in its viewing area as background.Terminal according to the viewing area of avail data yesterday,
Generation includes the overlay area of the cloud shape of whole income yesterday viewing areas, and draws in overlay area
White mask as blocking coating, to hide avail data yesterday shown as background, in an example,
Yesterday avail data it is coated block after interface it is as shown in Figure 2.When terminal detects user in touch-screen
On smear when blocking coating, white mask is revised as into transparent mask where user smears, manifest
Used as avail data yesterday of the background for being smeared place, in previous example, user is smearing partial occlusion
Interface after coating is as shown in Figure 3.
Corresponding with the realization of above-mentioned flow process, embodiments herein additionally provides the sensitivity on a kind of application terminal
The demonstration device of information.The device can be realized by software, it is also possible to be tied by hardware or software and hardware
The mode of conjunction is realized.It is the CPU by terminal as the device on logical meaning as a example by implemented in software
(Central Process Unit, central processing unit) reads corresponding computer program instructions in internal memory
What operation was formed.From for hardware view, except the CPU shown in Fig. 4, internal memory and non-volatile deposit
Outside reservoir, the terminal that the demonstration device of sensitive information is located generally also is included for carrying out wireless signal receipts
Other hardware such as the chip sent out.
Fig. 5 show a kind of demonstration device of sensitive information applied in terminal of the present embodiment offer,
Including shielded image display unit and sensitive information display unit, wherein:Shielded image display unit is used for
Shielded image is shown in the overlay area of sensitive information;The part of the overlay area including sensitive information or
Whole viewing areas;Sensitive information display unit is used to receive predetermined behaviour of the user to the shielded image
After work, show at least part of sensitive information associated with scheduled operation.
Optionally, the display information of the sensitive information including sensitive items, and/or specified by server
Sensitive information.
Optionally, described device also includes overlay area determining unit, for according to the display of sensitive information
Region determines overlay area.
In one example, the sensitive information display unit specifically for:Occlusion Map is smeared user is received
After the operation of picture, the position smeared in user shows at least part of sensitive information.
In previous example, described device can also include background drawing unit, in the aobvious of sensitive information
Show that the sensitive information is plotted as background by region;The shielded image display unit specifically for:Institute
State overlay area to draw shielded image as mask;The sensitive information display unit specifically for:
After receiving the operation that user smears shielded image, the mask of blocking that user smears position is plotted as into transparent illiteracy
Layer, to appear at least part of sensitive information as background.
The preferred embodiment of the application is the foregoing is only, it is all at this not to limit the application
Within the spirit and principle of application, any modification, equivalent substitution and improvements done etc. should be included in
Within the scope of the application protection.
In a typical configuration, computing device includes one or more processors (CPU), input/output
Interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory
And/or the form, such as read-only storage (ROM) or flash memory (flash RAM) such as Nonvolatile memory (RAM).
Internal memory is the example of computer-readable medium.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by appointing
What method or technique is realizing information Store.Information can be computer-readable instruction, data structure, program
Module or other data.The example of the storage medium of computer include, but are not limited to phase transition internal memory (PRAM),
Static RAM (SRAM), dynamic random access memory (DRAM), it is other kinds of with
Machine access memory (RAM), read-only storage (ROM), Electrically Erasable Read Only Memory
(EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, tape magnetic rigid disk is stored or it
His magnetic storage apparatus or any other non-transmission medium, can be used to store the letter that can be accessed by a computing device
Breath.Define according to herein, computer-readable medium does not include temporary computer readable media (transitory
Media), such as the data-signal and carrier wave of modulation.
Also, it should be noted that term " including ", "comprising" or its any other variant be intended to it is non-
Exclusiveness is included, so that a series of process, method, commodity or equipment including key elements is not only wrapped
Include those key elements, but also including other key elements being not expressly set out, or also include for this process,
The intrinsic key element of method, commodity or equipment.In the absence of more restrictions, by sentence " including
One ... " key element that limits, it is not excluded that including the process of the key element, method, commodity or setting
Also there is other identical element in standby.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey
Sequence product.Therefore, the application can using complete hardware embodiment, complete software embodiment or with reference to software and
The form of the embodiment of hardware aspect.And, the application can be adopted and wherein include calculating at one or more
Machine usable program code computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM,
Optical memory etc.) on implement computer program form.
Claims (10)
1. a kind of exhibiting method of sensitive information, applies in terminal, it is characterised in that include:
Shielded image is shown in the overlay area of sensitive information;The overlay area includes the portion of sensitive information
Divide or whole viewing areas;
After scheduled operation of the user to the shielded image is received, displaying is associated at least with scheduled operation
Part sensitive information.
2. method according to claim 1, it is characterised in that the sensitive information includes sensitive item
Purpose display information, and/or the sensitive information specified by server.
