CN106936998B - Screenshotss method and screen video recorder - Google Patents

Screenshotss method and screen video recorder Download PDF

Info

Publication number
CN106936998B
CN106936998B CN201710171097.6A CN201710171097A CN106936998B CN 106936998 B CN106936998 B CN 106936998B CN 201710171097 A CN201710171097 A CN 201710171097A CN 106936998 B CN106936998 B CN 106936998B
Authority
CN
China
Prior art keywords
user name
preset
identification information
screen
matched
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710171097.6A
Other languages
Chinese (zh)
Other versions
CN106936998A (en
Inventor
王柯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710171097.6A priority Critical patent/CN106936998B/en
Publication of CN106936998A publication Critical patent/CN106936998A/en
Application granted granted Critical
Publication of CN106936998B publication Critical patent/CN106936998B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72439User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure is directed to a kind of screenshotss method and screen video recorders.This method comprises: obtaining the user name to include on screenshotss interface when receiving screenshotss instruction, wherein the screenshotss instruction, which is used to indicate, executes screenshotss operation to screenshotss interface to described;The user name and pre-set user name each in pre-set user name database are compared respectively;When the user name and each pre-set user name mismatch, the screenshotss operation is executed.The embodiment effectively prevents pre-set user name by the risk of malice screenshotss.

