CN107145795B - Screenshot method and device and computer equipment - Google Patents
Screenshot method and device and computer equipment Download PDFInfo
- Publication number
- CN107145795B CN107145795B CN201710296221.1A CN201710296221A CN107145795B CN 107145795 B CN107145795 B CN 107145795B CN 201710296221 A CN201710296221 A CN 201710296221A CN 107145795 B CN107145795 B CN 107145795B
- Authority
- CN
- China
- Prior art keywords
- information
- picture
- screenshot
- area
- sensitive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000013475 authorization Methods 0.000 claims abstract description 95
- 238000012795 verification Methods 0.000 claims abstract description 40
- 238000012545 processing Methods 0.000 claims description 44
- 238000001514 detection method Methods 0.000 claims description 18
- 238000004422 calculation algorithm Methods 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 21
- 230000008569 process Effects 0.000 description 10
- 230000006870 function Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 5
- 230000000903 blocking effect Effects 0.000 description 4
- 230000001413 cellular effect Effects 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 3
- 230000005236 sound signal Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000011038 discontinuous diafiltration by volume reduction Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000009499 grossing Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000010008 shearing Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04845—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/10—Multimedia information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- User Interface Of Digital Computer (AREA)
- Studio Devices (AREA)
Abstract
The invention relates to a screenshot method and device and computer equipment. The method comprises the following steps: receiving a screenshot instruction, and determining a region to be screenshot according to the screenshot instruction; detecting whether the area to be captured contains preset sensitive information or not; if yes, acquiring input authorization information, and verifying the authorization information; and if the verification is passed, intercepting the content of the area to be subjected to screenshot and generating a picture. The screenshot method, the screenshot device and the computer equipment can prevent information leakage during screenshot and effectively improve screenshot safety.
Description
Technical Field
The invention relates to the field of computers, in particular to a screenshot method, a screenshot device and computer equipment.
Background
A screenshot refers to a visual image captured by the terminal that can be displayed on a screen or other display device, and typically the screenshot may be captured by the operating system of the terminal or installed screenshot software. The user's accessible is carried out the screenshot to various pictures at terminal to save the record, conveniently look over or share with other people next time. In the traditional mode, the terminal directly intercepts corresponding content as long as receiving screenshot operation executed by a user and generates pictures, so that information leakage is easily caused, and the security is poor.
Disclosure of Invention
The embodiment of the invention provides a screenshot method, a screenshot device and computer equipment, which can prevent information leakage during screenshot and effectively improve screenshot safety.
A method of screenshot comprising:
receiving a screenshot instruction, and determining a region to be screenshot according to the screenshot instruction;
detecting whether the area to be captured contains preset sensitive information or not;
if yes, acquiring input authorization information, and verifying the authorization information;
and if the verification is passed, intercepting the content of the area to be subjected to screenshot and generating a picture.
In one embodiment, the detecting whether the area to be captured contains preset sensitive information includes:
acquiring coordinate information of the area to be captured;
acquiring interface level information corresponding to the area to be captured according to the coordinate information;
extracting text information from the interface level information, and detecting whether the text information contains preset sensitive information.
In one embodiment, the detecting whether the area to be captured contains preset sensitive information includes:
acquiring information of an object to be captured associated with the area to be captured;
and detecting whether the information of the object to be captured contains preset sensitive information.
In one embodiment, after the intercepting the content of the region to be screenshot and generating a picture if the verification passes, the method further includes:
determining a sensitive area of the picture according to sensitive information contained in the area to be captured;
creating an information shielding layer according to the authorization information;
and covering the information shielding layer on the sensitive area of the picture to obtain an information hiding picture.
In one embodiment, after the intercepting the content of the region to be screenshot and generating a picture if the verification passes, the method further includes:
determining a sensitive area of the picture according to sensitive information contained in the area to be captured;
and carrying out fuzzification or encryption processing on the sensitive area according to the authorization information to obtain an information hidden picture.
In one embodiment, after the intercepting the content of the region to be screenshot and generating a picture if the verification passes, the method further includes:
and encrypting the picture by using the authorization information as a key by adopting a preset encryption algorithm.
In one embodiment, the method further comprises:
receiving a picture viewing instruction, and detecting whether the viewed picture contains a preset mark according to the picture viewing instruction;
if yes, verifying the input authorization information;
and if the verification is passed, performing restoration processing on the checked picture, and displaying the restored picture.
A screenshot device comprising:
the device comprises a to-be-screenshot area determining module, a screenshot judging module and a screenshot judging module, wherein the to-be-screenshot area determining module is used for receiving a screenshot instruction and determining a to-be-screenshot area according to the screenshot instruction;
the sensitive information detection module is used for detecting whether the area to be captured contains preset sensitive information;
the verification module is used for acquiring the input authorization information and verifying the authorization information if the authorization information is included;
and the screenshot module is used for intercepting the content of the area to be screenshot and generating a picture if the verification is passed.
In one embodiment, the sensitive information detection module includes:
the coordinate acquisition unit is used for acquiring coordinate information of the area to be captured;
the interface acquisition unit is used for acquiring interface level information corresponding to the area to be captured according to the coordinate information;
and the detection unit is used for extracting text information from the interface level information and detecting whether the text information contains preset sensitive information.
In one embodiment, the sensitive information detection module further includes:
the acquisition unit of the object to be captured is used for acquiring the information of the object to be captured related to the area to be captured;
the detection unit is further configured to detect whether the information of the object to be captured includes preset sensitive information.
In one embodiment, the apparatus further comprises:
the sensitive area determining module is used for determining the sensitive area of the picture according to the sensitive information contained in the area to be captured;
the creating module is used for creating an information shielding layer according to the authorization information;
the covering module is used for covering the information shielding layer on the sensitive area of the picture to obtain an information hiding picture;
and the fuzzification processing module is used for carrying out fuzzification or encryption processing on the sensitive area according to the authorization information to obtain an information hidden picture.
