CN106716436A - Information display method and system - Google Patents

Information display method and system Download PDF

Info

Publication number
CN106716436A
CN106716436A CN201680002671.9A CN201680002671A CN106716436A CN 106716436 A CN106716436 A CN 106716436A CN 201680002671 A CN201680002671 A CN 201680002671A CN 106716436 A CN106716436 A CN 106716436A
Authority
CN
China
Prior art keywords
information
message
private content
content
initial message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201680002671.9A
Other languages
Chinese (zh)
Inventor
高斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloudminds Shenzhen Robotics Systems Co Ltd
Cloudminds Inc
Original Assignee
Cloudminds Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Inc filed Critical Cloudminds Inc
Publication of CN106716436A publication Critical patent/CN106716436A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

An information display method and system, the method comprising the steps of: receiving an initial message; scanning the initial message content according to a preset private content library; masking the private content found in the initial message and normally displaying other content of the initial message; detecting the status of the authentication information of a user, and when the authentication information is verified, displaying all content of the original message; and when the authentication information is not verified, displaying the other content except the found private content.

Description

Information displaying method and system
Technical field
The application is related to intelligent terminal message processing technique, for example, be related to a kind of safe browsing method of specific information and be System.
Background technology
At present, intelligent terminal has incorporated daily life, and communication, trip, shopping, Working Life always carve need High in the clouds big data is connected from intelligent terminal.It is related to the private informations such as consumption, account, the amount of money of individual also more next live simultaneously in It is more.Most mobile terminal applications (app) need to register respective system by intelligent terminal to reach mobile terminal function Using account number, the application account of user's registration is more, then the mobile terminal can receive more PUSH messages or identifying code is short Letter etc., these message and short message in most cases belong to the private information of user.
And it is current, the method for browsing message in mobile terminal mainly has two kinds, and one kind is on mobile terminal screen locking interface Briefly browse and receive message or short breath;Another kind is to open corresponding application to browse the message or short breath that each receive.
In order to reach the purpose that safety browses private information, existing technical finesse means are in message or short message Hold Hide All to get up or the content of short message is all made into Fuzzy Processing, or the message that imperfect display is received.This is finished The mode of full Fuzzy Processing or imperfect display message is limited the need for user browses message content in itself.Use cannot be met Family is it should be understood that message content wishes the demand that sensitive private information is protected again.
Prior art browses another method of message, such as under Android system environment, system is in notification message Notify centrally disposed various modes, one of which is exactly the shielding to content, the message of shielding and short breath display reminding figure Mark and the title of application, cannot browse to the particular content of message under this kind of mode.Under this kind of mask pattern, locking screen interface System message does not just show the content of private message, and user browses message if desired, then need to open and enter receive message or The corresponding application of the short breath of person, can just find message content.This kind of message browsing method also limit user and browse message content, and And the operation of mobile terminal user is increased, it is bad using inconvenient viewing experience.
In addition, with the intelligent mobile terminals such as mobile terminal carried individual correlation private information increasingly enrich and The display trend of mobile terminal is presented screen enlarging feature, and the large screen display of mobile terminal and touch screen operation easily reveal communication Individual's private information such as record, account, password.
Therefore, the message browsing mode of prior art needs to improve.
The content of the invention
The application technical problem to be solved is to provide one kind and meets the need for user browses message content while protect again To the safe and reliable information displaying method of sensitive private information, and shielding protection sensitivity private information can be by user certainly Row configuration, while the private information Browsing Safety while Using of mobile terminal is increased, improves the body that user profile or short message are browsed Test.
In order to solve the above technical problems, the application provides following technical scheme.
In a first aspect, the embodiment of the present application provides a kind of information displaying method, comprise the following steps:
Receive initial message;
The initial message content is scanned according to default private content storehouse;
The private content shielding that will be found in the initial message, and the other guide in initial message is normally shown;
The checking information state of user is detected, when the checking information is verified, the full content of the initial message is shown; When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
In the specific implementation, the checking information can be biological information, and the checking of the biological information includes fingerprint At least one kind of checking, iris verification and voice print verification.
Preferably, the information displaying method also includes updating setting the private content storehouse.
Wherein, the private content storehouse includes shielding keyword and removing property keyword.
Optionally, the private content at least includes the name in numeral, the amount of money, address, the address list of setting.
Second aspect, the embodiment of the present application additionally provides a kind of information display system, including:
Receiver module, for receiving initial message;
Scan module, for scanning the initial message content according to default private content storehouse;
Shroud module, the private content shielding that will be found in the initial message, and by the other guide in initial message just Often display;
Detection module, detects the checking information state of user, when the checking information is verified, shows the initial message Full content;When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
During specific implementation, the checking information is biological information, and the biological information is verified as fingerprint authentication, rainbow Film checking and at least one kind of voice print verification.
The information display system also includes updating setup module, and the private content storehouse is set for updating.
Wherein, the private content storehouse includes shielding keyword and removing property keyword.
The private content at least includes the name in numeral, the amount of money, address, the address list of setting.
The third aspect, the embodiment of the present application additionally provides a kind of electronic equipment, including:
At least one processor;And,
The memory being connected with least one processor communication;Wherein,
The memory storage has can be by the instruction of at least one computing device, and the instruction is by described at least one Individual computing device, so that at least one processor is able to carry out method as described above.
Fourth aspect, the embodiment of the present application additionally provides a kind of non-volatile computer readable storage medium storing program for executing, the calculating Machine readable storage medium storing program for executing is stored with computer executable instructions, and the computer executable instructions are used to make computer perform as above Described method.
5th aspect, the embodiment of the present application additionally provides a kind of computer program product, the computer program product bag Computer program of the storage on non-volatile computer readable storage medium storing program for executing is included, the computer program includes programmed instruction, When described program instruction is computer-executed, the computer is set to perform method as described above.
The beneficial effect of the application is, information displaying method and electronic equipment that the embodiment of the present application is provided, Ji Nengman Sufficient user protects the security to sensitive private information again simultaneously the need for browsing message content;And the private content storehouse can be with Voluntarily configured by user, while the private content for realizing mobile terminal is browsed safely, can be set according to actual conditions needs to protect Shield and the content of shielding, improve the experience that user profile or short message are browsed;In addition, the embodiment of the present application sets timing detection life The detection module of thing characteristic information proofing state so that the user that only mobile terminal pre-sets can just see and browse shielding Private content, improves the security of information browse, in case the personal private information such as stopping leak dew log, account, password;Together When, when biological information checking does not pass through, only the private content of message is shielded, and is had no effect on user and is understood initial message Other contents.
Brief description of the drawings
One or more embodiments are illustrative by the picture in corresponding accompanying drawing, these exemplary theorys The bright restriction not constituted to embodiment, the element with same reference numbers label is expressed as similar element in accompanying drawing, removes It is non-to have especially statement, the figure not composition limitation in accompanying drawing.
Fig. 1 is the broad flow diagram of the information displaying method that the embodiment of the present application is provided;
Fig. 2 is the module map of the information display system wherein embodiment mobile terminal that the embodiment of the present application is provided;
Fig. 3 is the particular flow sheet of the information displaying method that the embodiment of the present application is provided;
Fig. 4 is the first application scenarios schematic diagram of the information displaying method that the embodiment of the present application is provided;
Fig. 5 is the second application scenarios schematic diagram of the information displaying method that the embodiment of the present application is provided
Fig. 6 is the 3rd application scenarios schematic diagram of the information displaying method that the embodiment of the present application is provided;
Fig. 7 is the 4th application scenarios schematic diagram of the information displaying method that the embodiment of the present application is provided;
Fig. 8 is the module map of the information display system that the embodiment of the present application is provided;And
Fig. 9 is that the hardware configuration of the electronic equipment of the execution specific information methods of exhibiting that the embodiment of the present application is provided is illustrated Figure.
Specific embodiment
In order that the object, technical solution and advantage of the application become more apparent, it is right below in conjunction with drawings and Examples The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the present invention, not For limiting the present invention.
Refering to shown in Fig. 1, the application is related to the safe browsing method of specific information, comprises the following steps:
Receive initial message;The initial message content is scanned according to default private content storehouse;To be looked in the initial message The private content shielding arrived;The checking information state of user is detected, when the checking information is verified, the initial message is shown Full content;When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
Wherein, the private content at least includes the name in numeral, the amount of money, address, the address list of setting.
Fig. 8 is refer to, the module map of the information display system of the application is shown, wherein, the information display system includes: Receiver module, for receiving initial message;Scan module, for being scanned in the initial message according to default private content storehouse Hold;Shroud module, the private content shielding that will be found in the initial message, and the other guide in initial message is normally shown Show;Detection module, detects the checking information state of user, when the checking information is verified, shows the whole of the initial message Content;When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
The information display system also includes updating setup module, and the private content storehouse is set for updating.