Description

Screen capturing method and screen capturing device
Technical Field
The present disclosure relates to the field of information processing technologies, and in particular, to a screen capture method and a screen capture device.
Background
At present, more and more terminals are configured with a screen capture function, and after detecting that a user presses a screen capture shortcut key, the terminal captures a currently displayed picture on a display screen of the terminal, and stores the captured picture as a picture (generally called a screenshot), so that the user can share the picture.
In general, in the daily screen capturing operation of a user, the captured interface sometimes comprises a user name. For example, the intercepted interface is an interface for short message interaction among friends. However, the user name currently displayed on the display screen of the terminal may be manually changed, or the user name may be tampered with before the screen capturing operation. In such cases, the intercepted interface is placed on the network, sometimes compromising the interests or reputation of the tampered person. For example, the user a modifies the user name on the social network into a celebrity user name, the celebrity user name is the same as the user name of the celebrity B on the social network, at this time, the user a pretends to be that the celebrity B issues malicious network information, and after the network information is subjected to screen capture and propagation, the benefit or reputation of the celebrity B is likely to be damaged.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a screen capture method and a screen capture device.
According to a first aspect of the embodiments of the present disclosure, there is provided a screen capture method applied to a terminal, the method including:
when a screen capture instruction is received, acquiring a user name included in an interface to be captured, wherein the screen capture instruction is used for indicating that screen capture operation is executed on the interface to be captured;
respectively comparing the user name with each preset user name in a preset user name database;
when the user name is not matched with each preset user name, executing the screen capturing operation;
wherein,
the method further comprises the following steps: when the user name is matched with at least one preset user name, acquiring preset identification information corresponding to the at least one preset user name; comparing the identification information corresponding to the user name with the preset identification information; when the identification information corresponding to the user name is matched with the preset identification information, executing the screen capturing operation; when the identification information corresponding to the user name is not matched with the preset identification information, prohibiting the screen capturing operation from being executed;
or,
the acquiring of the user name included on the interface to be screenshot includes: detecting whether a session window is included in the interface to be subjected to screen capturing; when the fact that the session window is included in the interface to be subjected to screen capturing is detected, a user name included in the session window is obtained;
or,
the method further comprises the following steps: when the user name is matched with any preset user name, the screen capturing operation is forbidden to be executed;
or,
the method further comprises the following steps: when the user name is matched with at least one preset user name, inquiring whether the contact way corresponding to the at least one preset user name is included in an address list of the terminal; when the address list of the terminal comprises the contact way corresponding to the at least one preset user name, executing the screen capturing operation; and when the contact way corresponding to the at least one preset user name is not included in the address list of the terminal, prohibiting the screen capturing operation from being executed.
According to a second aspect of the embodiments of the present disclosure, there is provided a screen capture apparatus, the apparatus including:
the device comprises a first acquisition module, a second acquisition module and a display module, wherein the first acquisition module is configured to acquire a user name included in a to-be-screenshot interface when a screenshot instruction is received, and the screenshot instruction is used for indicating that screenshot operation is performed on the to-be-screenshot interface;
the first comparison module is configured to compare the user name with each preset user name in a preset user name database respectively;
the first execution module is configured to execute the screen capturing operation when the user name is not matched with each preset user name;
wherein,
the device further comprises: the second acquisition module is configured to acquire preset identification information corresponding to at least one preset user name when the user name is matched with the at least one preset user name; the second comparison module is configured to compare the identification information corresponding to the user name with the preset identification information; the second execution module is configured to execute the screen capturing operation when the identification information corresponding to the user name is matched with the preset identification information; the first forbidding module is configured to forbid the screen capturing operation from being executed when the identification information corresponding to the user name is not matched with the preset identification information;
or,
the first obtaining module comprises: the detection submodule is configured to detect whether a session window is included in the interface to be subjected to screen capturing; the acquisition sub-module is configured to acquire a user name included in the session window when the session window is detected to be included in the interface to be subjected to screen capturing;
or,
the device further comprises: the second forbidding module is configured to forbid the screen capturing operation from being executed when the user name is matched with any preset user name;
or,
the device further comprises: the query module is configured to query whether a contact way corresponding to at least one preset user name is included in an address list of the terminal when the user name is matched with the at least one preset user name; the third execution module is configured to execute the screen capturing operation when the contact information corresponding to the at least one preset user name is included in the address book of the terminal; and the third forbidding module is configured to forbid the screen capturing operation when the contact way corresponding to the at least one preset user name is not included in the address list of the terminal.
According to a third aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium having instructions therein, which when executed by a processor of a terminal, enable the terminal to perform a screen capture method, the method comprising:
when a screen capture instruction is received, acquiring a user name included in an interface to be captured, wherein the screen capture instruction is used for indicating that screen capture operation is executed on the interface to be captured;
respectively comparing the user name with each preset user name in a preset user name database;
when the user name is not matched with each preset user name, executing the screen capturing operation;
wherein,
further comprising: when the user name is matched with at least one preset user name, acquiring preset identification information corresponding to the at least one preset user name; comparing the identification information corresponding to the user name with the preset identification information; when the identification information corresponding to the user name is matched with the preset identification information, executing the screen capturing operation; when the identification information corresponding to the user name is not matched with the preset identification information, prohibiting the screen capturing operation from being executed;