In one embodiment, the apparatus further comprises:
and the encryption module is used for encrypting the picture by using the authorization information as a key by adopting a preset encryption algorithm.
In one embodiment, the apparatus further comprises:
the mark detection module is used for receiving a picture viewing instruction and detecting whether the viewed picture contains a preset mark according to the picture viewing instruction;
the verification module is further used for verifying the input authorization information if the checked picture contains a preset mark;
and the display module is used for restoring the checked picture and displaying the restored picture if the verification is passed.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method as described above when executing the program.
The screenshot method, the screenshot device and the computer equipment receive the screenshot command, determine the area to be screenshot according to the screenshot command, detect whether the area to be screenshot contains preset sensitive information, if so, obtain the input authorization information, verify the authorization information, intercept the content of the area to be screenshot and generate the picture only when the verification is passed, prevent information leakage during screenshot, and effectively improve screenshot safety.
Drawings
FIG. 1 is a block diagram of a terminal in one embodiment;
FIG. 2 is a flow diagram illustrating a method for screenshot in one embodiment;
FIG. 3 is a schematic flow chart illustrating an embodiment of detecting whether a region to be captured contains preset sensitive information;
FIG. 4 is a schematic flowchart illustrating a process of detecting whether a region to be captured contains preset sensitive information according to another embodiment;
FIG. 5 is a flow diagram illustrating an embodiment of an information hiding process for a picture containing sensitive information;
FIG. 6(a) is a diagram illustrating a picture containing sensitive information according to one embodiment;
FIG. 6(b) is a diagram illustrating an embodiment of covering a sensitive area of a picture with an information blocking layer;
FIG. 7 is a flowchart illustrating an information hiding process performed on a picture containing sensitive information according to another embodiment;
FIG. 8(a) is a diagram illustrating a picture containing sensitive information according to an embodiment;
FIG. 8(b) is a diagram illustrating an exemplary blurring process performed on a sensitive region;
FIG. 9 is a schematic diagram of a process for viewing pictures in one embodiment;
FIG. 10 is a schematic diagram of an embodiment of a screenshot device;
FIG. 11 is a diagram illustrating an internal structure of a sensitive information detecting module according to an embodiment;
FIG. 12 is a schematic diagram of a screenshot device in another embodiment;
FIG. 13 is a schematic diagram of a screenshot device in another embodiment;
FIG. 14 is a schematic diagram showing the construction of a screen capture apparatus according to still another embodiment;
FIG. 15 is a block diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Fig. 1 is a block diagram of a terminal in one embodiment. As shown in fig. 1, the terminal includes a processor, a nonvolatile storage medium, an internal memory, and a network interface, a display screen, and an input device, which are connected through a system bus. The non-volatile storage medium of the terminal stores an operating system and computer-executable instructions, and the computer-executable instructions are executed by the processor to implement the screenshot method provided in the embodiment of the application. The processor is used for providing calculation and control capability and supporting the operation of the whole terminal. The internal memory in the terminal provides an environment for the execution of computer-readable instructions in the non-volatile storage medium. The network interface is used for network communication with the server. The display screen of the terminal can be a liquid crystal display screen or an electronic ink display screen, and the input device can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on a shell of the terminal, or an external keyboard, a touch pad or a mouse. The terminal can be a mobile phone, a tablet computer, a personal digital assistant or a wearable device. Those skilled in the art will appreciate that the configuration shown in fig. 1 is a block diagram of only a portion of the configuration relevant to the present application, and does not constitute a limitation on the terminal to which the present application is applied, and that a particular terminal may include more or less components than those shown in the drawings, or may combine certain components, or have a different arrangement of components.
As shown in fig. 2, in one embodiment, a screenshot method is provided, which includes the following steps:
and step S210, receiving a screenshot instruction, and determining a region to be screenshot according to the screenshot instruction.
The user can perform screenshot operation on an interface displayed on a terminal screen, and the terminal receives a screenshot instruction according to the screenshot operation, wherein the screenshot operation can include modes of presetting shortcut key screenshot, touch screen screenshot and the like. Presetting a shortcut key screenshot, which means performing screenshot operation through a preset shortcut key, for example, presetting the shortcut key as a volume reduction key and a return key on a terminal, and when the volume reduction key and the return key are pressed simultaneously, the terminal can receive a screenshot instruction; the touch screen screenshot refers to screenshot performed by touching a screen with a mouse, a stylus, a finger, or the like, for example, a certain area is selected by touching the screen with the mouse, and a screenshot button is selected by a right button, so that the terminal can receive a screenshot command. The screenshot operation can also be a mode of presetting a shortcut key and a touch screen, the whole screen interface of the terminal is selected through the preset shortcut key, and then an area to be screenshot in the whole screen interface is selected through the touch screen of the input device. The screenshot operation may also be a manner of capturing a screenshot through a preset gesture, for example, contacting a side of a palm with one side of the screen and sliding the palm to another side of the screen at a constant speed to capture the screenshot on the screen interface, but is not limited thereto.
The terminal receives a screenshot instruction according to the screenshot operation, and determines a region to be screenshot according to the screenshot instruction, where the region to be screenshot refers to a region of a current screen interface of the terminal, where a picture needs to be generated by being intercepted, the region to be screenshot may be the whole screen interface or only a part of the screen interface, and the region to be screenshot is usually in a specific shape, such as a rectangle, a square, or a circle, but is not limited thereto.
Step S220, detecting whether the area to be captured contains preset sensitive information, if yes, performing step S230, and if not, performing step S250.
The terminal can detect the determined region to be captured according to a preset sensitive information set, and judge whether the determined region to be captured contains preset sensitive information, wherein the sensitive information can comprise preset sensitive words, sensitive names, sensitive numbers, sensitive applications and the like. Sensitive information can be added in the terminal in advance, for example, an identity card, a bank card and the like are added as sensitive words, a Zhang III and the like are added as sensitive names, a short message application is added as a sensitive application, and the like. And the terminal generates a sensitive information set according to the sensitive information added by the user and stores the sensitive information set.