Fig. 2 to Fig. 3 is refer to, in order to illustrate the information display system, is illustrated by by taking mobile terminal as an example below Illustrate, the mobile terminal is specially:
The mobile terminal includes some applications 210, message center 220 and display module 230.Wherein, in order to realize only shielding Private content is covered, the mobile terminal also includes shroud module, and show whole initial messages, the movement only under user intention Terminal also includes detection module.
Those of ordinary skill in the art can derive, some applications 210 of mobile terminal and message center 220 can be with Shroud module and detection module are respectively provided with, to realize browsing the information security of all message and short message.In the reality of the application Apply in example, the message center 220 also includes shroud module 110a and detection module 215a.In order that all initial messages for receiving The shielding of private content can be realized, each application can include shroud module 110b and detection module 215b.
The private content storehouse is set in order to update, the mobile terminal also includes updating setup module 250.Set by the renewal Putting module 250 can be to private content, such as name in numeral, the amount of money, address, address list etc. is set.
Wherein, the initial message that shroud module 110a, 110b is received according to the scanning of default private content storehouse, and should The private content shielding found in initial message.
The detection module 215a, 215b, the checking information state for detecting user;
Display module 230 shows the full content of the initial message when the checking information is verified;Or in checking When Information Authentication does not pass through, other message contents in addition to the private content for finding are shown.
In the embodiment of the present application, the checking information is biological information, and the biological information is verified as fingerprint inspection At least one kind of card, iris verification and voice print verification.In order to illustrate the application, below by taking fingerprint authentication as an example It is illustrated.
The display module is used to show full content or displaying other contents of initial message and the shielding of initial message Private content, that is, shielding private content shielding message.
The shroud module 110a, 110b are used to scan initial message according to default private content storehouse, and according to configuration Shielding parameter shields the private content swept in the initial message and forms shielding message.The detection module 215a, 215b are used for fixed When detection user fingerprint authentication state;Wherein, when fingerprint authentication passes through, initial message is shown in the display module 230;Fingerprint Show the shielding message of shielding private content when checking does not pass through in the display module 230.
Biological information checking depends on different security needs, can be fingerprint authentication, iris verification and sound The one of which or various of line checking.The biology of correspondence detection module, the notice center or application call mobile terminal is special Levy monitoring result.Wherein, the biometric informations such as fingerprint, iris, the vocal print of user are stored in the mobile terminal or other can Verify the information of user identity.
The shielding parameter of the configuration needs to determine according to the different of different system, and the shielding mode in the shielding parameter can be with It is that private content to scanning does each byte of Fuzzy Processing or private content and substitutes and be shown as " * " number, Huo Zheqi Its user's None- identified understands the mode of content.
The private content storehouse includes shielding keyword and removing property keyword.User can manually set the shielding keyword With removing property keyword.
The such as numerical portion of the private content storehouse including bank, Alipay, wechat etc. in the information in source.With receipts Enter, wage, the numerical portion of the information of check code word.
User can set in the message of mobile terminal or can using which information (numeral, account, bank's card number) is set To be shielded or not shielded.
For another example shielding mode can be the numerical portion after active scan and shielding setting keyword.When message center or During using detecting in the real information that receives comprising keywords such as wage, check codes, the number behind shielding wage, check code Character segment.
In addition, the shielding to non-private content need to be excluded.Commonly used telephone number, the postcode information for such as storing, to these Information is not shielded.And for example for the information related to consumption for receiving, the digital information for paying the amount of money of (consumption) is not shielded.
Fig. 4 to Fig. 7 is refer to, several application scenarios for showing the information displaying method of the embodiment of the present application offer are illustrated Figure.By taking fingerprint authentication as an example, when the mobile terminal user of advance binding puts hand to be verified at the fingerprint authentication at the terminal back side Refer to, mobile terminal takes the fingerprint and verifies fingerprint, detection module 215a, 215b timing extraction fingerprint authentication data, fingerprint inspection Card is when passing through, and message center 220 pushes the full content of initial message or applies 210 in the locking screen interface of mobile terminal 200 It is middle to show initial message or from pushing unscreened initial message to message center 220 using 210;When fingerprint authentication does not pass through When, message center 220 pushes the shielding message of shielding private content in the locking screen interface of mobile terminal 200;Or applying 210 Middle displaying shielding message;Or from pushing shielding message to message center 220 using 210.It is non-exclusive when fingerprint authentication does not pass through User can't see private content, but can see the content of the initial message in addition to private content.
Private content in the application is accompanied by the biometric authentication of user and shows, is transient state, with utmost Protection message privacy and security.Finger-print region is touched when user's finger and during by verifying, showing the whole of initial message Content, the initial message does not shield content.When user's finger leaves finger-print region, private content is hidden by shielding again.
As shown in Figures 4 to 7, for example:When there is payment information, " your payment check code 123456 " is received, at shielding Numeral 123456 is only shielded during reason, is shown as " your payment check code * * * * * * ".When pickup information is received, the default position of shielding Several numerals, such as 6 pickup codes, " please taking mail with pickup code 123456 to service centre " shows after shielding processing It is " please taking mail with pickup code * * * * * * to service centre ".During the information that keeps accounts, information " receives 123456 yuan of wage ", wherein Fuzzy display information " 123456 ";Or it is replaced and is shown as " receiving wage * * * * * * units ".When payment information is received, preset Show position after numeral behind shielding RMB, such as " your account occur that payment withhold RMB 123456 " shielding processing " your account occur that payment withhold RMB * * * * * * ".
On the premise of shroud module is arranged on server, it is also possible to each complete system by message center 220 and application 210 Unite biological characteristic validation detection and judge information exhibition method.From for system module, the application and message center are all set There is each self-detection module.
Please also refer to Fig. 6, implement:
1. server transmitting terminal generates initial message.
2. transmitting terminal sends message.Initial message is sent to receiving terminal mobile terminal.
3. receiving terminal, mobile terminal receives initial message, and monitoring modular 215a, 215b are based on private content storehouse and find just Private message in beginning message, shroud module 110a, 110b shielding initial message, is shown as initial message:" you receive work Money * * * * * * units ".
4. receiving terminal, user verifies identity by biological information verification modes such as fingerprints;
5. receiving terminal, when biological information is verified, message is shown as:" you receive 123456 yuan of wage ".
6. receiving terminal, after user fingerprints leave biological information identifying device, as shown in fig. 6, initial message " you receive 123456 yuan of wage " is shielded again, and display is reduced to " you receive wage * * * * * * units ".
Fig. 6-8 are refer to, the application further relates to a kind of information displaying method.
The safe browsing method of specific information is mainly included the following steps that:Receive initial message;According in default secret Rong Ku scans the initial message content;The private content shielding that will be found in the initial message;Detect the checking information shape of user State, when the checking information is verified, shows the full content of the initial message;When checking information checking does not pass through, display is removed Other message contents outside the private content for finding.
It is as follows with the detailed description that different implementation methods is different.
Fig. 3 is refer to, the particular flow sheet of the information displaying method of the application is shown.
Step 301:The application of mobile terminal or notice center receive initial message, the application of mobile terminal or notice Centre scan initial message content;Whether initial message is judged comprising default private content, if not including private content, Terminate scanning, in application or locking screen interface displaying initial message all the elements;
Step 303:If comprising private content, the shroud module private content swept to of shielding, displaying initial message its Its content and the private content of shielding;
Step 305:Monitoring modular timing detection biological information proofing state, when checking does not pass through, displaying initially disappears The private content of other contents and shielding is ceased, is shown when being verified in the secret of other contents of initial message and shielding Hold;This step is to ensure that the display of private content is the fingerprint verification operation based on user, the fingerprint authentication if user moves away, Initial message recovers to be shielded;
Step 307:Monitoring modular in user fingerprints verification process, test by timing detection biological information proofing state When card does not pass through, continue to show the private content of other contents of initial message and shielding, when being verified, continue to show initially Other contents of message and the private content of shielding.
Information displaying method and mobile terminal that the embodiment of the present application is provided, can meet the need that user browses message content To protect the security to sensitive private information again simultaneously;And the private content storehouse can voluntarily be configured by user, realizing While the private content of mobile terminal is browsed safely, the content that need to be protected and shield can be set according to actual conditions, improved and used The experience that family information or short message are browsed.Also, the detection module of biological information proofing state is detected by setting timing, So that the exclusive user of mobile terminal can just browse the private content of shielding, improve the security of information browse prevents leakage logical The personal private information such as news record, account, password.Meanwhile, when biological information checking does not pass through, specific information is mobile whole End is shown as mask information all the time, and the full content of initial information is only shown when user biological characteristic information is verified, than As user once moves away the finger of fingerprint authentication, then real information is shown as mask information automatically, and user is easy to operate, improves User's operating experience;Also, the private content storehouse for setting can voluntarily be set by user so that user can be set according to actual conditions The content of required shielding, meets the shielding demand that user is continually changing.
Fig. 9 is the hardware architecture diagram of the electronic equipment 600 of the information displaying method that the embodiment of the present application is provided, and is such as schemed Shown in 9, the electronic equipment 600 includes:
One or more processors 610, memory 620 and human-computer interaction device 630, with a processor 610 in Fig. 9 As a example by.
Processor 610, memory 620 and human-computer interaction device 630 can be connected by bus or other modes, figure In 9 as a example by being connected by bus.
Memory 620 can be used to store non-volatile software journey as a kind of non-volatile computer readable storage medium storing program for executing Sequence, non-volatile computer executable program and module, such as corresponding program of the information displaying method in the embodiment of the present application Instruction/module (for example, shroud module 110a, 110b shown in accompanying drawing 2, monitoring modular 215a, 215b and setup module 250). Processor 610 is by running the non-volatile software program stored in memory 620, instructing and module, so as to perform clothes The various function application of business device and data processing, that is, realize the information displaying method in above method embodiment.
Memory 620 can include storing program area and storage data field, wherein, storing program area can store operation system Application program required for system, at least one function;Storage data field can store the use institute for showing electronic equipment according to information Data of establishment etc..Additionally, memory 620 can include high-speed random access memory, non-volatile memories can also be included Device, for example, at least one disk memory, flush memory device or other non-volatile solid state memory parts.In some embodiments In, memory 620 is optional including the memory remotely located relative to processor 610, and these remote memories can be by net Network is connected to information displaying electronic equipment.The example of above-mentioned network include but is not limited to internet, intranet, LAN, Mobile radio communication and combinations thereof.
One or more of module storages are complete by human-computer interaction device 630 in user in the memory 620 Into after the setting interaction in private content storehouse, when being performed by one or more of processors 610, above-mentioned any side is performed Information displaying method in method embodiment, for example, the method and step in performing Fig. 1 described above and the method step in Fig. 3 Rapid 301 to step 307, realizes covering module 110a, 110b in Fig. 2, monitoring modular 215a, 215b's and setup module 250 etc. Function.
The method that the executable the embodiment of the present application of the said goods is provided, possesses the corresponding functional module of execution method and has Beneficial effect.Not ins and outs of detailed description in the present embodiment, reference can be made to the method that the embodiment of the present application is provided.
The electronic equipment of the embodiment of the present application exists in a variety of forms, including but not limited to:
(1) mobile communication equipment:The characteristics of this kind equipment is that possess mobile communication function, and to provide speech, data It is main target to communicate.This Terminal Type includes:Smart mobile phone (such as iPhone), multimedia handset, feature mobile phone, and it is low End mobile phone etc..
(2) super mobile personal computer equipment:This kind equipment belongs to the category of personal computer, there is calculating and treatment work( Can, typically also possess mobile Internet access characteristic.This Terminal Type includes:PDA, MID and UMPC equipment etc., such as iPad.
(3) portable entertainment device:This kind equipment can show and play content of multimedia.The kind equipment includes:Audio, Video player (such as iPod), handheld device, e-book, and intelligent toy and portable car-mounted navigation equipment.
(4) server:The equipment for providing the service of calculating, the composition of server includes that processor, hard disk, internal memory, system are total Line etc., server is similar with general computer architecture, but due to needing to provide highly reliable service, therefore in treatment energy The requirement of the aspects such as power, stability, reliability, security, scalability, manageability is higher.
(5) other have the electronic installation of data interaction function.
The embodiment of the present application provides a kind of non-volatile computer readable storage medium storing program for executing, the computer-readable storage medium Matter is stored with computer executable instructions, and the computer executable instructions are executed by one or more processors, such as in Fig. 9 One processor 610, may be such that the information displaying that said one or multiple processors can perform in above-mentioned any means embodiment Method, for example, the method and step in performing Fig. 1 described above and the method and step 301 in Fig. 3 realize figure to step 307 Module 110a, 110b, the function of monitoring modular 215a, 215b and setup module 250 etc. are covered in 2.
Device embodiment described above is only schematical, wherein the unit illustrated as separating component can To be or may not be physically separate, the part shown as unit can be or may not be physics list Unit, you can with positioned at a place, or can also be distributed on multiple NEs.It can according to the actual needs be selected In some or all of module realize the purpose of this embodiment scheme.
Through the above description of the embodiments, those of ordinary skill in the art can be understood that each implementation method Can add the mode of general hardware platform by software to realize, naturally it is also possible to by hardware.Those of ordinary skill in the art can Realize that all or part of flow in above-described embodiment method can be by computer program to instruct the hard of correlation with understanding Part is completed, and described program can be stored in a computer read/write memory medium, the program is upon execution, it may include as above State the flow of the embodiment of each method.Wherein, described storage medium can be magnetic disc, CD, read-only memory (Read- Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
Finally it should be noted that:Above example is only used to illustrate the technical scheme of the application, rather than its limitations;At this Under the thinking of application, can also be combined between the technical characteristic in above example or different embodiment, step can be with Realized with random order, and there are many other changes of the different aspect of the application as described above, for simplicity, they do not have Have and provided in details;Although being described in detail to the application with reference to the foregoing embodiments, the ordinary skill people of this area Member should be understood:It can still modify to the technical scheme described in foregoing embodiments, or to which part skill Art feature carries out equivalent;And these modifications or replacement, the essence of appropriate technical solution is departed from each reality of the application Apply the scope of a technical scheme.