or,
the acquiring of the user name included on the interface to be screenshot includes: detecting whether a session window is included in the interface to be subjected to screen capturing; when the fact that the session window is included in the interface to be subjected to screen capturing is detected, a user name included in the session window is obtained;
or,
further comprising: when the user name is matched with any preset user name, the screen capturing operation is forbidden to be executed;
or,
further comprising: when the user name is matched with at least one preset user name, inquiring whether the contact way corresponding to the at least one preset user name is included in an address list of the terminal; when the address list of the terminal comprises the contact way corresponding to the at least one preset user name, executing the screen capturing operation; and when the contact way corresponding to the at least one preset user name is not included in the address list of the terminal, prohibiting the screen capturing operation from being executed.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the screen capturing method and device, the user name included in the screen capturing interface is compared with each preset user name in the preset user name database one by one, and after the fact that the user name included in the screen capturing interface is not matched with any preset user name in the preset user name database is guaranteed, screen capturing operation is performed on the screen capturing interface, and the risk that any preset user name in the preset user name database is maliciously captured is avoided.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow diagram illustrating a screen capture method in accordance with an exemplary embodiment.
FIG. 2 is a flow diagram illustrating another screen capture method in accordance with an exemplary embodiment.
FIG. 3 is a flow diagram illustrating another screen capture method in accordance with an exemplary embodiment.
FIG. 4 is a flow diagram illustrating another screen capture method in accordance with an exemplary embodiment.
FIG. 5 is a block diagram illustrating a screen capture device according to an exemplary embodiment.
FIG. 6 is another block diagram illustrating a screen capture device in accordance with an exemplary embodiment.
FIG. 7 is a block diagram illustrating a first acquisition module in a screen capture device according to an example embodiment.
FIG. 8 is another block diagram illustrating a screen capture device in accordance with an exemplary embodiment.
FIG. 9 is another block diagram illustrating a screen capture device in accordance with an exemplary embodiment.
FIG. 10 is a schematic diagram illustrating a screen capture device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
In order to avoid the occurrence of malicious screen capture, the disclosure provides a screen capture method and a screen capture device. Fig. 1 is a flowchart illustrating a screen capture method applied to a terminal according to an exemplary embodiment, and as shown in fig. 1, the method may include the following steps:
in step S11, when a screen capture instruction is received, a user name included in a to-be-captured interface is acquired, where the screen capture instruction is used to instruct to perform a screen capture operation on the to-be-captured interface.
In step S12, the user name is compared with each preset user name in the preset user name database.
In step S13, when the user name does not match each preset user name, the screen capturing operation is performed.
The disclosure proposes to add a user name (for example, the name of a celebrity, the name of a company, etc., which is not specifically limited by the disclosure) that may be maliciously captured to a preset user name database. The preset user name database may be factory set by the terminal, or may be set or added by the user of the terminal, and the disclosure is not particularly limited.
In a specific implementation process, the user name which is possibly subjected to malicious screen capturing can be added into a preset user name database, so that the screen capturing method provided by the disclosure can be adopted to protect the user name which is possibly subjected to malicious screen capturing.
Specifically, the screen capturing method includes screening user names included in a screen capturing interface by using a preset user name database after a screen capturing instruction is received and before screen capturing operation is executed, comparing the user names included in the screen capturing interface with each preset user name in the preset user name database one by one to judge whether the user names included in the screen capturing interface are possibly maliciously captured, and executing screen capturing operation after judging that the user names included in the screen capturing interface are not matched with (for example, are not identical to) any preset user name in the preset user name database. That is, after it is determined that the user name included on the interface to be screen-captured is not at risk of malicious screen capture, the screen capture operation is performed.
For example, to prevent the user from spreading the screenshot resulting from malicious screenshot on the social network, which could harm the reputation of the celebrity, a celebrity database may be pre-set, which includes the names of the various celebrities, for example: wangfei and the like.
Taking the example of the chat between the user a and the user B, in the process of the chat between the user a and the user B, the display screen of the terminal of the user a displays the chat interface between the user a and the user B. After detecting that the screen capture shortcut key is pressed down by the user A, the terminal of the user A acquires a user name included in a chat interface of the user A and the user B: user name of user a and user name of user B. And then comparing the user name of the user A and the user name of the user B with the names of the celebrities in the preset celebrity database respectively, and performing screen capturing operation when the user name of the user A and the user name of the user B are not matched with the names of the celebrities in the preset celebrity database.
Optionally, if the screen capture operation is executed on the terminal of the user a, only the user name of the user B in the chat partner may be authenticated by default (that is, whether the user name of the user B is matched with the preset user name in the preset user name database is compared), and the authentication of the user name of the user a is not executed, so that the execution efficiency is improved. Of course, the user name of user B and the user name of user a may be verified at the same time, or only the user name of user B may be verified.
Optionally, the obtaining of the user name included in the interface to be screenshot may be implemented in the following manner: detecting whether a session window is included in the interface to be subjected to screen capturing; and when the fact that the session window is included in the interface to be subjected to screen capturing is detected, acquiring the user name included in the session window. The embodiment can effectively avoid malicious screen capturing of the chat content of the user.
The interface to be screenshot is any interface displayed on a display screen of the terminal, and the interface to be screenshot changes along with the use condition of a user of the terminal. One possible scenario is: the interface to be screenshot includes a session window, and in this case, the user names included in the session window, that is, the user names of both parties of the session, may be used as the user names included in the interface to be screenshot.
Illustratively, a user A chats with a user B by using a certain chatting software, and a terminal of the user A is displayed with a chatting interface of the user A and the user B, which comprises a session window for chatting, so that the user name of the user A and the user name of the user B are used as the user names included on the interface to be screenshot.