In one embodiment, the terminal can classify the sensitive information in the sensitive information set according to the categories of sensitive words, sensitive names, sensitive numbers, sensitive applications and the like, and set the application corresponding to each category. When the terminal receives a screenshot instruction, a region to be screenshot is determined, an application identifier associated with the region to be screenshot is determined, a category corresponding to the application identifier in a sensitive information set can be obtained, and whether the region to be screenshot contains sensitive information or not is detected according to the corresponding category, wherein the application identifier can be information which can be used for uniquely identifying an application, such as an application name, an application number and the like. For example, the application corresponding to the sensitive name category may be set as an instant messaging application, and when the user performs a screenshot operation on the instant messaging application, the terminal may detect whether the area to be screenshot contains a preset sensitive name.
In one embodiment, different applications may respectively set different sensitive information, for example, the sensitive information set by the application a includes "id card" and "bank card", the sensitive information set by the application B includes "zhang san" and "password", and when a user adds different sensitive information to different applications, a corresponding relationship between an application identifier and the sensitive information may be established and stored in association. When the terminal receives a screenshot command, a region to be screenshot is determined, an application identifier associated with the region to be screenshot is determined, and whether the region to be screenshot contains sensitive information corresponding to the application identifier is detected.
Step S230, acquiring the input authorization information, and verifying the authorization information.
If the screenshot area contains preset sensitive information, the terminal can perform authorization prompting on a screen interface, and the user can input authorization information according to the authorization prompting, wherein the authorization information can contain preset password, fingerprint, iris, voiceprint and other information capable of verifying the user identity, and the password can be a character password consisting of one or more of numbers, letters, symbols and the like, and can also be a screen track sliding password and the like. The terminal can verify the authorization information after acquiring the authorization information input by the user, and when the input authorization information is matched with the preset authorization information, the verification is passed, otherwise, the verification fails. The identity of the user is verified, and therefore the condition that an illegal user randomly intercepts contents displayed on a screen on the terminal to cause information leakage can be prevented.
And step S240, if the verification is passed, intercepting the content of the area to be captured and generating a picture.
If the authorization information input by the user passes the verification, the terminal intercepts the content of the area to be screenshot and generates a picture, if the authorization information input by the user fails the verification, the screenshot is cancelled, the verification failure can be prompted on a screen interface, and the user is prompted to input the authorization information again.
And step S250, intercepting the content of the area to be screenshot and generating a picture.
If the area to be subjected to screenshot does not contain the preset sensitive information, the screenshot operation can be directly carried out, the content of the area to be subjected to screenshot is intercepted to generate a picture, and the picture is stored.
According to the screenshot method, the screenshot command is received, the area to be screenshot is determined according to the screenshot command, whether the area to be screenshot contains the preset sensitive information or not is detected, if yes, the input authorization information is obtained, the authorization information is verified, when the verification is passed, the content of the area to be screenshot can be intercepted, the picture can be generated, information leakage during screenshot can be prevented, and screenshot safety is effectively improved.
As shown in fig. 3, in an embodiment, the step S220 of detecting whether the area to be captured contains preset sensitive information includes the following steps:
step S302, coordinate information of the area to be captured is obtained.
The terminal receives the screenshot command, determines the area to be screenshot according to the screenshot command, and can detect whether text information in the area to be screenshot contains preset sensitive information. The terminal acquires coordinate information of the area to be captured on the screen, wherein the coordinate information comprises horizontal and vertical coordinate values of all points covered on the screen by the area to be captured.
And step S304, acquiring interface level information corresponding to the area to be captured according to the coordinate information.
After the terminal acquires the coordinate information of the area to be screenshot, the terminal can acquire the display area corresponding to the area to be screenshot on the interface displayed on the screen according to the coordinate information, so that the interface level information of the display area is acquired, various information such as navigation information, content information, prompt information and the like is displayed on the interface, and different information has different importance, so that the interface can be displayed hierarchically according to the importance of the information. The interface level information includes content elements displayed on each level of the interface, including text information, picture information, a display frame, color information, and the like.
Step S306, extracting the text information from the interface level information, and detecting whether the text information contains preset sensitive information.
The terminal can extract text information from the interface level information after acquiring the interface level information corresponding to the region to be captured, detect the extracted text information according to a preset sensitive information set, judge whether the text information contains sensitive information in the preset sensitive information set, and prompt a user to input authorization information on a screen if the text information contains sensitive information to perform identity verification.
In this embodiment, the text information corresponding to the screenshot area can be detected, when the text information includes sensitive information, the input authorization information needs to be verified, and the screenshot can be performed after the verification is passed, so that information leakage during screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 4, in an embodiment, the step S220 of detecting whether the area to be captured contains preset sensitive information includes the following steps:
step S402, obtaining the information of the object to be captured associated with the area to be captured.
The terminal receives the screenshot command, determines the area to be screenshot according to the screenshot command, and can detect whether the information of the object to be screenshot related to the area to be screenshot contains preset sensitive information. The object to be captured refers to a target object which needs to be captured, and the object to be captured may include an application to be captured, a chat object to be captured, and the like. The terminal may obtain information of the object to be screenshot associated with the area to be screenshot, for example, obtain an application identifier associated with the area to be screenshot, or obtain a name of a chat object associated with the area to be screenshot.
Step S404, detecting whether the information of the object to be captured contains preset sensitive information.
The terminal can detect whether the information of the object to be captured associated with the area to be captured includes preset sensitive information according to a preset sensitive information set, for example, whether an application identifier associated with the area to be captured belongs to a preset sensitive application or whether a name of a chat object associated with the area to be captured is a preset sensitive name or not. If the information of the object to be captured includes preset sensitive information, the terminal can prompt the user to input authorization information on the screen for authentication.
In the embodiment, the information of the object to be captured associated with the area to be captured can be detected, when the information of the object to be captured associated with the area to be captured contains sensitive information, the input authorization information needs to be verified, and the image capture can be performed after the verification is passed, so that information leakage during image capture can be prevented, and the safety of image capture is effectively improved.
As shown in fig. 5, in an embodiment, after the step S250 intercepts the content of the area to be screenshot and generates a picture, the following steps are further included:
step S502, determining the sensitive area of the picture according to the sensitive information contained in the area to be captured.
When the terminal detects that the area to be captured contains the sensitive information, the coordinate information corresponding to the sensitive information can be obtained, and therefore the position of the sensitive information is determined. After the terminal verifies that the authorization information input by the user passes and intercepts the content of the region to be captured to generate a picture, the sensitive region can be defined on the generated picture according to the position of the sensitive information.
Further, the size of the sensitive area may be preset, for example, a rectangle with a length of 300px (pixels) and a width of 150px, which is centered on the position of the sensitive information, is set, but the present invention is not limited thereto, and the terminal may only use the position of the sensitive information on the picture as the sensitive area. When the picture contains a plurality of sensitive information, that is, when the position of the sensitive information is multiple, a plurality of sensitive areas can be defined on the picture.
And step S504, establishing an information shielding layer according to the authorization information.
After the terminal determines the sensitive area of the picture, an information shielding layer can be established to hide information in the sensitive area. The terminal may create an empty layer first, and fill a designated color, such as black, red, white, or the like, in the empty layer, or create an empty layer first, and insert a preset picture, such as a blue sky picture, a tree picture, or the like, in the empty layer, thereby obtaining an information-blocked layer. The terminal creates an information shielding layer according to the authorization information, which can be equivalent to encrypting the information shielding layer according to the authorization information, when a user views the picture, the information shielding layer in the picture can be removed only when the input authorization information is correct, and the original picture content is recovered.
Step S506, the information shielding layer is covered on the sensitive area of the picture, and the information hiding picture is obtained.
The terminal can cover the created information shielding layer on the sensitive area of the picture, and after the information shielding layer is encrypted according to the authorization information, if the information shielding layer is not decrypted, the information shielding layer cannot be operated, wherein the operations comprise removing, dragging, shearing and the like, so that the sensitive information on the picture can be hidden, and the information hidden picture can be obtained.
Fig. 6(a) is a schematic diagram of a picture including sensitive information in an embodiment, and fig. 6(b) is a schematic diagram of covering a sensitive area of the picture through an information blocking layer in an embodiment. As shown in fig. 6(a) and 6(b), the terminal determines a region to be screenshot according to the screenshot command, and after the authorization information input by the user is verified, captures the content of the region to be screenshot and generates a picture 600. If the terminal detects that the region to be captured contains the sensitive information "identity card", the sensitive region 610 of the picture 600 can be determined according to the contained sensitive information. The terminal creates an information shielding layer 620 according to the authorization information, covers the information shielding layer 620 on the sensitive area 610 of the picture 600, and hides the sensitive information on the picture 600.
In this embodiment, the information shielding layer can be covered on the sensitive area in the picture, so that the sensitive information contained in the picture is hidden, information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 7, in an embodiment, after the step S250 intercepts the content of the area to be screenshot and generates a picture, the following steps are further included:
step S702, determining a sensitive area of the picture according to the sensitive information contained in the area to be captured.
Step S704, fuzzification or encryption processing is carried out on the sensitive area according to the authorization information, and an information hiding picture is obtained.
After the terminal determines the sensitive area of the picture, the terminal may perform blurring processing on the sensitive area according to the authorization information, where the blurring processing may include mosaic printing processing, and randomly taking and rearranging pixel values in the sensitive area of the picture to obtain a mosaic effect, or may perform smoothing processing on the pixel values in the sensitive area of the picture to average the pixel values in the sensitive area, so that a difference between the pixel values in the sensitive area is reduced, thereby achieving the blurring effect, and the like, and is not limited thereto. After the sensitive area is fuzzified according to the authorization information, when a user views the picture, the sensitive area in the picture can be subjected to defuzzification only when the input authorization information is correct, and the original picture content is recovered.
The terminal can encrypt the sensitive area in the picture according to the authorization information, and rearrange the pixel values in the sensitive area according to a preset arrangement rule, for example, two adjacent pixel values are rearranged. When a user views the picture, only when the input authorization information is correct, the sensitive area of the picture is restored according to the corresponding inverse arrangement rule, and the original picture content is restored. The terminal fuzzifies or encrypts the sensitive area according to the authorization information, and can hide the sensitive information on the picture to obtain an information hidden picture.
Fig. 8(a) is a schematic diagram of a picture including sensitive information in an embodiment, and fig. 8(b) is a schematic diagram of a blurring process performed on a sensitive area in an embodiment. As shown in fig. 8(b) and (a), the terminal determines a region to be screenshot according to the screenshot command, and after the authorization information input by the user is verified, captures the content of the region to be screenshot and generates a picture 800. If the terminal detects that the to-be-captured image area contains the sensitive information 'identity card', the sensitive area 820 of the picture 800 can be determined according to the contained sensitive information. The terminal fuzzifies the sensitive area 820 according to the authorization information and hides the sensitive information on the picture 800.
In the embodiment, the sensitive area of the picture can be fuzzified or encrypted, so that sensitive information contained in the picture is hidden, information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
In one embodiment, after the step S250 intercepts the content of the area to be screenshot and generates a picture, the method further includes: and encrypting the picture by using the authorization information as a key by adopting a preset encryption algorithm.
After the terminal verifies that the authorization information input by the user passes through, and intercepts the content of the region to be captured to generate the picture, a preset encryption algorithm can be adopted, the authorization information is used as a key to encrypt the picture, bytes contained in the picture are used as a plaintext, and a corresponding ciphertext is generated through the encryption algorithm. The Encryption algorithm may be, but is not limited to, DES (Data Encryption Standard), AES (Advanced Encryption Standard), and the like.
In the embodiment, the authorization information is used as the key to encrypt the picture, so that information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 9, in an embodiment, the screenshot method further includes the following steps:
step S902, a picture viewing instruction is received.
When a user touches and checks the picture on the screen of the terminal, the terminal receives a picture checking instruction.
Step S904, detecting whether the checked picture includes a preset mark according to the picture checking instruction, if so, performing step S906, and if not, performing step S910.
In an embodiment, when the terminal performs information hiding processing on the picture generated by intercepting the content of the area to be captured, a preset mark may be added to the picture subjected to the information hiding processing, where the information hiding processing includes, but is not limited to, the above-mentioned covering of the information-blocking layer, blurring processing, encryption processing, and the like. The preset mark is used for marking the picture to be subjected to information hiding processing, when the terminal receives a picture viewing instruction, whether the viewed picture contains the preset mark or not can be detected according to the picture viewing instruction, if yes, the picture is subjected to information hiding processing, the picture contains sensitive information, and if not, the picture is a normal picture and can be directly displayed.
Step S906, the input authorization information is verified.
If the checked pictures comprise preset pictures, the terminal can carry out authorization prompt on a screen interface, and the user can input authorization information according to the authorization prompt. The terminal can verify the authorization information after acquiring the authorization information input by the user, and when the input authorization information is matched with the preset authorization information, the verification is passed, otherwise, the verification fails.
Step S908, if the verification passes, performing restoration processing on the checked picture, and displaying the restored picture.
In an embodiment, different preset marks may be added to the picture for different information hiding processes, for example, when the sensitive area of the picture covers the information blocking layer, a first preset mark is added, when the sensitive area of the picture is subjected to blurring processing, a second preset mark is added, when the sensitive area of the picture is subjected to encryption processing, a third preset mark is added, and when the picture is encrypted, a fourth preset mark is added. If the authorization information input by the user passes the verification, the terminal can determine the corresponding information hiding processing type according to the preset label contained in the picture, and perform corresponding restoration processing on the checked picture.
For example, the information hiding processing type is to cover an information occlusion layer on a sensitive area of a picture, and the corresponding restoration processing is to remove the information occlusion layer in the picture; the information hiding processing type is to perform fuzzification processing on a sensitive area of the picture, and the corresponding restoration processing is to perform defuzzification processing on the sensitive area of the picture and identify a restored picture; the information hiding processing type is that the sensitive area of the picture is encrypted, and the corresponding restoration processing is that the sensitive area of the picture is decrypted; and if the information hiding processing type is to encrypt the picture, the corresponding restoration processing is to decrypt the picture according to the authorization information, and the like. And after the restoration processing of the checked picture is finished, the terminal can display the restored picture.
Step S910, displaying the viewed picture.
In this embodiment, when the screenshot containing the sensitive information is checked, the input authorization information is verified first, then the picture is restored and displayed, so that the condition that the screenshot containing the sensitive information is leaked can be further prevented, and the security of the screenshot is effectively improved.
As shown in fig. 10, in an embodiment, a screenshot device 1000 is provided, which includes a to-be-screenshot area determining module 1010, a sensitive information detecting module 1020, a verifying module 1030, and a screenshot module 1040.
And a to-be-screenshot area determining module 1010, configured to receive a screenshot instruction, and determine the to-be-screenshot area according to the screenshot instruction.
And the sensitive information detection module 1020 is configured to detect whether the area to be captured contains preset sensitive information.
And the verification module 1030 is configured to, if the authorization information includes the identifier, obtain the input authorization information, and verify the authorization information.
And the screenshot module 1040 is configured to capture the content of the area to be screenshot and generate a picture if the verification is passed.
The screenshot device receives the screenshot command, determines the area to be screenshot according to the screenshot command, detects whether the area to be screenshot contains preset sensitive information, acquires the authorization information input by a user if the area to be screenshot contains the preset sensitive information, verifies the authorization information, and can intercept the content of the area to be screenshot and generate a picture when the authorization information passes verification, so that information leakage during screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 11, in an embodiment, the sensitive information detecting module 1020 includes a coordinate obtaining unit 1022, an interface obtaining unit 1024, a detecting unit 1026, and a to-be-screenshot object obtaining unit 1028.
A coordinate obtaining unit 1022, configured to obtain coordinate information of the area to be screenshot.
And the interface obtaining unit 1024 is configured to obtain interface level information corresponding to the area to be screenshot according to the coordinate information.
The detecting unit 1026 is configured to extract the text information from the interface hierarchy information, and detect whether the text information includes preset sensitive information.
And the to-be-screenshot object obtaining unit 1028 is configured to obtain information of the to-be-screenshot object associated with the to-be-screenshot area.
The detecting unit 1026 is further configured to detect whether the information of the object to be captured includes preset sensitive information.
In this embodiment, the text information corresponding to the screenshot area can be detected, when the text information includes sensitive information, the input authorization information needs to be verified, and the screenshot can be performed after the verification is passed, so that information leakage during screenshot can be prevented, and the screenshot safety is effectively improved.
In addition, the information of the object to be captured associated with the area to be captured can be detected, when the information of the object to be captured associated with the area to be captured contains sensitive information, the input authorization information needs to be verified, the image capture can be carried out after the verification is passed, the information leakage during the image capture can be prevented, and the safety of the image capture is effectively improved.
As shown in fig. 12, in an embodiment, the screenshot device 1000 includes, in addition to a to-be-screenshot area determining module 1010, a sensitive information detecting module 1020, a verifying module 1030, and a screenshot module 1040, a sensitive area determining module 1050, a creating module 1060, an overlaying module 1070, and a blurring processing module 1080.
And the sensitive region determining module 1050 is configured to determine a sensitive region of the picture according to the sensitive information included in the region to be captured.
A creating module 1060, configured to create an information occlusion layer according to the authorization information.
The covering module 1070 is configured to cover the information blocking layer on the sensitive area of the picture, so as to obtain an information hidden picture.
And the fuzzification processing module 1080 is configured to perform fuzzification or encryption processing on the sensitive area according to the authorization information to obtain an information hidden picture.
In this embodiment, the information shielding layer can be covered on the sensitive area in the picture, so that the sensitive information contained in the picture is hidden, information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
In addition, in the embodiment, the sensitive area of the picture can be fuzzified or encrypted, so that sensitive information contained in the picture is hidden, information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 13, in an embodiment, the screenshot device 1000 further includes an encryption module 1090 in addition to the to-be-screenshot area determining module 1010, the sensitive information detecting module 1020, the verifying module 1030, the screenshot module 1040, the sensitive area determining module 1050, the creating module 1060, the covering module 1070, and the fuzzification processing module 1080.
And an encryption module 1090 which is used for encrypting the picture by using a preset encryption algorithm and using the authorization information as a key.
In the embodiment, the authorization information is used as the key to encrypt the picture, so that information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 14, in an embodiment, the screenshot device 1000 includes a mark detection module 1100 and a presentation module 1110 in addition to the to-be-screenshot area determination module 1010, the sensitive information detection module 1020, the verification module 1030, the screenshot module 1040, the sensitive area determination module 1050, the creation module 1060, the coverage module 1070, the fuzzification processing module 1080 and the encryption module 1090.
The mark detection module 1100 is configured to receive a picture viewing instruction, and detect whether a viewed picture includes a preset mark according to the picture viewing instruction.
The verifying module 1030 is further configured to verify the input authorization information if the checked picture includes a preset mark.
The display module 1110 is configured to perform restoration processing on the checked picture and display the restored picture if the verification passes.
In this embodiment, when the screenshot containing the sensitive information is checked, the input authorization information is verified first, then the picture is restored and displayed, so that the condition that the screenshot containing the sensitive information is leaked can be further prevented, and the security of the screenshot is effectively improved.
The embodiment of the invention also provides computer equipment. As shown in fig. 15, for convenience of illustration, only the portion related to the embodiment of the present invention is shown, and the detailed technical details are not disclosed, please refer to the method portion of the embodiment of the present invention. The computer device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, a wearable device, and the like, taking the computer device as the mobile phone as an example:
fig. 15 is a block diagram of a partial structure of a cellular phone related to a computer device provided in an embodiment of the present invention. Referring to fig. 15, the cellular phone includes: radio Frequency (RF) circuitry 1510, memory 1520, input unit 1530, display unit 1540, sensors 1550, audio circuitry 1560, WiFi module 1570, processor 1580, and power supply 1590. Those skilled in the art will appreciate that the handset configuration shown in fig. 15 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The RF circuit 1510 may be configured to receive and transmit signals during information transmission and reception or during a call, and may receive downlink information of a base station and then process the downlink information to the processor 1580; the uplink data may also be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuit 1510 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM, General Packet Radio Service (GPRS), CDMA, Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 1520 may be used to store software programs and modules, and the processor 1580 performs various functional applications and data processing of the cellular phone by operating the software programs and modules stored in the memory 1520. The memory 1520 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function (such as an application program for a sound playing function, an application program for an image playing function, etc.), and the like; the data storage area may store data (such as audio data, an address book, etc.) created according to the use of the mobile phone, and the like. Further, the memory 1520 may include high-speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The input unit 1530 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone 1500. In particular, the input unit 1530 may include a touch panel 1532 and other input devices 1534. Touch panel 1532, also referred to as a touch screen, can collect touch operations by a user on or near the touch panel 1532 (e.g., operations by a user on or near the touch panel 1532 using any suitable object or accessory such as a finger, stylus, etc.) and drive the corresponding connection device according to a predetermined program. In one embodiment, the touch panel 1532 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 1580, and can receive and execute commands sent by the processor 1580. In addition, the touch panel 1532 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 1530 may include other input devices 1534 in addition to the touch panel 1532. In particular, other input devices 1534 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), and the like.
The display unit 1540 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The display unit 1540 may include a display panel 1542. In one embodiment, the Display panel 1542 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. In one embodiment, the touch panel 1532 can cover the display panel 1542, and when the touch panel 1532 detects a touch operation on or near the touch panel 1532, the touch operation can be transmitted to the processor 1580 to determine the type of the touch event, and then the processor 1580 can provide a corresponding visual output on the display panel 1542 according to the type of the touch event. Although in fig. 15, the touch panel 1532 and the display panel 1542 are two separate components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 1532 and the display panel 1542 can be integrated to implement the input and output functions of the mobile phone.
The cell phone 1500 can also include at least one sensor 1550, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 1542 according to the brightness of ambient light and a proximity sensor that turns off the display panel 1542 and/or the backlight when the mobile phone is moved to the ear. The motion sensor can comprise an acceleration sensor, the acceleration sensor can detect the magnitude of acceleration in each direction, the magnitude and the direction of gravity can be detected when the mobile phone is static, and the motion sensor can be used for identifying the application of the gesture of the mobile phone (such as horizontal and vertical screen switching), the vibration identification related functions (such as pedometer and knocking) and the like; the mobile phone may be provided with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through a WiFi module 1570, and provides wireless broadband internet access for the user.
The processor 1580 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 1520 and calling data stored in the memory 1520, thereby integrally monitoring the mobile phone. In one embodiment, the processor 1580 may include one or more processing units. In one embodiment, the processor 1580 may integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application program, and the like; the modem processor handles primarily wireless communications. It is to be appreciated that the modem processor may not be integrated into the processor 1580.
The handset 1500 also includes a power supply 1590 (e.g., a battery) for powering the various components, and preferably, the power supply 1590 is logically connected to the processor 1580 via a power management system, such that the power management system may be used to manage charging, discharging, and power consumption.
In one embodiment, the handset 1500 may also include a camera, a bluetooth module, and the like.
In the embodiment of the present invention, the processor 1580 included in the mobile terminal implements the screenshot method when executing the computer program stored in the memory.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (12)
1. A method of screenshot, comprising:
receiving a screenshot instruction, and determining a region to be screenshot according to the screenshot instruction;
determining an application identifier associated with the area to be captured, and detecting whether the area to be captured contains sensitive information corresponding to the application identifier;
if yes, acquiring input authorization information, and verifying the authorization information;
if the verification is passed, intercepting the content of the area to be subjected to screenshot and generating a picture;
determining a sensitive area of the picture according to sensitive information contained in the area to be captured;
fuzzification or encryption processing is carried out on the sensitive area according to the authorization information to obtain an information hiding picture;
receiving a picture viewing instruction, and detecting whether the viewed picture contains a preset mark according to the picture viewing instruction;
if the preset mark is included, verifying the input authorization information; if the verification is passed, the checked picture is subjected to restoration processing, and the restored picture is displayed;
and if the preset mark is not included, displaying the viewed picture.
2. The method of claim 1, wherein the detecting whether the area to be captured contains sensitive information corresponding to the application identifier comprises:
acquiring coordinate information of the area to be captured;
acquiring interface level information corresponding to the area to be captured according to the coordinate information;
extracting text information from the interface level information, and detecting whether the text information contains sensitive information corresponding to the application identification.
3. The method according to claim 1 or 2, wherein the detecting whether the area to be captured contains sensitive information corresponding to the application identifier comprises:
acquiring information of an object to be captured associated with the area to be captured;
and detecting whether the information of the object to be captured contains sensitive information corresponding to the application identifier.
4. The method according to claim 1, wherein after the intercepting the content of the area to be captured and generating a picture if the verification is passed, the method further comprises:
determining a sensitive area of the picture according to sensitive information contained in the area to be captured;
creating an information shielding layer according to the authorization information;
and covering the information shielding layer on the sensitive area of the picture to obtain an information hiding picture.
5. The method according to claim 1, wherein after the intercepting the content of the area to be captured and generating a picture if the verification is passed, the method further comprises:
and encrypting the picture by using the authorization information as a key by adopting a preset encryption algorithm.
6. A screenshot device, comprising:
the device comprises a to-be-screenshot area determining module, a screenshot judging module and a screenshot judging module, wherein the to-be-screenshot area determining module is used for receiving a screenshot instruction and determining a to-be-screenshot area according to the screenshot instruction;
the sensitive information detection module is used for determining an application identifier associated with the area to be subjected to screenshot and detecting whether the area to be subjected to screenshot contains sensitive information corresponding to the application identifier;
the verification module is used for acquiring the input authorization information and verifying the authorization information if the authorization information is included;
the screenshot module is used for intercepting the content of the area to be screenshot and generating a picture if the verification is passed;
the sensitive area determining module is used for determining the sensitive area of the picture according to the sensitive information contained in the area to be captured;
the fuzzification processing module is used for fuzzifying or encrypting the sensitive area according to the authorization information to obtain an information hidden picture;
the mark detection module is used for receiving a picture viewing instruction and detecting whether the viewed picture contains a preset mark according to the picture viewing instruction;
the verification module is further used for verifying the input authorization information if the checked picture contains the preset mark;
the display module is used for restoring the checked picture and displaying the restored picture if the verification is passed; and if the preset mark is not included, displaying the viewed picture.
7. The apparatus of claim 6, wherein the sensitive information detection module comprises:
the coordinate acquisition unit is used for acquiring coordinate information of the area to be captured;
the interface acquisition unit is used for acquiring interface level information corresponding to the area to be captured according to the coordinate information;
and the detection unit is used for extracting text information from the interface hierarchy information and detecting whether the text information contains sensitive information corresponding to the application identifier.
8. The apparatus of claim 7, wherein the sensitive information detection module further comprises:
the acquisition unit of the object to be captured is used for acquiring the information of the object to be captured related to the area to be captured;
the detection unit is further configured to detect whether the information of the object to be captured includes sensitive information corresponding to the application identifier.
9. The apparatus of claim 6, further comprising:
the sensitive area determining module is used for determining the sensitive area of the picture according to the sensitive information contained in the area to be captured;
the creating module is used for creating an information shielding layer according to the authorization information;
and the covering module is used for covering the information shielding layer on the sensitive area of the picture to obtain an information hiding picture.
10. The apparatus of claim 6, further comprising:
and the encryption module is used for encrypting the picture by using the authorization information as a key by adopting a preset encryption algorithm.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1 to 5 when executing the program.
12. A non-transitory computer-readable storage medium having computer-executable instructions stored thereon, wherein the computer-executable instructions, when executed by a processor, implement the method of any of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710296221.1A CN107145795B (en) | 2017-04-28 | 2017-04-28 | Screenshot method and device and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710296221.1A CN107145795B (en) | 2017-04-28 | 2017-04-28 | Screenshot method and device and computer equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107145795A CN107145795A (en) | 2017-09-08 |
CN107145795B true CN107145795B (en) | 2020-08-18 |
Family
ID=59775295
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710296221.1A Active CN107145795B (en) | 2017-04-28 | 2017-04-28 | Screenshot method and device and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107145795B (en) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107679419B (en) * | 2017-10-17 | 2020-07-14 | 南通纤麦家纺科技有限公司 | Screen capturing method and device |
CN108038827A (en) * | 2017-11-30 | 2018-05-15 | 努比亚技术有限公司 | Image processing method, mobile terminal and computer-readable recording medium |
CN108153468A (en) * | 2017-12-14 | 2018-06-12 | 阿里巴巴集团控股有限公司 | Image processing method and device |
CN108279843B (en) * | 2018-01-11 | 2019-12-03 | 维沃移动通信有限公司 | A kind of screenshot method and mobile terminal |
CN110633116A (en) * | 2018-06-21 | 2019-12-31 | 钉钉控股(开曼)有限公司 | Screenshot processing method and device |
CN109067566B (en) * | 2018-07-09 | 2021-08-17 | 奇安信科技集团股份有限公司 | Method, terminal and monitoring equipment for screenshot in silent mode |
CN108924381B (en) * | 2018-07-23 | 2020-11-06 | 上海掌门科技有限公司 | Image processing method, image processing apparatus, and computer readable medium |
CN109085975A (en) * | 2018-08-06 | 2018-12-25 | Oppo广东移动通信有限公司 | Screenshotss method, apparatus, storage medium and electronic device |
US20210312080A1 (en) * | 2018-08-28 | 2021-10-07 | Visa International Service Association | Methodology to obfuscate sensitive information in mobile application background snapshot |
CN109598138B (en) * | 2018-11-15 | 2023-07-11 | 创新先进技术有限公司 | Method and device for identifying, covering and sensing whether sensitive information in picture is checked or not |
CN109710362B (en) * | 2018-12-26 | 2020-02-07 | 掌阅科技股份有限公司 | Screenshot processing method, computing device and computer storage medium |
CN110377202A (en) * | 2019-06-05 | 2019-10-25 | 平安科技(深圳)有限公司 | Image processing method, device, electronic equipment and storage medium |
CN112306590B (en) * | 2019-07-30 | 2022-04-26 | 腾讯科技(深圳)有限公司 | Screenshot generating method and related device |
CN111552422A (en) * | 2020-04-20 | 2020-08-18 | 广东以诺通讯有限公司 | Intelligent terminal screen capture local fuzzy method and device and terminal |
CN112783399A (en) * | 2020-05-13 | 2021-05-11 | 北京金山办公软件股份有限公司 | Screenshot method and device |
CN114548343A (en) * | 2020-11-27 | 2022-05-27 | 海能达通信股份有限公司 | Graphic code display method, terminal and computer readable storage medium |
CN112800449A (en) * | 2021-02-03 | 2021-05-14 | 网易(杭州)网络有限公司 | Encryption method and device for page screenshot, electronic equipment and storage medium |
CN113204404A (en) * | 2021-05-20 | 2021-08-03 | 北京字跳网络技术有限公司 | Screen capture method and device and electronic equipment |
CN113254820A (en) * | 2021-06-11 | 2021-08-13 | 支付宝(杭州)信息技术有限公司 | Webpage evidence storing method, device and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104408686A (en) * | 2014-10-31 | 2015-03-11 | 宇龙计算机通信科技(深圳)有限公司 | Method, system and terminal for screen capturing |
CN104808916A (en) * | 2015-04-13 | 2015-07-29 | 深圳市金立通信设备有限公司 | Screen-shooting method |
CN105117122A (en) * | 2015-07-30 | 2015-12-02 | 深圳市金立通信设备有限公司 | Terminal screenshot method and terminal |
CN105893866A (en) * | 2016-02-15 | 2016-08-24 | 努比亚技术有限公司 | Screen capture method and device |
-
2017
- 2017-04-28 CN CN201710296221.1A patent/CN107145795B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104408686A (en) * | 2014-10-31 | 2015-03-11 | 宇龙计算机通信科技(深圳)有限公司 | Method, system and terminal for screen capturing |
CN104808916A (en) * | 2015-04-13 | 2015-07-29 | 深圳市金立通信设备有限公司 | Screen-shooting method |
CN105117122A (en) * | 2015-07-30 | 2015-12-02 | 深圳市金立通信设备有限公司 | Terminal screenshot method and terminal |
CN105893866A (en) * | 2016-02-15 | 2016-08-24 | 努比亚技术有限公司 | Screen capture method and device |
Also Published As
Publication number | Publication date |
---|---|
CN107145795A (en) | 2017-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107145795B (en) | Screenshot method and device and computer equipment | |
KR102089191B1 (en) | Methods, devices and systems for processing order information | |
CN108510022B (en) | Two-dimensional code generation and verification method and server | |
CN107784232B (en) | Picture processing method and mobile terminal | |
WO2017084288A1 (en) | Method and device for verifying identity | |
CN110188524B (en) | Information encryption method, information decryption method and terminal | |
CN107784089B (en) | Multimedia data storage method, processing method and mobile terminal | |
US9940448B2 (en) | Unlock processing method and device | |
CN109145552B (en) | Information encryption method and terminal equipment | |
CN108901020B (en) | Network access method, mobile terminal and server | |
US10454905B2 (en) | Method and apparatus for encrypting and decrypting picture, and device | |
CN109918944B (en) | Information protection method and device, mobile terminal and storage medium | |
CN108459788B (en) | Picture display method and terminal | |
CN110990849A (en) | Encryption and decryption method for private data and terminal | |
CN111181909B (en) | Identity information acquisition method and related device | |
CN110149628B (en) | Information processing method and terminal equipment | |
CN110035183B (en) | Information sharing method and terminal | |
WO2018095216A1 (en) | Relationship chain processing method, terminal and storage medium | |
CN110457879A (en) | Object displaying method and terminal device | |
CN108491713B (en) | Safety reminding method and electronic equipment | |
CN109446794B (en) | Password input method and mobile terminal thereof | |
TW201826158A (en) | Method, Device and Terminal for Displaying Data | |
CN108109188B (en) | Image processing method and mobile terminal | |
CN107835297B (en) | Information updating method, mobile terminal and computer readable storage medium | |
CN111159687B (en) | Account information processing method, electronic equipment and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |