CN106716436A - Information display method and system - Google Patents
Information display method and system Download PDFInfo
- Publication number
- CN106716436A CN106716436A CN201680002671.9A CN201680002671A CN106716436A CN 106716436 A CN106716436 A CN 106716436A CN 201680002671 A CN201680002671 A CN 201680002671A CN 106716436 A CN106716436 A CN 106716436A
- Authority
- CN
- China
- Prior art keywords
- information
- message
- private content
- content
- initial message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
An information display method and system, the method comprising the steps of: receiving an initial message; scanning the initial message content according to a preset private content library; masking the private content found in the initial message and normally displaying other content of the initial message; detecting the status of the authentication information of a user, and when the authentication information is verified, displaying all content of the original message; and when the authentication information is not verified, displaying the other content except the found private content.
Description
Technical field
The application is related to intelligent terminal message processing technique, for example, be related to a kind of safe browsing method of specific information and be
System.
Background technology
At present, intelligent terminal has incorporated daily life, and communication, trip, shopping, Working Life always carve need
High in the clouds big data is connected from intelligent terminal.It is related to the private informations such as consumption, account, the amount of money of individual also more next live simultaneously in
It is more.Most mobile terminal applications (app) need to register respective system by intelligent terminal to reach mobile terminal function
Using account number, the application account of user's registration is more, then the mobile terminal can receive more PUSH messages or identifying code is short
Letter etc., these message and short message in most cases belong to the private information of user.
And it is current, the method for browsing message in mobile terminal mainly has two kinds, and one kind is on mobile terminal screen locking interface
Briefly browse and receive message or short breath;Another kind is to open corresponding application to browse the message or short breath that each receive.
In order to reach the purpose that safety browses private information, existing technical finesse means are in message or short message
Hold Hide All to get up or the content of short message is all made into Fuzzy Processing, or the message that imperfect display is received.This is finished
The mode of full Fuzzy Processing or imperfect display message is limited the need for user browses message content in itself.Use cannot be met
Family is it should be understood that message content wishes the demand that sensitive private information is protected again.
Prior art browses another method of message, such as under Android system environment, system is in notification message
Notify centrally disposed various modes, one of which is exactly the shielding to content, the message of shielding and short breath display reminding figure
Mark and the title of application, cannot browse to the particular content of message under this kind of mode.Under this kind of mask pattern, locking screen interface
System message does not just show the content of private message, and user browses message if desired, then need to open and enter receive message or
The corresponding application of the short breath of person, can just find message content.This kind of message browsing method also limit user and browse message content, and
And the operation of mobile terminal user is increased, it is bad using inconvenient viewing experience.
In addition, with the intelligent mobile terminals such as mobile terminal carried individual correlation private information increasingly enrich and
The display trend of mobile terminal is presented screen enlarging feature, and the large screen display of mobile terminal and touch screen operation easily reveal communication
Individual's private information such as record, account, password.
Therefore, the message browsing mode of prior art needs to improve.
The content of the invention
The application technical problem to be solved is to provide one kind and meets the need for user browses message content while protect again
To the safe and reliable information displaying method of sensitive private information, and shielding protection sensitivity private information can be by user certainly
Row configuration, while the private information Browsing Safety while Using of mobile terminal is increased, improves the body that user profile or short message are browsed
Test.
In order to solve the above technical problems, the application provides following technical scheme.
In a first aspect, the embodiment of the present application provides a kind of information displaying method, comprise the following steps:
Receive initial message;
The initial message content is scanned according to default private content storehouse;
The private content shielding that will be found in the initial message, and the other guide in initial message is normally shown;
The checking information state of user is detected, when the checking information is verified, the full content of the initial message is shown;
When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
In the specific implementation, the checking information can be biological information, and the checking of the biological information includes fingerprint
At least one kind of checking, iris verification and voice print verification.
Preferably, the information displaying method also includes updating setting the private content storehouse.
Wherein, the private content storehouse includes shielding keyword and removing property keyword.
Optionally, the private content at least includes the name in numeral, the amount of money, address, the address list of setting.
Second aspect, the embodiment of the present application additionally provides a kind of information display system, including:
Receiver module, for receiving initial message;
Scan module, for scanning the initial message content according to default private content storehouse;
Shroud module, the private content shielding that will be found in the initial message, and by the other guide in initial message just
Often display;
Detection module, detects the checking information state of user, when the checking information is verified, shows the initial message
Full content;When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
During specific implementation, the checking information is biological information, and the biological information is verified as fingerprint authentication, rainbow
Film checking and at least one kind of voice print verification.