In the embodiment, the user name included in the screen capturing interface is compared with each preset user name in the preset user name database one by one, and after the fact that the user name included in the screen capturing interface is not matched with any preset user name in the preset user name database is ensured, screen capturing operation is executed on the screen capturing interface, so that the risk that any preset user name in the preset user name database is maliciously captured is avoided.
Alternatively, fig. 2 is a flowchart illustrating another screen capturing method according to an exemplary embodiment, and as shown in fig. 2, the method may be used in a terminal, and may further include the following steps in addition to the above steps S11 to S13:
in step S24, when the user name matches any one of the preset user names, the screen capture operation is prohibited from being performed.
According to the method and the device, when the user name included in the screen capturing interface is judged to be matched with any preset user name in a preset user name database, the screen capturing operation is forbidden to be executed. And matching the user name included on the screen capturing interface with at least one preset user name in a preset user name database, which indicates that the risk of malicious screen capturing exists. To circumvent the risk of malicious screenshots, execution of screenshots may be prohibited.
Illustratively, a chat interface between the user A and the Wangfei is displayed on a display screen of the terminal of the user A. In this case, with the screen capture method provided by the present disclosure, after the terminal of the user a detects that the screen capture shortcut key is pressed down by the user a, the terminal acquires the user name included on the chat interface between the user a and "royal fei": user name of user a and "royal fei". And then comparing the user name of the user A and the name of the 'Wangfei' with the names of all celebrities in a preset celebrity database respectively, wherein the user name of the user A is not matched with the names of all celebrities in the preset celebrity database, and the 'Wangfei' is matched with the Wangfei in the celebrity database, and under the condition, forbidding to execute screen capture operation. Thereby avoiding the risk of malicious screen capture by the user.
Alternatively, fig. 3 is a flowchart illustrating another screen capturing method according to an exemplary embodiment, and as shown in fig. 3, the method may be used in a terminal, and may further include the following steps in addition to the above steps S11 to S13:
in step S34, when the user name matches at least one preset user name, preset identification information corresponding to the at least one preset user name is obtained.
In step S35, the identification information corresponding to the user name is compared with the preset identification information.
In step S36A, when the identification information corresponding to the user name matches the preset identification information, the screen capture operation is performed.
In step S36B, when the identification information corresponding to the user name does not match the preset identification information, the screen capture operation is prohibited from being performed.
The preset identification information is information for uniquely identifying the user. It should be noted that in some social platforms, the user name is unique, that is, different account numbers need to apply for different user names. In this case, the user name may serve as a unique identification for the user. In addition, some social platforms exist, nicknames of different users can be the same, and at this time, identity Identification information (Identification, abbreviated as ID) during user registration can be used for matching, for example, an Identification code automatically allocated to a user account by a system during registration, registration mailbox information, two-dimensional code information playing a unique Identification role, and the like, and these information can be used for uniquely identifying one user (account).
The method includes the steps that when the user name included in the screen capturing interface is judged to be matched with at least one preset user name in a preset user name database, a consideration factor of identification information is introduced to determine whether screen capturing operation is executed or not. Optionally, the preset user name database includes, in addition to a plurality of preset user names, identification information corresponding to each preset user name.
And matching the user name included on the screen capturing interface with at least one preset user name in a preset user name database, which indicates that the risk of malicious screen capturing exists. In order to verify whether malicious screen shots exist, identification information corresponding to a pair of matched user names can be compared. The identification information corresponding to the matched pair of user names is the same, which indicates that the user names included on the screen capturing interface in the matched pair of user names are real, so that screen capturing operation can be executed; otherwise, the matched user name pair is shown to be forged on the user name included on the screen capturing interface to be captured, so that the user name belongs to malicious screen capturing, and the screen capturing operation is forbidden.
Illustratively, a chat interface between the user A and the Wangfei is displayed on a display screen of the terminal of the user A. In this case, with the screen capture method provided by the present disclosure, after the terminal of the user a detects that the screen capture shortcut key is pressed down by the user a, the terminal acquires the user name included on the chat interface between the user a and "royal fei": user name of user a and "royal fei". And then comparing the user name of the user A and the Wangffei with the names of all celebrities in a preset celebrity database respectively, wherein the user name of the user A is not matched with the names of all celebrities in the celebrity database, and the Wangffei is matched with the Wangffei in the celebrity database. In this case, it is necessary to further determine whether the identification information corresponding to the two is the same.
In the process of chatting between the user A and the user B, the chatting interfaces of the user A and the user B are originally displayed on the display screen of the terminal of the user A. In order to imitate the screenshot of the chat with the Wangffei, the remark name of the user B is modified to the Wangffei by the user A (or the user A modifies the user name of the user A to the Wangffei, or the user B modifies the user name of the user B to the Wangffei), so that a chat interface of the user A and the Wangffei is displayed on a display screen of the terminal of the user A instead of the chat interface of the user A and the user B.
Because the Wangffei included in the chat interface between the user A and the Wangffei is obtained by modifying the remark name of the user B into the Wangffei by the user A, the identification information corresponding to the Wangffei is actually the identification information of the user B. Similarly, for the case that the user a modifies the user name of the user a into "royal phenanthrene", the identification information corresponding to the "royal phenanthrene" is actually the identification information of the user a; for the case that the user B modifies the user name of itself to "royal fei", the identification information corresponding to "royal fei" is actually the identification information of the user B.
After any modification, the identification information corresponding to the Wangffei included on the chat interface of the user A and the Wangffei is not matched with the identification information corresponding to the Wangffei in the celebrity database, so that the screen capture operation is forbidden.