3. method according to claim 1, it is characterised in that methods described also includes:According to quick
The viewing area of sense information determines overlay area.
4. method according to claim 1, it is characterised in that described to receive user to the screening
After the scheduled operation of gear image, show at least part of sensitive information associated with scheduled operation, including:
After receiving the operation that user smears shielded image, the position smeared in user shows at least part of sensitive information.
5. method according to claim 4, it is characterised in that methods described also includes:In sensitivity
The sensitive information is plotted as background by the viewing area of information;
The overlay area in sensitive information shows shielded image, including:To hide in the overlay area
Gear image is drawn as mask;
It is described after the operation for receiving user and smearing shielded image, the position smeared in user shows at least portion
Divide sensitive information, including:After the operation for receiving user and smearing shielded image, user is smeared into position
Block mask and be plotted as transparent mask, to appear at least part of sensitive information as background.
6. a kind of demonstration device of sensitive information, applies in terminal, it is characterised in that include:
Shielded image display unit, for showing shielded image in the overlay area of sensitive information;It is described to cover
Cover area includes the part or all of viewing area of sensitive information;
Sensitive information display unit, for after scheduled operation of the user to the shielded image is received, opening up
Show at least part of sensitive information associated with scheduled operation.
7. device according to claim 6, it is characterised in that the sensitive information includes sensitive item
Purpose display information, and/or the sensitive information specified by server.
8. device according to claim 6, it is characterised in that described device also includes:The area of coverage
Domain determining unit, for the viewing area according to sensitive information overlay area is determined.
9. device according to claim 6, it is characterised in that the sensitive information display unit tool
Body is used for:After the operation for receiving user and smearing shielded image, the position smeared in user shows at least portion
Divide sensitive information.
10. device according to claim 9, it is characterised in that described device also includes:Background
Drawing unit, for the sensitive information to be plotted as into background in the viewing area of sensitive information;
The shielded image display unit specifically for:In the overlay area using shielded image as mask
Draw;
The sensitive information display unit specifically for:After the operation for receiving user and smearing shielded image,
The mask of blocking that user smears position is plotted as into transparent mask, to appear as at least part of quick of background
Sense information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510645122.0A CN106570408A (en) | 2015-10-08 | 2015-10-08 | Sensitive information display method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510645122.0A CN106570408A (en) | 2015-10-08 | 2015-10-08 | Sensitive information display method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106570408A true CN106570408A (en) | 2017-04-19 |
Family
ID=58507192
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510645122.0A Pending CN106570408A (en) | 2015-10-08 | 2015-10-08 | Sensitive information display method and apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106570408A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107728964A (en) * | 2017-10-13 | 2018-02-23 | 理光图像技术(上海)有限公司 | Image processing method, image processing apparatus and image processing system |
CN107770443A (en) * | 2017-10-26 | 2018-03-06 | 努比亚技术有限公司 | A kind of image processing method, mobile terminal and computer-readable recording medium |
CN108090382A (en) * | 2017-12-29 | 2018-05-29 | 阿里巴巴集团控股有限公司 | Show the method and apparatus of sensitive information |
CN108153468A (en) * | 2017-12-14 | 2018-06-12 | 阿里巴巴集团控股有限公司 | Image processing method and device |
CN109598138A (en) * | 2018-11-15 | 2019-04-09 | 阿里巴巴集团控股有限公司 | The method and device that whether sensitive information identification, cover and perception are checked in picture |
CN110881033A (en) * | 2019-11-07 | 2020-03-13 | 腾讯科技(深圳)有限公司 | Data encryption method, device, equipment and readable storage medium |
CN113709519A (en) * | 2021-08-27 | 2021-11-26 | 上海掌门科技有限公司 | Method and equipment for determining live broadcast shielding area |
CN114627594A (en) * | 2020-12-10 | 2022-06-14 | 中国联合网络通信集团有限公司 | Information security guarantee method and related device of self-service terminal |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103294345A (en) * | 2013-05-29 | 2013-09-11 | 深圳市同洲电子股份有限公司 | Method and device for interface display and mobile terminal |
CN103973891A (en) * | 2014-05-09 | 2014-08-06 | 平安付智能技术有限公司 | Data security processing method for software interface |
CN104050422A (en) * | 2014-06-10 | 2014-09-17 | 腾讯科技(深圳)有限公司 | Method and device for displaying information content |
CN104615940A (en) * | 2014-10-27 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Sensitive information displaying method and device |
CN104866167A (en) * | 2014-02-21 | 2015-08-26 | 腾讯科技(深圳)有限公司 | Method and device for controlling quick floating layer panel |
CN104935494A (en) * | 2014-03-19 | 2015-09-23 | 腾讯科技(深圳)有限公司 | Information processing method and device |
-
2015
- 2015-10-08 CN CN201510645122.0A patent/CN106570408A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103294345A (en) * | 2013-05-29 | 2013-09-11 | 深圳市同洲电子股份有限公司 | Method and device for interface display and mobile terminal |
CN104866167A (en) * | 2014-02-21 | 2015-08-26 | 腾讯科技(深圳)有限公司 | Method and device for controlling quick floating layer panel |
CN104935494A (en) * | 2014-03-19 | 2015-09-23 | 腾讯科技(深圳)有限公司 | Information processing method and device |
CN103973891A (en) * | 2014-05-09 | 2014-08-06 | 平安付智能技术有限公司 | Data security processing method for software interface |
CN104050422A (en) * | 2014-06-10 | 2014-09-17 | 腾讯科技(深圳)有限公司 | Method and device for displaying information content |
CN104615940A (en) * | 2014-10-27 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Sensitive information displaying method and device |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107728964A (en) * | 2017-10-13 | 2018-02-23 | 理光图像技术(上海)有限公司 | Image processing method, image processing apparatus and image processing system |
CN107770443A (en) * | 2017-10-26 | 2018-03-06 | 努比亚技术有限公司 | A kind of image processing method, mobile terminal and computer-readable recording medium |
CN108153468A (en) * | 2017-12-14 | 2018-06-12 | 阿里巴巴集团控股有限公司 | Image processing method and device |
WO2019114418A1 (en) * | 2017-12-14 | 2019-06-20 | 阿里巴巴集团控股有限公司 | Picture processing method and apparatus |
CN108090382A (en) * | 2017-12-29 | 2018-05-29 | 阿里巴巴集团控股有限公司 | Show the method and apparatus of sensitive information |
CN109598138A (en) * | 2018-11-15 | 2019-04-09 | 阿里巴巴集团控股有限公司 | The method and device that whether sensitive information identification, cover and perception are checked in picture |
CN109598138B (en) * | 2018-11-15 | 2023-07-11 | 创新先进技术有限公司 | Method and device for identifying, covering and sensing whether sensitive information in picture is checked or not |
CN110881033A (en) * | 2019-11-07 | 2020-03-13 | 腾讯科技(深圳)有限公司 | Data encryption method, device, equipment and readable storage medium |
CN110881033B (en) * | 2019-11-07 | 2022-06-21 | 腾讯科技(深圳)有限公司 | Data encryption method, device, equipment and readable storage medium |
CN114627594A (en) * | 2020-12-10 | 2022-06-14 | 中国联合网络通信集团有限公司 | Information security guarantee method and related device of self-service terminal |
CN113709519A (en) * | 2021-08-27 | 2021-11-26 | 上海掌门科技有限公司 | Method and equipment for determining live broadcast shielding area |
CN113709519B (en) * | 2021-08-27 | 2023-11-17 | 上海掌门科技有限公司 | Method and equipment for determining live broadcast shielding area |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106570408A (en) | Sensitive information display method and apparatus | |
US11669829B2 (en) | Attribute-based card combinations for digital wallets | |
US10972267B2 (en) | Deterministic verification of digital identity documents | |
US20130236109A1 (en) | Identification generation and authentication process application | |
CN109347898B (en) | Scene information sending method, scene information display method, server and mobile terminal | |
CN104094252A (en) | Software application distribution in documents | |
US11741453B2 (en) | Key-pad centric payments | |
TWI686725B (en) | Method and device for displaying sensitive information | |
CN104346463A (en) | Loading method and device of page label and browser client | |
CN110427154A (en) | Information shows exchange method and device, computer equipment and medium | |
US11301820B2 (en) | Bi-directional feed between electronic calendar and credit-card authorization unit | |
CN107590276A (en) | A kind of article map-indication method and system | |
CN111241107A (en) | Service processing method, device, medium and electronic equipment | |
US11379898B2 (en) | Touch and pressure-based apparel image searching | |
CN108038219A (en) | Picture method to set up, device, computer installation and computer-readable recording medium | |
CN107770165A (en) | The method and apparatus that a kind of analog machine sends request | |
CN112053236B (en) | Risk information identification method, apparatus, computing device and medium | |
CN109359970B (en) | Smart card management method and device and terminal equipment | |
US20110161320A1 (en) | Methods, apparatuses, and computer program products for geocoding data | |
CN112200617A (en) | Service providing method and device and electronic equipment | |
KR20210055181A (en) | Computer program for providing food delivery service | |
CN108171786A (en) | A kind of terminal simulation design method and system | |
WO2024098551A1 (en) | Traffic transfer method, and device | |
US20230026335A1 (en) | Systems And Methods For Automated Processing Of Database Entries | |
US20210233082A1 (en) | Fraud detection via incremental fraud modeling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1235490 Country of ref document: HK |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170419 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1235490 Country of ref document: HK |