Claims (13)

1. a kind of information displaying method, it is characterised in that comprise the following steps:
Receive initial message;
The initial message content is scanned according to default private content storehouse;
The private content shielding that will be found in the initial message, and the other guide in initial message is normally shown;
The checking information state of user is detected, when the checking information is verified, the full content of the initial message is shown; When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
2. method according to claim 1, it is characterised in that the checking information is biological information, the biology The checking of characteristic information includes at least one kind of fingerprint authentication, iris verification and voice print verification.
3. method according to claim 1, it is characterised in that the private content storehouse also is set including updating.
4. the method according to claim 1-3 any one, it is characterised in that the private content storehouse includes that shielding is crucial Word and removing property keyword.
5. method according to claim 4, it is characterised in that the private content at least include the numeral of setting, the amount of money, Name in address, address list.
6. a kind of information display system, it is characterised in that including:
Receiver module, for receiving initial message;
Scan module, for scanning the initial message content according to default private content storehouse;
Shroud module, the private content shielding that will be found in the initial message, and the other guide in initial message is normal Display;
Detection module, detects the checking information state of user, when the checking information is verified, shows the initial message Full content;When checking information checking does not pass through, other message contents in addition to the private content for finding are shown.
7. information display system according to claim 6, it is characterised in that the checking information is biological information, At least one kind for being verified as fingerprint authentication, iris verification and voice print verification of the biological information.
8. information display system according to claim 6, it is characterised in that also including updating setup module, for updating The private content storehouse is set.
9. the information display system according to claim 6-8 any one, it is characterised in that the private content storehouse includes Shielding keyword and removing property keyword.
10. information display system according to claim 9, it is characterised in that the private content at least includes setting Name in numeral, the amount of money, address, address list.
11. a kind of electronic equipment, wherein, including:
At least one processor;And,
The memory being connected with least one processor communication;Wherein,
The memory storage has can be by the instruction of at least one computing device, and the instruction is by described at least one Reason device is performed, so that at least one processor is able to carry out the method described in claim any one of 1-5.
A kind of 12. non-volatile computer readable storage medium storing program for executing, wherein, the computer-readable recording medium storage has computer Executable instruction, the computer executable instructions are used to make the method described in computer perform claim requirement any one of 1-5.
A kind of 13. computer program products, wherein, the computer program product includes that storage is readable in non-volatile computer Computer program on storage medium, the computer program includes programmed instruction, when described program instruction is computer-executed When, make the method described in the computer perform claim requirement any one of 1-5.
CN201680002671.9A 2016-11-18 2016-11-18 Information display method and system Pending CN106716436A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/106439 WO2018090332A1 (en) 2016-11-18 2016-11-18 Method and system for displaying information

Publications (1)

Publication Number Publication Date
CN106716436A true CN106716436A (en) 2017-05-24

Family

ID=58903964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680002671.9A Pending CN106716436A (en) 2016-11-18 2016-11-18 Information display method and system

Country Status (2)

Country Link
CN (1) CN106716436A (en)
WO (1) WO2018090332A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107748848A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN108124055A (en) * 2017-11-29 2018-06-05 努比亚技术有限公司 Prompting message control method, flexible screen terminal and computer readable storage medium
CN109151161A (en) * 2018-06-27 2019-01-04 Oppo广东移动通信有限公司 display control method and related product
CN110018872A (en) * 2019-03-27 2019-07-16 阿里巴巴集团控股有限公司 A kind of PUSH message treating method and apparatus
CN110472446A (en) * 2019-07-19 2019-11-19 平安科技(深圳)有限公司 Message display method, device and storage medium, computer equipment
CN112199495A (en) * 2020-11-13 2021-01-08 北京明略软件系统有限公司 Personnel message notification method, device, electronic equipment and computer readable storage medium
US11082374B1 (en) 2020-08-29 2021-08-03 Citrix Systems, Inc. Identity leak prevention
US11165755B1 (en) 2020-08-27 2021-11-02 Citrix Systems, Inc. Privacy protection during video conferencing screen share
US11201889B2 (en) 2019-03-29 2021-12-14 Citrix Systems, Inc. Security device selection based on secure content detection
US11361113B2 (en) 2020-03-26 2022-06-14 Citrix Systems, Inc. System for prevention of image capture of sensitive information and related techniques
US11450069B2 (en) 2018-11-09 2022-09-20 Citrix Systems, Inc. Systems and methods for a SaaS lens to view obfuscated content
US11539709B2 (en) 2019-12-23 2022-12-27 Citrix Systems, Inc. Restricted access to sensitive content
US11544415B2 (en) 2019-12-17 2023-01-03 Citrix Systems, Inc. Context-aware obfuscation and unobfuscation of sensitive content
US11582266B2 (en) 2020-02-03 2023-02-14 Citrix Systems, Inc. Method and system for protecting privacy of users in session recordings
CN116401651A (en) * 2023-06-08 2023-07-07 深圳市晨歌电子有限公司 Information storage safety protection method, system and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245516A (en) * 2019-05-09 2019-09-17 阿里巴巴集团控股有限公司 A kind of message treatment method and device
CN115240281A (en) * 2022-09-23 2022-10-25 平安银行股份有限公司 Private information display method and device, storage medium and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902867A (en) * 2012-12-26 2014-07-02 联想(北京)有限公司 Information protection method and electronic device
CN104023320A (en) * 2014-05-14 2014-09-03 北京奇虎科技有限公司 Message prompt method and device
CN104284024A (en) * 2014-09-30 2015-01-14 厦门美图移动科技有限公司 Method for hiding contact person information on intelligent device
US9092918B2 (en) * 2007-10-19 2015-07-28 Natural Security Contactless biometric authentication system and authentication method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104079475A (en) * 2014-06-27 2014-10-01 北京奇虎科技有限公司 Message processing method and system
CN104796531A (en) * 2015-03-12 2015-07-22 天翼电信终端有限公司 Method and system for protecting information privacy
CN105574418A (en) * 2015-05-29 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Data encryption method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9092918B2 (en) * 2007-10-19 2015-07-28 Natural Security Contactless biometric authentication system and authentication method
CN103902867A (en) * 2012-12-26 2014-07-02 联想(北京)有限公司 Information protection method and electronic device
CN104023320A (en) * 2014-05-14 2014-09-03 北京奇虎科技有限公司 Message prompt method and device
CN104284024A (en) * 2014-09-30 2015-01-14 厦门美图移动科技有限公司 Method for hiding contact person information on intelligent device

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107748848A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 A kind of information processing method and mobile terminal
CN108124055A (en) * 2017-11-29 2018-06-05 努比亚技术有限公司 Prompting message control method, flexible screen terminal and computer readable storage medium
CN109151161A (en) * 2018-06-27 2019-01-04 Oppo广东移动通信有限公司 display control method and related product
US11450069B2 (en) 2018-11-09 2022-09-20 Citrix Systems, Inc. Systems and methods for a SaaS lens to view obfuscated content
CN110018872A (en) * 2019-03-27 2019-07-16 阿里巴巴集团控股有限公司 A kind of PUSH message treating method and apparatus
US11201889B2 (en) 2019-03-29 2021-12-14 Citrix Systems, Inc. Security device selection based on secure content detection
CN110472446A (en) * 2019-07-19 2019-11-19 平安科技(深圳)有限公司 Message display method, device and storage medium, computer equipment
US11544415B2 (en) 2019-12-17 2023-01-03 Citrix Systems, Inc. Context-aware obfuscation and unobfuscation of sensitive content
US11539709B2 (en) 2019-12-23 2022-12-27 Citrix Systems, Inc. Restricted access to sensitive content
US11582266B2 (en) 2020-02-03 2023-02-14 Citrix Systems, Inc. Method and system for protecting privacy of users in session recordings
US11361113B2 (en) 2020-03-26 2022-06-14 Citrix Systems, Inc. System for prevention of image capture of sensitive information and related techniques
US11165755B1 (en) 2020-08-27 2021-11-02 Citrix Systems, Inc. Privacy protection during video conferencing screen share
US11082374B1 (en) 2020-08-29 2021-08-03 Citrix Systems, Inc. Identity leak prevention
WO2022041163A1 (en) * 2020-08-29 2022-03-03 Citrix Systems, Inc. Identity leak prevention
US11627102B2 (en) 2020-08-29 2023-04-11 Citrix Systems, Inc. Identity leak prevention
CN112199495A (en) * 2020-11-13 2021-01-08 北京明略软件系统有限公司 Personnel message notification method, device, electronic equipment and computer readable storage medium
CN116401651A (en) * 2023-06-08 2023-07-07 深圳市晨歌电子有限公司 Information storage safety protection method, system and storage medium
CN116401651B (en) * 2023-06-08 2023-09-19 深圳市晨歌电子有限公司 Information storage safety protection method, system and storage medium

Also Published As

Publication number Publication date
WO2018090332A1 (en) 2018-05-24

Similar Documents

Publication Publication Date Title
CN106716436A (en) Information display method and system
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN104009977B (en) A kind of method and system of information protection
CN106534572A (en) Information display method and device and terminal
EP2211286B1 (en) Method for securing an interface between a user and an application, corresponding system, terminal and computer program
CN107609508A (en) A kind of face identification method, terminal and computer-readable recording medium
CN107622203A (en) Guard method, device, storage medium and the electronic equipment of sensitive information
CN105068974A (en) Information processing method and electronic device
US11270119B2 (en) Video privacy using machine learning
CN105701420B (en) A kind of management method and terminal of user data
CN105471877B (en) Proof data acquisition methods and device
CN107995170A (en) Auth method, device, computer equipment and computer-readable recording medium
CN107466031A (en) A kind of method and terminal for protecting data
CN109753808A (en) A kind of privacy compromise methods of risk assessment and device
CN109191635A (en) Objective method, apparatus and storage medium are sentenced based on face recognition technology
CN112734436A (en) Terminal and method for supporting face recognition
CN106254626A (en) A kind of incoming display method and terminal
CN107358120A (en) Document edit method and device, terminal device and computer-readable recording medium
CN107256367A (en) A kind of information processing method and device, terminal device and computer-readable recording medium
CN109376545A (en) Method for secret protection and device
CN106203092A (en) Method and device for intercepting shutdown of malicious program and electronic equipment
EP4276595A1 (en) Content display method and apparatus, and device and storage medium
CN112800401B (en) Privacy processing method, privacy processing device and terminal
CN106685945A (en) Service request processing method, verifying method of service handling number, and terminal thereof
US20100310061A1 (en) Account number security system with communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170524