For the condition that the ' Wangffei ' included on the chat interface of the user A and the ' Wangffei ' is the Wangffei in the celebrity database, the identification information of the user A and the Wangffei ' is matched, which indicates that no counterfeiting and malicious screen capturing exist, and therefore, the screen capturing operation is executed.
The embodiment of the disclosure fully considers that the user name may not have a unique identifier completely, and therefore, the preset identification information stored in the database corresponding to the preset user name is further used for matching with the identification information corresponding to the user name to be verified, and whether to perform screen capturing operation is determined based on the comparison result. The embodiment can further improve the accuracy of the judgment result for judging whether to allow screen capture, and avoid the inconvenience brought to the user due to the fact that normal screen capture is prevented.
Alternatively, fig. 4 is a flowchart illustrating another screen capturing method according to an exemplary embodiment, and as shown in fig. 4, the method may be used in a terminal, and may further include the following steps in addition to the above steps S11 to S13:
in step S44, when the user name is matched with at least one preset user name, it is queried whether the contact address list of the terminal includes a contact address corresponding to the at least one preset user name.
In step S45A, when the contact address book of the terminal includes the contact address corresponding to the at least one preset user name, the screen capture operation is performed.
In step S45B, when the contact address list of the terminal does not include the contact address corresponding to the at least one preset user name, the screen capture operation is prohibited from being executed.
The embodiment of the disclosure provides that when it is determined that a user name included in a to-be-screenshot interface matches at least one preset user name in a preset user name database, a consideration factor of a contact manner is introduced to determine whether to execute a screenshot operation.
And matching the user name included on the screen capturing interface with at least one preset user name in a preset user name database, which indicates that the risk of malicious screen capturing exists. In order to verify whether malicious screen capturing exists, whether the address list of the terminal comprises a contact way corresponding to a preset user name in a pair of matched user names can be inquired. The address book of the terminal comprises a contact way corresponding to the preset user name, which shows that the relation between the user corresponding to the preset user name and the user of the terminal is a contact person relation. For a user of a terminal, a user corresponding to a preset user name is one of contacts, and the user corresponding to the preset user name is likely to communicate with the user of the terminal, that is, the preset user name and the user name of the user of the terminal are likely to appear in the same screen capture interface, and the screen capture interface is not an interface after malicious tampering of the user name, so that screen capture operation can be allowed to be executed; on the contrary, if the contact way corresponding to the preset user name is not found in the address list of the terminal, the preset user name is probably maliciously tampered, and the screen capture is carried out on the interface interacted by the preset user name and the user name of the user of the terminal, so that the screen capture is probably maliciously carried out. At this time, the execution of the screen capture operation may be prohibited. Alternatively, other further determinations may be performed to determine whether to disable or enable the screen capture operation. For example, the preset identification information corresponding to the preset user name and the identification information corresponding to the user name of the terminal user may be further compared, and the screen capture operation may be prohibited or allowed based on the comparison result.
Illustratively, a chat interface between the user A and the Wangfei is displayed on a display screen of the terminal of the user A. In this case, with the screen capture method provided by the embodiment of the present disclosure, after the terminal of the user a detects that the screen capture shortcut key is pressed by the user a, the terminal acquires the user name included on the chat interface between the user a and "royal fei": user name of user a and "royal fei". And then comparing the user name of the user A and the Wangffei with the names of all celebrities in the celebrity database respectively, wherein the user name of the user A is not matched with the names of all celebrities in the celebrity database, and the Wangffei is matched with the Wangffei in the celebrity database. In this case, it is necessary to further inquire whether the address book of the terminal of the user a includes the contact address of the royal phone.
When the address list of the terminal of the user A comprises the contact information of the King phenanthrene, the fact that the contact relation exists between the user A and the King phenanthrene is shown, for the user A, the King phenanthrene is one of the contacts of the user A, and therefore screen capture operation is executed; when the contact way of the Wangffei is not included in the address book of the terminal of the user A, it is indicated that the user name 'Wangffei' included in the chat interface of the user A and the 'Wangffei' is probably obtained by malicious tampering, and the screen capturing of the chat interface of the user A and the 'Wangffei' may belong to malicious screen capturing, so that the screen capturing operation is forbidden.
In a specific implementation process, the two considered factors of the identification information and the contact information may be considered alternatively or both to determine whether to perform a screen capture operation. One possible implementation is:
when the user name is matched with at least one preset user name, acquiring preset identification information corresponding to the at least one preset user name;
comparing the identification information corresponding to the user name with the preset identification information;
when the identification information corresponding to the user name is not matched with the preset identification information, inquiring whether a contact way corresponding to the user name which is not matched with the preset identification information is included in an address list of the terminal;
when the address list of the terminal comprises a contact way corresponding to the user name which is not matched with the preset identification information, executing the screen capturing operation;
and when the address list of the terminal does not comprise the contact information of the user name which is not matched with the preset identification information, prohibiting the screen capturing operation.
Considering that there may be a case where the user names of a plurality of users are the same but the respective identification information is different, the user names, the identification information, and the contact information may be considered together in the embodiment of the present disclosure to determine whether to perform the screen capture operation.
Illustratively, the user name of user B is "royal phenanthrene", the identification information corresponding to user B is 111, and the identification information corresponding to royal phenanthrene in the celebrity database is 222. Although the user name of the user B (marked as 'Wangfei No. 1') is matched with the user name of the Wangfei (marked as 'Wangfei No. 2') in the celebrity database, the corresponding identification information of the user B and the user B is different.