The information display system also includes updating setup module, and the private content storehouse is set for updating.
Wherein, the private content storehouse includes shielding keyword and removing property keyword.
The private content at least includes the name in numeral, the amount of money, address, the address list of setting.
The third aspect, the embodiment of the present application additionally provides a kind of electronic equipment, including:
At least one processor;And,
The memory being connected with least one processor communication;Wherein,
The memory storage has can be by the instruction of at least one computing device, and the instruction is by described at least one
Individual computing device, so that at least one processor is able to carry out method as described above.
Fourth aspect, the embodiment of the present application additionally provides a kind of non-volatile computer readable storage medium storing program for executing, the calculating
Machine readable storage medium storing program for executing is stored with computer executable instructions, and the computer executable instructions are used to make computer perform as above
Described method.
5th aspect, the embodiment of the present application additionally provides a kind of computer program product, the computer program product bag
Computer program of the storage on non-volatile computer readable storage medium storing program for executing is included, the computer program includes programmed instruction,
When described program instruction is computer-executed, the computer is set to perform method as described above.
The beneficial effect of the application is, information displaying method and electronic equipment that the embodiment of the present application is provided, Ji Nengman
Sufficient user protects the security to sensitive private information again simultaneously the need for browsing message content;And the private content storehouse can be with
Voluntarily configured by user, while the private content for realizing mobile terminal is browsed safely, can be set according to actual conditions needs to protect
Shield and the content of shielding, improve the experience that user profile or short message are browsed;In addition, the embodiment of the present application sets timing detection life
The detection module of thing characteristic information proofing state so that the user that only mobile terminal pre-sets can just see and browse shielding
Private content, improves the security of information browse, in case the personal private information such as stopping leak dew log, account, password;Together
When, when biological information checking does not pass through, only the private content of message is shielded, and is had no effect on user and is understood initial message
Other contents.
Brief description of the drawings
One or more embodiments are illustrative by the picture in corresponding accompanying drawing, these exemplary theorys
The bright restriction not constituted to embodiment, the element with same reference numbers label is expressed as similar element in accompanying drawing, removes
It is non-to have especially statement, the figure not composition limitation in accompanying drawing.
Fig. 1 is the broad flow diagram of the information displaying method that the embodiment of the present application is provided;
Fig. 2 is the module map of the information display system wherein embodiment mobile terminal that the embodiment of the present application is provided;
Fig. 3 is the particular flow sheet of the information displaying method that the embodiment of the present application is provided;
Fig. 4 is the first application scenarios schematic diagram of the information displaying method that the embodiment of the present application is provided;
Fig. 5 is the second application scenarios schematic diagram of the information displaying method that the embodiment of the present application is provided
Fig. 6 is the 3rd application scenarios schematic diagram of the information displaying method that the embodiment of the present application is provided;
Fig. 7 is the 4th application scenarios schematic diagram of the information displaying method that the embodiment of the present application is provided;
Fig. 8 is the module map of the information display system that the embodiment of the present application is provided;And
Fig. 9 is that the hardware configuration of the electronic equipment of the execution specific information methods of exhibiting that the embodiment of the present application is provided is illustrated
Figure.
Specific embodiment
In order that the object, technical solution and advantage of the application become more apparent, it is right below in conjunction with drawings and Examples
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the present invention, not
For limiting the present invention.
Refering to shown in Fig. 1, the application is related to the safe browsing method of specific information, comprises the following steps:
Receive initial message;The initial message content is scanned according to default private content storehouse;To be looked in the initial message
The private content shielding arrived;The checking information state of user is detected, when the checking information is verified, the initial message is shown
Full content;When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
Wherein, the private content at least includes the name in numeral, the amount of money, address, the address list of setting.
Fig. 8 is refer to, the module map of the information display system of the application is shown, wherein, the information display system includes:
Receiver module, for receiving initial message;Scan module, for being scanned in the initial message according to default private content storehouse
Hold;Shroud module, the private content shielding that will be found in the initial message, and the other guide in initial message is normally shown
Show;Detection module, detects the checking information state of user, when the checking information is verified, shows the whole of the initial message
Content;When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
The information display system also includes updating setup module, and the private content storehouse is set for updating.
Fig. 2 to Fig. 3 is refer to, in order to illustrate the information display system, is illustrated by by taking mobile terminal as an example below
Illustrate, the mobile terminal is specially:
The mobile terminal includes some applications 210, message center 220 and display module 230.Wherein, in order to realize only shielding
Private content is covered, the mobile terminal also includes shroud module, and show whole initial messages, the movement only under user intention
Terminal also includes detection module.
Those of ordinary skill in the art can derive, some applications 210 of mobile terminal and message center 220 can be with
Shroud module and detection module are respectively provided with, to realize browsing the information security of all message and short message.In the reality of the application
Apply in example, the message center 220 also includes shroud module 110a and detection module 215a.In order that all initial messages for receiving
The shielding of private content can be realized, each application can include shroud module 110b and detection module 215b.
The private content storehouse is set in order to update, the mobile terminal also includes updating setup module 250.Set by the renewal
Putting module 250 can be to private content, such as name in numeral, the amount of money, address, address list etc. is set.
Wherein, the initial message that shroud module 110a, 110b is received according to the scanning of default private content storehouse, and should
The private content shielding found in initial message.
The detection module 215a, 215b, the checking information state for detecting user;
Display module 230 shows the full content of the initial message when the checking information is verified;Or in checking
When Information Authentication does not pass through, other message contents in addition to the private content for finding are shown.
In the embodiment of the present application, the checking information is biological information, and the biological information is verified as fingerprint inspection
At least one kind of card, iris verification and voice print verification.In order to illustrate the application, below by taking fingerprint authentication as an example
It is illustrated.
The display module is used to show full content or displaying other contents of initial message and the shielding of initial message
Private content, that is, shielding private content shielding message.
The shroud module 110a, 110b are used to scan initial message according to default private content storehouse, and according to configuration
Shielding parameter shields the private content swept in the initial message and forms shielding message.The detection module 215a, 215b are used for fixed
When detection user fingerprint authentication state;Wherein, when fingerprint authentication passes through, initial message is shown in the display module 230;Fingerprint
Show the shielding message of shielding private content when checking does not pass through in the display module 230.
Biological information checking depends on different security needs, can be fingerprint authentication, iris verification and sound
The one of which or various of line checking.The biology of correspondence detection module, the notice center or application call mobile terminal is special
Levy monitoring result.Wherein, the biometric informations such as fingerprint, iris, the vocal print of user are stored in the mobile terminal or other can
Verify the information of user identity.
The shielding parameter of the configuration needs to determine according to the different of different system, and the shielding mode in the shielding parameter can be with
It is that private content to scanning does each byte of Fuzzy Processing or private content and substitutes and be shown as " * " number, Huo Zheqi
Its user's None- identified understands the mode of content.
The private content storehouse includes shielding keyword and removing property keyword.User can manually set the shielding keyword
With removing property keyword.
The such as numerical portion of the private content storehouse including bank, Alipay, wechat etc. in the information in source.With receipts
Enter, wage, the numerical portion of the information of check code word.
User can set in the message of mobile terminal or can using which information (numeral, account, bank's card number) is set
To be shielded or not shielded.
For another example shielding mode can be the numerical portion after active scan and shielding setting keyword.When message center or
During using detecting in the real information that receives comprising keywords such as wage, check codes, the number behind shielding wage, check code
Character segment.
In addition, the shielding to non-private content need to be excluded.Commonly used telephone number, the postcode information for such as storing, to these
Information is not shielded.And for example for the information related to consumption for receiving, the digital information for paying the amount of money of (consumption) is not shielded.
Fig. 4 to Fig. 7 is refer to, several application scenarios for showing the information displaying method of the embodiment of the present application offer are illustrated
Figure.By taking fingerprint authentication as an example, when the mobile terminal user of advance binding puts hand to be verified at the fingerprint authentication at the terminal back side
Refer to, mobile terminal takes the fingerprint and verifies fingerprint, detection module 215a, 215b timing extraction fingerprint authentication data, fingerprint inspection
Card is when passing through, and message center 220 pushes the full content of initial message or applies 210 in the locking screen interface of mobile terminal 200
It is middle to show initial message or from pushing unscreened initial message to message center 220 using 210;When fingerprint authentication does not pass through
When, message center 220 pushes the shielding message of shielding private content in the locking screen interface of mobile terminal 200;Or applying 210
Middle displaying shielding message;Or from pushing shielding message to message center 220 using 210.It is non-exclusive when fingerprint authentication does not pass through
User can't see private content, but can see the content of the initial message in addition to private content.
Private content in the application is accompanied by the biometric authentication of user and shows, is transient state, with utmost
Protection message privacy and security.Finger-print region is touched when user's finger and during by verifying, showing the whole of initial message
Content, the initial message does not shield content.When user's finger leaves finger-print region, private content is hidden by shielding again.
As shown in Figures 4 to 7, for example:When there is payment information, " your payment check code 123456 " is received, at shielding
Numeral 123456 is only shielded during reason, is shown as " your payment check code * * * * * * ".When pickup information is received, the default position of shielding
Several numerals, such as 6 pickup codes, " please taking mail with pickup code 123456 to service centre " shows after shielding processing
It is " please taking mail with pickup code * * * * * * to service centre ".During the information that keeps accounts, information " receives 123456 yuan of wage ", wherein
Fuzzy display information " 123456 ";Or it is replaced and is shown as " receiving wage * * * * * * units ".When payment information is received, preset
Show position after numeral behind shielding RMB, such as " your account occur that payment withhold RMB 123456 " shielding processing
" your account occur that payment withhold RMB * * * * * * ".
On the premise of shroud module is arranged on server, it is also possible to each complete system by message center 220 and application 210
Unite biological characteristic validation detection and judge information exhibition method.From for system module, the application and message center are all set
There is each self-detection module.
Please also refer to Fig. 6, implement:
1. server transmitting terminal generates initial message.
2. transmitting terminal sends message.Initial message is sent to receiving terminal mobile terminal.
3. receiving terminal, mobile terminal receives initial message, and monitoring modular 215a, 215b are based on private content storehouse and find just
Private message in beginning message, shroud module 110a, 110b shielding initial message, is shown as initial message:" you receive work
Money * * * * * * units ".
4. receiving terminal, user verifies identity by biological information verification modes such as fingerprints;
5. receiving terminal, when biological information is verified, message is shown as:" you receive 123456 yuan of wage ".
6. receiving terminal, after user fingerprints leave biological information identifying device, as shown in fig. 6, initial message " you receive
123456 yuan of wage " is shielded again, and display is reduced to " you receive wage * * * * * * units ".
Fig. 6-8 are refer to, the application further relates to a kind of information displaying method.
The safe browsing method of specific information is mainly included the following steps that:Receive initial message;According in default secret
Rong Ku scans the initial message content;The private content shielding that will be found in the initial message;Detect the checking information shape of user
State, when the checking information is verified, shows the full content of the initial message;When checking information checking does not pass through, display is removed
Other message contents outside the private content for finding.
It is as follows with the detailed description that different implementation methods is different.
Fig. 3 is refer to, the particular flow sheet of the information displaying method of the application is shown.
Step 301:The application of mobile terminal or notice center receive initial message, the application of mobile terminal or notice
Centre scan initial message content;Whether initial message is judged comprising default private content, if not including private content,
Terminate scanning, in application or locking screen interface displaying initial message all the elements;
Step 303:If comprising private content, the shroud module private content swept to of shielding, displaying initial message its
Its content and the private content of shielding;
Step 305:Monitoring modular timing detection biological information proofing state, when checking does not pass through, displaying initially disappears
The private content of other contents and shielding is ceased, is shown when being verified in the secret of other contents of initial message and shielding
Hold;This step is to ensure that the display of private content is the fingerprint verification operation based on user, the fingerprint authentication if user moves away,
Initial message recovers to be shielded;
Step 307:Monitoring modular in user fingerprints verification process, test by timing detection biological information proofing state
When card does not pass through, continue to show the private content of other contents of initial message and shielding, when being verified, continue to show initially
Other contents of message and the private content of shielding.
Information displaying method and mobile terminal that the embodiment of the present application is provided, can meet the need that user browses message content
To protect the security to sensitive private information again simultaneously;And the private content storehouse can voluntarily be configured by user, realizing
While the private content of mobile terminal is browsed safely, the content that need to be protected and shield can be set according to actual conditions, improved and used
The experience that family information or short message are browsed.Also, the detection module of biological information proofing state is detected by setting timing,
So that the exclusive user of mobile terminal can just browse the private content of shielding, improve the security of information browse prevents leakage logical
The personal private information such as news record, account, password.Meanwhile, when biological information checking does not pass through, specific information is mobile whole
End is shown as mask information all the time, and the full content of initial information is only shown when user biological characteristic information is verified, than
As user once moves away the finger of fingerprint authentication, then real information is shown as mask information automatically, and user is easy to operate, improves
User's operating experience;Also, the private content storehouse for setting can voluntarily be set by user so that user can be set according to actual conditions
The content of required shielding, meets the shielding demand that user is continually changing.
Fig. 9 is the hardware architecture diagram of the electronic equipment 600 of the information displaying method that the embodiment of the present application is provided, and is such as schemed
Shown in 9, the electronic equipment 600 includes:
One or more processors 610, memory 620 and human-computer interaction device 630, with a processor 610 in Fig. 9
As a example by.
Processor 610, memory 620 and human-computer interaction device 630 can be connected by bus or other modes, figure
In 9 as a example by being connected by bus.
Memory 620 can be used to store non-volatile software journey as a kind of non-volatile computer readable storage medium storing program for executing
Sequence, non-volatile computer executable program and module, such as corresponding program of the information displaying method in the embodiment of the present application
Instruction/module (for example, shroud module 110a, 110b shown in accompanying drawing 2, monitoring modular 215a, 215b and setup module 250).
Processor 610 is by running the non-volatile software program stored in memory 620, instructing and module, so as to perform clothes
The various function application of business device and data processing, that is, realize the information displaying method in above method embodiment.
Memory 620 can include storing program area and storage data field, wherein, storing program area can store operation system
Application program required for system, at least one function;Storage data field can store the use institute for showing electronic equipment according to information
Data of establishment etc..Additionally, memory 620 can include high-speed random access memory, non-volatile memories can also be included
Device, for example, at least one disk memory, flush memory device or other non-volatile solid state memory parts.In some embodiments
In, memory 620 is optional including the memory remotely located relative to processor 610, and these remote memories can be by net
Network is connected to information displaying electronic equipment.The example of above-mentioned network include but is not limited to internet, intranet, LAN,
Mobile radio communication and combinations thereof.
One or more of module storages are complete by human-computer interaction device 630 in user in the memory 620
Into after the setting interaction in private content storehouse, when being performed by one or more of processors 610, above-mentioned any side is performed
Information displaying method in method embodiment, for example, the method and step in performing Fig. 1 described above and the method step in Fig. 3
Rapid 301 to step 307, realizes covering module 110a, 110b in Fig. 2, monitoring modular 215a, 215b's and setup module 250 etc.
Function.
The method that the executable the embodiment of the present application of the said goods is provided, possesses the corresponding functional module of execution method and has
Beneficial effect.Not ins and outs of detailed description in the present embodiment, reference can be made to the method that the embodiment of the present application is provided.
The electronic equipment of the embodiment of the present application exists in a variety of forms, including but not limited to:
(1) mobile communication equipment:The characteristics of this kind equipment is that possess mobile communication function, and to provide speech, data
It is main target to communicate.This Terminal Type includes:Smart mobile phone (such as iPhone), multimedia handset, feature mobile phone, and it is low
End mobile phone etc..
(2) super mobile personal computer equipment:This kind equipment belongs to the category of personal computer, there is calculating and treatment work(
Can, typically also possess mobile Internet access characteristic.This Terminal Type includes:PDA, MID and UMPC equipment etc., such as iPad.
(3) portable entertainment device:This kind equipment can show and play content of multimedia.The kind equipment includes:Audio,
Video player (such as iPod), handheld device, e-book, and intelligent toy and portable car-mounted navigation equipment.
(4) server:The equipment for providing the service of calculating, the composition of server includes that processor, hard disk, internal memory, system are total
Line etc., server is similar with general computer architecture, but due to needing to provide highly reliable service, therefore in treatment energy
The requirement of the aspects such as power, stability, reliability, security, scalability, manageability is higher.
(5) other have the electronic installation of data interaction function.
The embodiment of the present application provides a kind of non-volatile computer readable storage medium storing program for executing, the computer-readable storage medium
Matter is stored with computer executable instructions, and the computer executable instructions are executed by one or more processors, such as in Fig. 9
One processor 610, may be such that the information displaying that said one or multiple processors can perform in above-mentioned any means embodiment
Method, for example, the method and step in performing Fig. 1 described above and the method and step 301 in Fig. 3 realize figure to step 307
Module 110a, 110b, the function of monitoring modular 215a, 215b and setup module 250 etc. are covered in 2.
Device embodiment described above is only schematical, wherein the unit illustrated as separating component can
To be or may not be physically separate, the part shown as unit can be or may not be physics list
Unit, you can with positioned at a place, or can also be distributed on multiple NEs.It can according to the actual needs be selected
In some or all of module realize the purpose of this embodiment scheme.
Through the above description of the embodiments, those of ordinary skill in the art can be understood that each implementation method
Can add the mode of general hardware platform by software to realize, naturally it is also possible to by hardware.Those of ordinary skill in the art can
Realize that all or part of flow in above-described embodiment method can be by computer program to instruct the hard of correlation with understanding
Part is completed, and described program can be stored in a computer read/write memory medium, the program is upon execution, it may include as above
State the flow of the embodiment of each method.Wherein, described storage medium can be magnetic disc, CD, read-only memory (Read-
Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
Finally it should be noted that:Above example is only used to illustrate the technical scheme of the application, rather than its limitations;At this
Under the thinking of application, can also be combined between the technical characteristic in above example or different embodiment, step can be with
Realized with random order, and there are many other changes of the different aspect of the application as described above, for simplicity, they do not have
Have and provided in details;Although being described in detail to the application with reference to the foregoing embodiments, the ordinary skill people of this area
Member should be understood:It can still modify to the technical scheme described in foregoing embodiments, or to which part skill
Art feature carries out equivalent;And these modifications or replacement, the essence of appropriate technical solution is departed from each reality of the application
Apply the scope of a technical scheme.
Claims (13)
1. a kind of information displaying method, it is characterised in that comprise the following steps:
Receive initial message;
The initial message content is scanned according to default private content storehouse;
The private content shielding that will be found in the initial message, and the other guide in initial message is normally shown;
The checking information state of user is detected, when the checking information is verified, the full content of the initial message is shown;
When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
2. method according to claim 1, it is characterised in that the checking information is biological information, the biology
The checking of characteristic information includes at least one kind of fingerprint authentication, iris verification and voice print verification.
3. method according to claim 1, it is characterised in that the private content storehouse also is set including updating.
4. the method according to claim 1-3 any one, it is characterised in that the private content storehouse includes that shielding is crucial
Word and removing property keyword.
5. method according to claim 4, it is characterised in that the private content at least include the numeral of setting, the amount of money,
Name in address, address list.
6. a kind of information display system, it is characterised in that including:
Receiver module, for receiving initial message;
Scan module, for scanning the initial message content according to default private content storehouse;
Shroud module, the private content shielding that will be found in the initial message, and the other guide in initial message is normal
Display;
Detection module, detects the checking information state of user, when the checking information is verified, shows the initial message
Full content;When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
7. information display system according to claim 6, it is characterised in that the checking information is biological information,
At least one kind for being verified as fingerprint authentication, iris verification and voice print verification of the biological information.
8. information display system according to claim 6, it is characterised in that also including updating setup module, for updating
The private content storehouse is set.
9. the information display system according to claim 6-8 any one, it is characterised in that the private content storehouse includes
Shielding keyword and removing property keyword.
10. information display system according to claim 9, it is characterised in that the private content at least includes setting
Name in numeral, the amount of money, address, address list.
11. a kind of electronic equipment, wherein, including:
At least one processor;And,
The memory being connected with least one processor communication;Wherein,
The memory storage has can be by the instruction of at least one computing device, and the instruction is by described at least one
Reason device is performed, so that at least one processor is able to carry out the method described in claim any one of 1-5.
A kind of 12. non-volatile computer readable storage medium storing program for executing, wherein, the computer-readable recording medium storage has computer
Executable instruction, the computer executable instructions are used to make the method described in computer perform claim requirement any one of 1-5.
A kind of 13. computer program products, wherein, the computer program product includes that storage is readable in non-volatile computer
Computer program on storage medium, the computer program includes programmed instruction, when described program instruction is computer-executed
When, make the method described in the computer perform claim requirement any one of 1-5.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/106439 WO2018090332A1 (en) | 2016-11-18 | 2016-11-18 | Method and system for displaying information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106716436A true CN106716436A (en) | 2017-05-24 |
Family
ID=58903964
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201680002671.9A Pending CN106716436A (en) | 2016-11-18 | 2016-11-18 | Information display method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106716436A (en) |
WO (1) | WO2018090332A1 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107748848A (en) * | 2017-10-16 | 2018-03-02 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
CN108124055A (en) * | 2017-11-29 | 2018-06-05 | 努比亚技术有限公司 | Prompting message control method, flexible screen terminal and computer readable storage medium |
CN109151161A (en) * | 2018-06-27 | 2019-01-04 | Oppo广东移动通信有限公司 | display control method and related product |
CN110018872A (en) * | 2019-03-27 | 2019-07-16 | 阿里巴巴集团控股有限公司 | A kind of PUSH message treating method and apparatus |
CN110472446A (en) * | 2019-07-19 | 2019-11-19 | 平安科技(深圳)有限公司 | Message display method, device and storage medium, computer equipment |
CN112199495A (en) * | 2020-11-13 | 2021-01-08 | 北京明略软件系统有限公司 | Personnel message notification method, device, electronic equipment and computer readable storage medium |
US11082374B1 (en) | 2020-08-29 | 2021-08-03 | Citrix Systems, Inc. | Identity leak prevention |
US11165755B1 (en) | 2020-08-27 | 2021-11-02 | Citrix Systems, Inc. | Privacy protection during video conferencing screen share |
US11201889B2 (en) | 2019-03-29 | 2021-12-14 | Citrix Systems, Inc. | Security device selection based on secure content detection |
US11361113B2 (en) | 2020-03-26 | 2022-06-14 | Citrix Systems, Inc. | System for prevention of image capture of sensitive information and related techniques |
US11450069B2 (en) | 2018-11-09 | 2022-09-20 | Citrix Systems, Inc. | Systems and methods for a SaaS lens to view obfuscated content |
US11539709B2 (en) | 2019-12-23 | 2022-12-27 | Citrix Systems, Inc. | Restricted access to sensitive content |
US11544415B2 (en) | 2019-12-17 | 2023-01-03 | Citrix Systems, Inc. | Context-aware obfuscation and unobfuscation of sensitive content |
US11582266B2 (en) | 2020-02-03 | 2023-02-14 | Citrix Systems, Inc. | Method and system for protecting privacy of users in session recordings |
CN116401651A (en) * | 2023-06-08 | 2023-07-07 | 深圳市晨歌电子有限公司 | Information storage safety protection method, system and storage medium |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110245516A (en) * | 2019-05-09 | 2019-09-17 | 阿里巴巴集团控股有限公司 | A kind of message treatment method and device |
CN115240281A (en) * | 2022-09-23 | 2022-10-25 | 平安银行股份有限公司 | Private information display method and device, storage medium and mobile terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103902867A (en) * | 2012-12-26 | 2014-07-02 | 联想(北京)有限公司 | Information protection method and electronic device |
CN104023320A (en) * | 2014-05-14 | 2014-09-03 | 北京奇虎科技有限公司 | Message prompt method and device |
CN104284024A (en) * | 2014-09-30 | 2015-01-14 | 厦门美图移动科技有限公司 | Method for hiding contact person information on intelligent device |
US9092918B2 (en) * | 2007-10-19 | 2015-07-28 | Natural Security | Contactless biometric authentication system and authentication method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104079475A (en) * | 2014-06-27 | 2014-10-01 | 北京奇虎科技有限公司 | Message processing method and system |
CN104796531A (en) * | 2015-03-12 | 2015-07-22 | 天翼电信终端有限公司 | Method and system for protecting information privacy |
CN105574418A (en) * | 2015-05-29 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Data encryption method and apparatus |
-
2016
- 2016-11-18 WO PCT/CN2016/106439 patent/WO2018090332A1/en active Application Filing
- 2016-11-18 CN CN201680002671.9A patent/CN106716436A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9092918B2 (en) * | 2007-10-19 | 2015-07-28 | Natural Security | Contactless biometric authentication system and authentication method |
CN103902867A (en) * | 2012-12-26 | 2014-07-02 | 联想(北京)有限公司 | Information protection method and electronic device |
CN104023320A (en) * | 2014-05-14 | 2014-09-03 | 北京奇虎科技有限公司 | Message prompt method and device |
CN104284024A (en) * | 2014-09-30 | 2015-01-14 | 厦门美图移动科技有限公司 | Method for hiding contact person information on intelligent device |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107748848A (en) * | 2017-10-16 | 2018-03-02 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
CN108124055A (en) * | 2017-11-29 | 2018-06-05 | 努比亚技术有限公司 | Prompting message control method, flexible screen terminal and computer readable storage medium |
CN109151161A (en) * | 2018-06-27 | 2019-01-04 | Oppo广东移动通信有限公司 | display control method and related product |
US11450069B2 (en) | 2018-11-09 | 2022-09-20 | Citrix Systems, Inc. | Systems and methods for a SaaS lens to view obfuscated content |
CN110018872A (en) * | 2019-03-27 | 2019-07-16 | 阿里巴巴集团控股有限公司 | A kind of PUSH message treating method and apparatus |
US11201889B2 (en) | 2019-03-29 | 2021-12-14 | Citrix Systems, Inc. | Security device selection based on secure content detection |
CN110472446A (en) * | 2019-07-19 | 2019-11-19 | 平安科技(深圳)有限公司 | Message display method, device and storage medium, computer equipment |
US11544415B2 (en) | 2019-12-17 | 2023-01-03 | Citrix Systems, Inc. | Context-aware obfuscation and unobfuscation of sensitive content |
US11539709B2 (en) | 2019-12-23 | 2022-12-27 | Citrix Systems, Inc. | Restricted access to sensitive content |
US11582266B2 (en) | 2020-02-03 | 2023-02-14 | Citrix Systems, Inc. | Method and system for protecting privacy of users in session recordings |
US11361113B2 (en) | 2020-03-26 | 2022-06-14 | Citrix Systems, Inc. | System for prevention of image capture of sensitive information and related techniques |
US11165755B1 (en) | 2020-08-27 | 2021-11-02 | Citrix Systems, Inc. | Privacy protection during video conferencing screen share |
US11082374B1 (en) | 2020-08-29 | 2021-08-03 | Citrix Systems, Inc. | Identity leak prevention |
WO2022041163A1 (en) * | 2020-08-29 | 2022-03-03 | Citrix Systems, Inc. | Identity leak prevention |
US11627102B2 (en) | 2020-08-29 | 2023-04-11 | Citrix Systems, Inc. | Identity leak prevention |
CN112199495A (en) * | 2020-11-13 | 2021-01-08 | 北京明略软件系统有限公司 | Personnel message notification method, device, electronic equipment and computer readable storage medium |
CN116401651A (en) * | 2023-06-08 | 2023-07-07 | 深圳市晨歌电子有限公司 | Information storage safety protection method, system and storage medium |
CN116401651B (en) * | 2023-06-08 | 2023-09-19 | 深圳市晨歌电子有限公司 | Information storage safety protection method, system and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2018090332A1 (en) | 2018-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106716436A (en) | Information display method and system | |
US11394555B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
CN104009977B (en) | A kind of method and system of information protection | |
CN106534572A (en) | Information display method and device and terminal | |
EP2211286B1 (en) | Method for securing an interface between a user and an application, corresponding system, terminal and computer program | |
CN107609508A (en) | A kind of face identification method, terminal and computer-readable recording medium | |
CN107622203A (en) | Guard method, device, storage medium and the electronic equipment of sensitive information | |
CN105068974A (en) | Information processing method and electronic device | |
US11270119B2 (en) | Video privacy using machine learning | |
CN105701420B (en) | A kind of management method and terminal of user data | |
CN105471877B (en) | Proof data acquisition methods and device | |
CN107995170A (en) | Auth method, device, computer equipment and computer-readable recording medium | |
CN107466031A (en) | A kind of method and terminal for protecting data | |
CN109753808A (en) | A kind of privacy compromise methods of risk assessment and device | |
CN109191635A (en) | Objective method, apparatus and storage medium are sentenced based on face recognition technology | |
CN112734436A (en) | Terminal and method for supporting face recognition | |
CN106254626A (en) | A kind of incoming display method and terminal | |
CN107358120A (en) | Document edit method and device, terminal device and computer-readable recording medium | |
CN107256367A (en) | A kind of information processing method and device, terminal device and computer-readable recording medium | |
CN109376545A (en) | Method for secret protection and device | |
CN106203092A (en) | Method and device for intercepting shutdown of malicious program and electronic equipment | |
EP4276595A1 (en) | Content display method and apparatus, and device and storage medium | |
CN112800401B (en) | Privacy processing method, privacy processing device and terminal | |
CN106685945A (en) | Service request processing method, verifying method of service handling number, and terminal thereof | |
US20100310061A1 (en) | Account number security system with communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170524 |