During the process of chatting between the user A and the user B, a chatting interface between the user A and the user B is displayed on a display screen of the terminal of the user A. In this case, with the screen capture method provided by the embodiment of the present disclosure, after the terminal of the user a detects that the screen capture shortcut key is pressed by the user a, the user name included in the chat interface between the user a and the user B is acquired: user name of user a and "royal fei". And then comparing the user name of the user A and the name of the "Wangffei" with the names of the various celebrities in the celebrity database respectively, wherein the user name of the user A is not matched with the names of the various celebrities in the celebrity database, the "Wangffei" is matched with the Wangffei in the celebrity database and the identification information of the "Wangffei" is different, and in this case, whether the contact way of the "Wangffei number 1" is included in the address book of the terminal of the user A needs to be further inquired.
When the address book of the terminal of the user A comprises the contact information of 'Wangffei No. 1', the contact relation between the user A and the 'Wangffei No. 1' is shown, and for the user A, the 'Wangffei No. 1' is one of the contacts of the user A, so that the screen capture operation is executed; when the contact way of the 'Wangffei No. 1' is not included in the address book of the terminal of the user A, it is indicated that the user name 'Wangffei No. 1' included in the chat interface of the user A and the 'Wangffei No. 1' is probably obtained by malicious tampering, and the screen capture of the chat interface of the user A and the 'Wangffei No. 1' may belong to malicious screen capture, so that the screen capture operation is forbidden.
Based on the same inventive concept, the disclosure also provides a screen capturing device for executing the screen capturing method.
FIG. 5 is a block diagram illustrating a screen capture device according to an exemplary embodiment. Referring to fig. 5, the apparatus 100 includes: a first obtaining module 101, a first comparing module 102 and a first executing module 103.
The first acquisition module 101 is configured to: when a screen capture instruction is received, acquiring a user name included in an interface to be captured, wherein the screen capture instruction is used for indicating that screen capture operation is executed on the interface to be captured;
the first comparison module 102 is configured to: respectively comparing the user name with each preset user name in a preset user name database;
the first execution module 103 is configured to: and when the user name is not matched with each preset user name, executing the screen capturing operation.
According to the screen capturing method and device, the user name included in the screen capturing interface is compared with each preset user name in the preset user name database one by one, and after the fact that the user name included in the screen capturing interface is not matched with any preset user name in the preset user name database is guaranteed, screen capturing operation is executed on the screen capturing interface, and the risk that any preset user name in the preset user name database is maliciously captured is avoided.
Optionally, fig. 6 is another block diagram illustrating a screen capture device according to an example embodiment. As shown in fig. 6, the apparatus 100 includes: the first obtaining module 101, the first comparing module 102 and the first executing module 103 further include: a second acquisition module 104, a second comparison module 105, a second execution module 106, and a first disabling module 107.
The second acquisition module 104 is configured to: when the user name is matched with at least one preset user name, acquiring preset identification information corresponding to the at least one preset user name;
the second comparison module 105 is configured to: comparing the identification information corresponding to the user name with the preset identification information;
the second execution module 106 is configured to: when the identification information corresponding to the user name is matched with the preset identification information, executing the screen capturing operation;
the first disabling module 107 is configured to: and when the identification information corresponding to the user name is not matched with the preset identification information, prohibiting the screen capturing operation.
Alternatively, fig. 7 is a block diagram illustrating a first acquisition module in a screen capture device according to an example embodiment. As shown in fig. 7, the first obtaining module 101 includes: a detection sub-module 10111 and an acquisition sub-module 10112.
The detection submodule 10111 is configured to: detecting whether a session window is included in the interface to be subjected to screen capturing;
the acquisition submodule 10112 is configured to: and when the fact that the session window is included in the interface to be subjected to screen capturing is detected, acquiring the user name included in the session window.
Optionally, fig. 8 is another block diagram illustrating a screen capture device according to an example embodiment. As shown in fig. 8, the apparatus 100 includes: the first obtaining module 101, the first comparing module 102 and the first executing module 103 further include: a second inhibit module 108.
The second inhibit module 108 is configured to: and when the user name is matched with any preset user name, prohibiting the screen capturing operation from being executed.
Alternatively, fig. 9 is another block diagram illustrating a screen capture device according to an example embodiment. As shown in fig. 9, the apparatus 100 comprises: the first obtaining module 101, the first comparing module 102 and the first executing module 103 further include: a query module 109, a third execution module 1010, and a third inhibit module 1011.
The query module 109 is configured to: when the user name is matched with at least one preset user name, inquiring whether the contact way corresponding to the at least one preset user name is included in an address list of the terminal;
the third execution module 1010 is configured to: when the address list of the terminal comprises the contact way corresponding to the at least one preset user name, executing the screen capturing operation;
the third disabling module 1011 is configured to: and when the contact way corresponding to the at least one preset user name is not included in the address list of the terminal, prohibiting the screen capturing operation from being executed.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The embodiment of the present disclosure also provides a screen capture device, the device includes:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
when a screen capture instruction is received, acquiring a user name included in an interface to be captured, wherein the screen capture instruction is used for indicating that screen capture operation is executed on the interface to be captured;
respectively comparing the user name with each preset user name in a preset user name database; and when the user name is not matched with each preset user name, executing the screen capturing operation.
According to the screen capturing method and device, the user name included in the screen capturing interface is compared with each preset user name in the preset user name database one by one, and after the fact that the user name included in the screen capturing interface is not matched with any preset user name in the preset user name database is guaranteed, screen capturing operation is executed on the screen capturing interface, and the risk that any preset user name in the preset user name database is maliciously captured is avoided.
Fig. 10 is a schematic diagram illustrating a screen capture device 800 according to an example embodiment. The apparatus 800 may be a terminal, such as a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
Referring to fig. 10, the apparatus 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include one or more processors 820 to execute instructions to perform all or part of the steps of the screen capture method described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 806 provides power to the various components of device 800. The power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described screen capturing methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the screen capture method described above is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (3)

1. A screen capture method is applied to a terminal, and comprises the following steps:
when a screen capture instruction is received, acquiring a user name included in an interface to be captured, wherein the screen capture instruction is used for indicating that screen capture operation is executed on the interface to be captured;
respectively comparing the user name with each preset user name in a preset user name database;
when the user name is not matched with each preset user name, executing the screen capturing operation;
wherein,
the method further comprises the following steps: when the user name is matched with at least one preset user name, acquiring preset identification information corresponding to the at least one preset user name; comparing the identification information corresponding to the user name with the preset identification information; when the identification information corresponding to the user name is matched with the preset identification information, executing the screen capturing operation; when the identification information corresponding to the user name is not matched with the preset identification information, prohibiting the screen capturing operation from being executed;
or,
the acquiring of the user name included on the interface to be screenshot includes: detecting whether a session window is included in the interface to be subjected to screen capturing; when the fact that the session window is included in the interface to be subjected to screen capturing is detected, a user name included in the session window is obtained;
or,
the method further comprises the following steps: when the user name is matched with any preset user name, the screen capturing operation is forbidden to be executed;
or,
the method further comprises the following steps: when the user name is matched with at least one preset user name, inquiring whether the contact way corresponding to the at least one preset user name is included in an address list of the terminal; when the address list of the terminal comprises the contact way corresponding to the at least one preset user name, executing the screen capturing operation; and when the contact way corresponding to the at least one preset user name is not included in the address list of the terminal, prohibiting the screen capturing operation from being executed.
2. A screen capture device, the device comprising:
the device comprises a first acquisition module, a second acquisition module and a display module, wherein the first acquisition module is configured to acquire a user name included in a to-be-screenshot interface when a screenshot instruction is received, and the screenshot instruction is used for indicating that screenshot operation is performed on the to-be-screenshot interface;
the first comparison module is configured to compare the user name with each preset user name in a preset user name database respectively;
the first execution module is configured to execute the screen capturing operation when the user name is not matched with each preset user name;
wherein,
the device further comprises: the second acquisition module is configured to acquire preset identification information corresponding to at least one preset user name when the user name is matched with the at least one preset user name; the second comparison module is configured to compare the identification information corresponding to the user name with the preset identification information; the second execution module is configured to execute the screen capturing operation when the identification information corresponding to the user name is matched with the preset identification information; the first forbidding module is configured to forbid the screen capturing operation from being executed when the identification information corresponding to the user name is not matched with the preset identification information;
or,
the first obtaining module comprises: the detection submodule is configured to detect whether a session window is included in the interface to be subjected to screen capturing; the acquisition sub-module is configured to acquire a user name included in the session window when the session window is detected to be included in the interface to be subjected to screen capturing;
or,
the device further comprises: the second forbidding module is configured to forbid the screen capturing operation from being executed when the user name is matched with any preset user name;
or,
the device further comprises: the query module is configured to query whether a contact way corresponding to at least one preset user name is included in an address list of the terminal when the user name is matched with the at least one preset user name; the third execution module is configured to execute the screen capturing operation when the contact information corresponding to the at least one preset user name is included in the address book of the terminal; and the third forbidding module is configured to forbid the screen capturing operation when the contact way corresponding to the at least one preset user name is not included in the address list of the terminal.
3. A screen capture device, the device comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
when a screen capture instruction is received, acquiring a user name included in an interface to be captured, wherein the screen capture instruction is used for indicating that screen capture operation is executed on the interface to be captured;
respectively comparing the user name with each preset user name in a preset user name database;
when the user name is not matched with each preset user name, executing the screen capturing operation;
wherein,
the processor is further configured to: when the user name is matched with at least one preset user name, acquiring preset identification information corresponding to the at least one preset user name; comparing the identification information corresponding to the user name with the preset identification information; when the identification information corresponding to the user name is matched with the preset identification information, executing the screen capturing operation; when the identification information corresponding to the user name is not matched with the preset identification information, prohibiting the screen capturing operation from being executed;
or,
the acquiring of the user name included on the interface to be screenshot includes: detecting whether a session window is included in the interface to be subjected to screen capturing; when the fact that the session window is included in the interface to be subjected to screen capturing is detected, a user name included in the session window is obtained;
or,
the processor is further configured to: when the user name is matched with any preset user name, the screen capturing operation is forbidden to be executed;
or,
the processor is further configured to: when the user name is matched with at least one preset user name, inquiring whether a contact way corresponding to the at least one preset user name is included in an address list of the terminal; when the address list of the terminal comprises the contact way corresponding to the at least one preset user name, executing the screen capturing operation; and when the contact way corresponding to the at least one preset user name is not included in the address list of the terminal, prohibiting the screen capturing operation from being executed.
CN201710171097.6A 2017-03-21 2017-03-21 Screenshotss method and screen video recorder Active CN106936998B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710171097.6A CN106936998B (en) 2017-03-21 2017-03-21 Screenshotss method and screen video recorder

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710171097.6A CN106936998B (en) 2017-03-21 2017-03-21 Screenshotss method and screen video recorder

Publications (2)

Publication Number Publication Date
CN106936998A CN106936998A (en) 2017-07-07
CN106936998B true CN106936998B (en) 2019-11-22

Family

ID=59432524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710171097.6A Active CN106936998B (en) 2017-03-21 2017-03-21 Screenshotss method and screen video recorder

Country Status (1)

Country Link
CN (1) CN106936998B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699843A (en) * 2013-12-30 2014-04-02 珠海市君天电子科技有限公司 Malicious activity detection method and device
CN105631359B (en) * 2015-12-23 2018-10-23 北京奇虎科技有限公司 A kind of control method and device of web page operation
CN105653281B (en) * 2015-12-29 2019-09-17 青岛海信移动通信技术股份有限公司 A kind of method and apparatus carrying out screenshotss in a mobile device
CN105721283B (en) * 2016-01-26 2020-03-17 北京小米移动软件有限公司 Method, device and equipment for sending screenshot message
CN105930152B (en) * 2016-04-15 2019-04-26 深圳联友科技有限公司 A kind of method and system of anti-screenshotss
CN106303069A (en) * 2016-09-06 2017-01-04 惠州Tcl移动通信有限公司 A kind of mobile phone screenshot method based on safety instruction and system

Also Published As

Publication number Publication date
CN106936998A (en) 2017-07-07

Similar Documents

Publication Publication Date Title
EP3113466A1 (en) Method and device for warning
CN106453052B (en) Message interaction method and device
CN106211159B (en) Bluetooth-based identity recognition method and device
CN105656948A (en) Account login method and device
US9521251B2 (en) Method and device for identifying telephone call
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
CN104954361B (en) Contact person's verification method, apparatus and system
CN107959757B (en) User information processing method and device, APP server and terminal equipment
CN106454800A (en) Identity verification method, device and system
CN104113646A (en) Method and apparatus for calling forwarding
CN105245675A (en) Method and device for managing contact account
CN108011990B (en) Contact management method and device
CN105208089A (en) Information display method, apparatus and system
CN106778225A (en) The method and apparatus for processing password
CN107145771B (en) Application program unlocking method and device and terminal
CN106412481B (en) Reminding method, device and terminal based on VoLTE video calling
CN105245705A (en) Telephone prompting method and device
CN109246094B (en) User terminal verification method, device and storage medium
CN106506808B (en) Method and device for prompting communication message
CN106791145A (en) Short message management method and device
CN105101258A (en) Communication request transfer method and device
CN107169042B (en) Method and device for sharing pictures and computer readable storage medium
CN106936998B (en) Screenshotss method and screen video recorder
CN111865767B (en) User display method, device, server, client, terminal and storage medium for indirectly monitoring telephone in instant messaging
CN110913055B (en) Terminal device searching method and device and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant