CN107145795B - Screenshot method and device and computer equipment - Google Patents

Screenshot method and device and computer equipment Download PDF

Info

Publication number
CN107145795B
CN107145795B CN201710296221.1A CN201710296221A CN107145795B CN 107145795 B CN107145795 B CN 107145795B CN 201710296221 A CN201710296221 A CN 201710296221A CN 107145795 B CN107145795 B CN 107145795B
Authority
CN
China
Prior art keywords
information
picture
screenshot
area
sensitive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710296221.1A
Other languages
Chinese (zh)
Other versions
CN107145795A (en
Inventor
张烨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710296221.1A priority Critical patent/CN107145795B/en
Publication of CN107145795A publication Critical patent/CN107145795A/en
Application granted granted Critical
Publication of CN107145795B publication Critical patent/CN107145795B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • User Interface Of Digital Computer (AREA)
  • Studio Devices (AREA)

Abstract

The invention relates to a screenshot method and device and computer equipment. The method comprises the following steps: receiving a screenshot instruction, and determining a region to be screenshot according to the screenshot instruction; detecting whether the area to be captured contains preset sensitive information or not; if yes, acquiring input authorization information, and verifying the authorization information; and if the verification is passed, intercepting the content of the area to be subjected to screenshot and generating a picture. The screenshot method, the screenshot device and the computer equipment can prevent information leakage during screenshot and effectively improve screenshot safety.

Description

Screenshot method and device and computer equipment
Technical Field
The invention relates to the field of computers, in particular to a screenshot method, a screenshot device and computer equipment.
Background
A screenshot refers to a visual image captured by the terminal that can be displayed on a screen or other display device, and typically the screenshot may be captured by the operating system of the terminal or installed screenshot software. The user's accessible is carried out the screenshot to various pictures at terminal to save the record, conveniently look over or share with other people next time. In the traditional mode, the terminal directly intercepts corresponding content as long as receiving screenshot operation executed by a user and generates pictures, so that information leakage is easily caused, and the security is poor.
Disclosure of Invention
The embodiment of the invention provides a screenshot method, a screenshot device and computer equipment, which can prevent information leakage during screenshot and effectively improve screenshot safety.
A method of screenshot comprising:
receiving a screenshot instruction, and determining a region to be screenshot according to the screenshot instruction;
detecting whether the area to be captured contains preset sensitive information or not;
if yes, acquiring input authorization information, and verifying the authorization information;
and if the verification is passed, intercepting the content of the area to be subjected to screenshot and generating a picture.
In one embodiment, the detecting whether the area to be captured contains preset sensitive information includes:
acquiring coordinate information of the area to be captured;
acquiring interface level information corresponding to the area to be captured according to the coordinate information;
extracting text information from the interface level information, and detecting whether the text information contains preset sensitive information.
In one embodiment, the detecting whether the area to be captured contains preset sensitive information includes:
acquiring information of an object to be captured associated with the area to be captured;
and detecting whether the information of the object to be captured contains preset sensitive information.
In one embodiment, after the intercepting the content of the region to be screenshot and generating a picture if the verification passes, the method further includes:
determining a sensitive area of the picture according to sensitive information contained in the area to be captured;
creating an information shielding layer according to the authorization information;
and covering the information shielding layer on the sensitive area of the picture to obtain an information hiding picture.
In one embodiment, after the intercepting the content of the region to be screenshot and generating a picture if the verification passes, the method further includes:
determining a sensitive area of the picture according to sensitive information contained in the area to be captured;
and carrying out fuzzification or encryption processing on the sensitive area according to the authorization information to obtain an information hidden picture.
In one embodiment, after the intercepting the content of the region to be screenshot and generating a picture if the verification passes, the method further includes:
and encrypting the picture by using the authorization information as a key by adopting a preset encryption algorithm.
In one embodiment, the method further comprises:
receiving a picture viewing instruction, and detecting whether the viewed picture contains a preset mark according to the picture viewing instruction;
if yes, verifying the input authorization information;
and if the verification is passed, performing restoration processing on the checked picture, and displaying the restored picture.
A screenshot device comprising:
the device comprises a to-be-screenshot area determining module, a screenshot judging module and a screenshot judging module, wherein the to-be-screenshot area determining module is used for receiving a screenshot instruction and determining a to-be-screenshot area according to the screenshot instruction;
the sensitive information detection module is used for detecting whether the area to be captured contains preset sensitive information;
the verification module is used for acquiring the input authorization information and verifying the authorization information if the authorization information is included;
and the screenshot module is used for intercepting the content of the area to be screenshot and generating a picture if the verification is passed.
In one embodiment, the sensitive information detection module includes:
the coordinate acquisition unit is used for acquiring coordinate information of the area to be captured;
the interface acquisition unit is used for acquiring interface level information corresponding to the area to be captured according to the coordinate information;
and the detection unit is used for extracting text information from the interface level information and detecting whether the text information contains preset sensitive information.
In one embodiment, the sensitive information detection module further includes:
the acquisition unit of the object to be captured is used for acquiring the information of the object to be captured related to the area to be captured;
the detection unit is further configured to detect whether the information of the object to be captured includes preset sensitive information.
In one embodiment, the apparatus further comprises:
the sensitive area determining module is used for determining the sensitive area of the picture according to the sensitive information contained in the area to be captured;
the creating module is used for creating an information shielding layer according to the authorization information;
the covering module is used for covering the information shielding layer on the sensitive area of the picture to obtain an information hiding picture;
and the fuzzification processing module is used for carrying out fuzzification or encryption processing on the sensitive area according to the authorization information to obtain an information hidden picture.
In one embodiment, the apparatus further comprises:
and the encryption module is used for encrypting the picture by using the authorization information as a key by adopting a preset encryption algorithm.
In one embodiment, the apparatus further comprises:
the mark detection module is used for receiving a picture viewing instruction and detecting whether the viewed picture contains a preset mark according to the picture viewing instruction;
the verification module is further used for verifying the input authorization information if the checked picture contains a preset mark;
and the display module is used for restoring the checked picture and displaying the restored picture if the verification is passed.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method as described above when executing the program.
The screenshot method, the screenshot device and the computer equipment receive the screenshot command, determine the area to be screenshot according to the screenshot command, detect whether the area to be screenshot contains preset sensitive information, if so, obtain the input authorization information, verify the authorization information, intercept the content of the area to be screenshot and generate the picture only when the verification is passed, prevent information leakage during screenshot, and effectively improve screenshot safety.
Drawings
FIG. 1 is a block diagram of a terminal in one embodiment;
FIG. 2 is a flow diagram illustrating a method for screenshot in one embodiment;
FIG. 3 is a schematic flow chart illustrating an embodiment of detecting whether a region to be captured contains preset sensitive information;
FIG. 4 is a schematic flowchart illustrating a process of detecting whether a region to be captured contains preset sensitive information according to another embodiment;
FIG. 5 is a flow diagram illustrating an embodiment of an information hiding process for a picture containing sensitive information;
FIG. 6(a) is a diagram illustrating a picture containing sensitive information according to one embodiment;
FIG. 6(b) is a diagram illustrating an embodiment of covering a sensitive area of a picture with an information blocking layer;
FIG. 7 is a flowchart illustrating an information hiding process performed on a picture containing sensitive information according to another embodiment;
FIG. 8(a) is a diagram illustrating a picture containing sensitive information according to an embodiment;
FIG. 8(b) is a diagram illustrating an exemplary blurring process performed on a sensitive region;
FIG. 9 is a schematic diagram of a process for viewing pictures in one embodiment;
FIG. 10 is a schematic diagram of an embodiment of a screenshot device;
FIG. 11 is a diagram illustrating an internal structure of a sensitive information detecting module according to an embodiment;
FIG. 12 is a schematic diagram of a screenshot device in another embodiment;
FIG. 13 is a schematic diagram of a screenshot device in another embodiment;
FIG. 14 is a schematic diagram showing the construction of a screen capture apparatus according to still another embodiment;
FIG. 15 is a block diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Fig. 1 is a block diagram of a terminal in one embodiment. As shown in fig. 1, the terminal includes a processor, a nonvolatile storage medium, an internal memory, and a network interface, a display screen, and an input device, which are connected through a system bus. The non-volatile storage medium of the terminal stores an operating system and computer-executable instructions, and the computer-executable instructions are executed by the processor to implement the screenshot method provided in the embodiment of the application. The processor is used for providing calculation and control capability and supporting the operation of the whole terminal. The internal memory in the terminal provides an environment for the execution of computer-readable instructions in the non-volatile storage medium. The network interface is used for network communication with the server. The display screen of the terminal can be a liquid crystal display screen or an electronic ink display screen, and the input device can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on a shell of the terminal, or an external keyboard, a touch pad or a mouse. The terminal can be a mobile phone, a tablet computer, a personal digital assistant or a wearable device. Those skilled in the art will appreciate that the configuration shown in fig. 1 is a block diagram of only a portion of the configuration relevant to the present application, and does not constitute a limitation on the terminal to which the present application is applied, and that a particular terminal may include more or less components than those shown in the drawings, or may combine certain components, or have a different arrangement of components.
As shown in fig. 2, in one embodiment, a screenshot method is provided, which includes the following steps:
and step S210, receiving a screenshot instruction, and determining a region to be screenshot according to the screenshot instruction.
The user can perform screenshot operation on an interface displayed on a terminal screen, and the terminal receives a screenshot instruction according to the screenshot operation, wherein the screenshot operation can include modes of presetting shortcut key screenshot, touch screen screenshot and the like. Presetting a shortcut key screenshot, which means performing screenshot operation through a preset shortcut key, for example, presetting the shortcut key as a volume reduction key and a return key on a terminal, and when the volume reduction key and the return key are pressed simultaneously, the terminal can receive a screenshot instruction; the touch screen screenshot refers to screenshot performed by touching a screen with a mouse, a stylus, a finger, or the like, for example, a certain area is selected by touching the screen with the mouse, and a screenshot button is selected by a right button, so that the terminal can receive a screenshot command. The screenshot operation can also be a mode of presetting a shortcut key and a touch screen, the whole screen interface of the terminal is selected through the preset shortcut key, and then an area to be screenshot in the whole screen interface is selected through the touch screen of the input device. The screenshot operation may also be a manner of capturing a screenshot through a preset gesture, for example, contacting a side of a palm with one side of the screen and sliding the palm to another side of the screen at a constant speed to capture the screenshot on the screen interface, but is not limited thereto.
The terminal receives a screenshot instruction according to the screenshot operation, and determines a region to be screenshot according to the screenshot instruction, where the region to be screenshot refers to a region of a current screen interface of the terminal, where a picture needs to be generated by being intercepted, the region to be screenshot may be the whole screen interface or only a part of the screen interface, and the region to be screenshot is usually in a specific shape, such as a rectangle, a square, or a circle, but is not limited thereto.
Step S220, detecting whether the area to be captured contains preset sensitive information, if yes, performing step S230, and if not, performing step S250.
The terminal can detect the determined region to be captured according to a preset sensitive information set, and judge whether the determined region to be captured contains preset sensitive information, wherein the sensitive information can comprise preset sensitive words, sensitive names, sensitive numbers, sensitive applications and the like. Sensitive information can be added in the terminal in advance, for example, an identity card, a bank card and the like are added as sensitive words, a Zhang III and the like are added as sensitive names, a short message application is added as a sensitive application, and the like. And the terminal generates a sensitive information set according to the sensitive information added by the user and stores the sensitive information set.
In one embodiment, the terminal can classify the sensitive information in the sensitive information set according to the categories of sensitive words, sensitive names, sensitive numbers, sensitive applications and the like, and set the application corresponding to each category. When the terminal receives a screenshot instruction, a region to be screenshot is determined, an application identifier associated with the region to be screenshot is determined, a category corresponding to the application identifier in a sensitive information set can be obtained, and whether the region to be screenshot contains sensitive information or not is detected according to the corresponding category, wherein the application identifier can be information which can be used for uniquely identifying an application, such as an application name, an application number and the like. For example, the application corresponding to the sensitive name category may be set as an instant messaging application, and when the user performs a screenshot operation on the instant messaging application, the terminal may detect whether the area to be screenshot contains a preset sensitive name.
In one embodiment, different applications may respectively set different sensitive information, for example, the sensitive information set by the application a includes "id card" and "bank card", the sensitive information set by the application B includes "zhang san" and "password", and when a user adds different sensitive information to different applications, a corresponding relationship between an application identifier and the sensitive information may be established and stored in association. When the terminal receives a screenshot command, a region to be screenshot is determined, an application identifier associated with the region to be screenshot is determined, and whether the region to be screenshot contains sensitive information corresponding to the application identifier is detected.
Step S230, acquiring the input authorization information, and verifying the authorization information.
If the screenshot area contains preset sensitive information, the terminal can perform authorization prompting on a screen interface, and the user can input authorization information according to the authorization prompting, wherein the authorization information can contain preset password, fingerprint, iris, voiceprint and other information capable of verifying the user identity, and the password can be a character password consisting of one or more of numbers, letters, symbols and the like, and can also be a screen track sliding password and the like. The terminal can verify the authorization information after acquiring the authorization information input by the user, and when the input authorization information is matched with the preset authorization information, the verification is passed, otherwise, the verification fails. The identity of the user is verified, and therefore the condition that an illegal user randomly intercepts contents displayed on a screen on the terminal to cause information leakage can be prevented.
And step S240, if the verification is passed, intercepting the content of the area to be captured and generating a picture.
If the authorization information input by the user passes the verification, the terminal intercepts the content of the area to be screenshot and generates a picture, if the authorization information input by the user fails the verification, the screenshot is cancelled, the verification failure can be prompted on a screen interface, and the user is prompted to input the authorization information again.
And step S250, intercepting the content of the area to be screenshot and generating a picture.
If the area to be subjected to screenshot does not contain the preset sensitive information, the screenshot operation can be directly carried out, the content of the area to be subjected to screenshot is intercepted to generate a picture, and the picture is stored.
According to the screenshot method, the screenshot command is received, the area to be screenshot is determined according to the screenshot command, whether the area to be screenshot contains the preset sensitive information or not is detected, if yes, the input authorization information is obtained, the authorization information is verified, when the verification is passed, the content of the area to be screenshot can be intercepted, the picture can be generated, information leakage during screenshot can be prevented, and screenshot safety is effectively improved.
As shown in fig. 3, in an embodiment, the step S220 of detecting whether the area to be captured contains preset sensitive information includes the following steps:
step S302, coordinate information of the area to be captured is obtained.
The terminal receives the screenshot command, determines the area to be screenshot according to the screenshot command, and can detect whether text information in the area to be screenshot contains preset sensitive information. The terminal acquires coordinate information of the area to be captured on the screen, wherein the coordinate information comprises horizontal and vertical coordinate values of all points covered on the screen by the area to be captured.
And step S304, acquiring interface level information corresponding to the area to be captured according to the coordinate information.
After the terminal acquires the coordinate information of the area to be screenshot, the terminal can acquire the display area corresponding to the area to be screenshot on the interface displayed on the screen according to the coordinate information, so that the interface level information of the display area is acquired, various information such as navigation information, content information, prompt information and the like is displayed on the interface, and different information has different importance, so that the interface can be displayed hierarchically according to the importance of the information. The interface level information includes content elements displayed on each level of the interface, including text information, picture information, a display frame, color information, and the like.
Step S306, extracting the text information from the interface level information, and detecting whether the text information contains preset sensitive information.
The terminal can extract text information from the interface level information after acquiring the interface level information corresponding to the region to be captured, detect the extracted text information according to a preset sensitive information set, judge whether the text information contains sensitive information in the preset sensitive information set, and prompt a user to input authorization information on a screen if the text information contains sensitive information to perform identity verification.
In this embodiment, the text information corresponding to the screenshot area can be detected, when the text information includes sensitive information, the input authorization information needs to be verified, and the screenshot can be performed after the verification is passed, so that information leakage during screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 4, in an embodiment, the step S220 of detecting whether the area to be captured contains preset sensitive information includes the following steps:
step S402, obtaining the information of the object to be captured associated with the area to be captured.
The terminal receives the screenshot command, determines the area to be screenshot according to the screenshot command, and can detect whether the information of the object to be screenshot related to the area to be screenshot contains preset sensitive information. The object to be captured refers to a target object which needs to be captured, and the object to be captured may include an application to be captured, a chat object to be captured, and the like. The terminal may obtain information of the object to be screenshot associated with the area to be screenshot, for example, obtain an application identifier associated with the area to be screenshot, or obtain a name of a chat object associated with the area to be screenshot.
Step S404, detecting whether the information of the object to be captured contains preset sensitive information.
The terminal can detect whether the information of the object to be captured associated with the area to be captured includes preset sensitive information according to a preset sensitive information set, for example, whether an application identifier associated with the area to be captured belongs to a preset sensitive application or whether a name of a chat object associated with the area to be captured is a preset sensitive name or not. If the information of the object to be captured includes preset sensitive information, the terminal can prompt the user to input authorization information on the screen for authentication.
In the embodiment, the information of the object to be captured associated with the area to be captured can be detected, when the information of the object to be captured associated with the area to be captured contains sensitive information, the input authorization information needs to be verified, and the image capture can be performed after the verification is passed, so that information leakage during image capture can be prevented, and the safety of image capture is effectively improved.
As shown in fig. 5, in an embodiment, after the step S250 intercepts the content of the area to be screenshot and generates a picture, the following steps are further included:
step S502, determining the sensitive area of the picture according to the sensitive information contained in the area to be captured.
When the terminal detects that the area to be captured contains the sensitive information, the coordinate information corresponding to the sensitive information can be obtained, and therefore the position of the sensitive information is determined. After the terminal verifies that the authorization information input by the user passes and intercepts the content of the region to be captured to generate a picture, the sensitive region can be defined on the generated picture according to the position of the sensitive information.
Further, the size of the sensitive area may be preset, for example, a rectangle with a length of 300px (pixels) and a width of 150px, which is centered on the position of the sensitive information, is set, but the present invention is not limited thereto, and the terminal may only use the position of the sensitive information on the picture as the sensitive area. When the picture contains a plurality of sensitive information, that is, when the position of the sensitive information is multiple, a plurality of sensitive areas can be defined on the picture.
And step S504, establishing an information shielding layer according to the authorization information.
After the terminal determines the sensitive area of the picture, an information shielding layer can be established to hide information in the sensitive area. The terminal may create an empty layer first, and fill a designated color, such as black, red, white, or the like, in the empty layer, or create an empty layer first, and insert a preset picture, such as a blue sky picture, a tree picture, or the like, in the empty layer, thereby obtaining an information-blocked layer. The terminal creates an information shielding layer according to the authorization information, which can be equivalent to encrypting the information shielding layer according to the authorization information, when a user views the picture, the information shielding layer in the picture can be removed only when the input authorization information is correct, and the original picture content is recovered.
Step S506, the information shielding layer is covered on the sensitive area of the picture, and the information hiding picture is obtained.
The terminal can cover the created information shielding layer on the sensitive area of the picture, and after the information shielding layer is encrypted according to the authorization information, if the information shielding layer is not decrypted, the information shielding layer cannot be operated, wherein the operations comprise removing, dragging, shearing and the like, so that the sensitive information on the picture can be hidden, and the information hidden picture can be obtained.
Fig. 6(a) is a schematic diagram of a picture including sensitive information in an embodiment, and fig. 6(b) is a schematic diagram of covering a sensitive area of the picture through an information blocking layer in an embodiment. As shown in fig. 6(a) and 6(b), the terminal determines a region to be screenshot according to the screenshot command, and after the authorization information input by the user is verified, captures the content of the region to be screenshot and generates a picture 600. If the terminal detects that the region to be captured contains the sensitive information "identity card", the sensitive region 610 of the picture 600 can be determined according to the contained sensitive information. The terminal creates an information shielding layer 620 according to the authorization information, covers the information shielding layer 620 on the sensitive area 610 of the picture 600, and hides the sensitive information on the picture 600.
In this embodiment, the information shielding layer can be covered on the sensitive area in the picture, so that the sensitive information contained in the picture is hidden, information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 7, in an embodiment, after the step S250 intercepts the content of the area to be screenshot and generates a picture, the following steps are further included:
step S702, determining a sensitive area of the picture according to the sensitive information contained in the area to be captured.
Step S704, fuzzification or encryption processing is carried out on the sensitive area according to the authorization information, and an information hiding picture is obtained.
After the terminal determines the sensitive area of the picture, the terminal may perform blurring processing on the sensitive area according to the authorization information, where the blurring processing may include mosaic printing processing, and randomly taking and rearranging pixel values in the sensitive area of the picture to obtain a mosaic effect, or may perform smoothing processing on the pixel values in the sensitive area of the picture to average the pixel values in the sensitive area, so that a difference between the pixel values in the sensitive area is reduced, thereby achieving the blurring effect, and the like, and is not limited thereto. After the sensitive area is fuzzified according to the authorization information, when a user views the picture, the sensitive area in the picture can be subjected to defuzzification only when the input authorization information is correct, and the original picture content is recovered.
The terminal can encrypt the sensitive area in the picture according to the authorization information, and rearrange the pixel values in the sensitive area according to a preset arrangement rule, for example, two adjacent pixel values are rearranged. When a user views the picture, only when the input authorization information is correct, the sensitive area of the picture is restored according to the corresponding inverse arrangement rule, and the original picture content is restored. The terminal fuzzifies or encrypts the sensitive area according to the authorization information, and can hide the sensitive information on the picture to obtain an information hidden picture.
Fig. 8(a) is a schematic diagram of a picture including sensitive information in an embodiment, and fig. 8(b) is a schematic diagram of a blurring process performed on a sensitive area in an embodiment. As shown in fig. 8(b) and (a), the terminal determines a region to be screenshot according to the screenshot command, and after the authorization information input by the user is verified, captures the content of the region to be screenshot and generates a picture 800. If the terminal detects that the to-be-captured image area contains the sensitive information 'identity card', the sensitive area 820 of the picture 800 can be determined according to the contained sensitive information. The terminal fuzzifies the sensitive area 820 according to the authorization information and hides the sensitive information on the picture 800.
In the embodiment, the sensitive area of the picture can be fuzzified or encrypted, so that sensitive information contained in the picture is hidden, information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
In one embodiment, after the step S250 intercepts the content of the area to be screenshot and generates a picture, the method further includes: and encrypting the picture by using the authorization information as a key by adopting a preset encryption algorithm.
After the terminal verifies that the authorization information input by the user passes through, and intercepts the content of the region to be captured to generate the picture, a preset encryption algorithm can be adopted, the authorization information is used as a key to encrypt the picture, bytes contained in the picture are used as a plaintext, and a corresponding ciphertext is generated through the encryption algorithm. The Encryption algorithm may be, but is not limited to, DES (Data Encryption Standard), AES (Advanced Encryption Standard), and the like.
In the embodiment, the authorization information is used as the key to encrypt the picture, so that information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 9, in an embodiment, the screenshot method further includes the following steps:
step S902, a picture viewing instruction is received.
When a user touches and checks the picture on the screen of the terminal, the terminal receives a picture checking instruction.
Step S904, detecting whether the checked picture includes a preset mark according to the picture checking instruction, if so, performing step S906, and if not, performing step S910.
In an embodiment, when the terminal performs information hiding processing on the picture generated by intercepting the content of the area to be captured, a preset mark may be added to the picture subjected to the information hiding processing, where the information hiding processing includes, but is not limited to, the above-mentioned covering of the information-blocking layer, blurring processing, encryption processing, and the like. The preset mark is used for marking the picture to be subjected to information hiding processing, when the terminal receives a picture viewing instruction, whether the viewed picture contains the preset mark or not can be detected according to the picture viewing instruction, if yes, the picture is subjected to information hiding processing, the picture contains sensitive information, and if not, the picture is a normal picture and can be directly displayed.
Step S906, the input authorization information is verified.
If the checked pictures comprise preset pictures, the terminal can carry out authorization prompt on a screen interface, and the user can input authorization information according to the authorization prompt. The terminal can verify the authorization information after acquiring the authorization information input by the user, and when the input authorization information is matched with the preset authorization information, the verification is passed, otherwise, the verification fails.
Step S908, if the verification passes, performing restoration processing on the checked picture, and displaying the restored picture.
In an embodiment, different preset marks may be added to the picture for different information hiding processes, for example, when the sensitive area of the picture covers the information blocking layer, a first preset mark is added, when the sensitive area of the picture is subjected to blurring processing, a second preset mark is added, when the sensitive area of the picture is subjected to encryption processing, a third preset mark is added, and when the picture is encrypted, a fourth preset mark is added. If the authorization information input by the user passes the verification, the terminal can determine the corresponding information hiding processing type according to the preset label contained in the picture, and perform corresponding restoration processing on the checked picture.
For example, the information hiding processing type is to cover an information occlusion layer on a sensitive area of a picture, and the corresponding restoration processing is to remove the information occlusion layer in the picture; the information hiding processing type is to perform fuzzification processing on a sensitive area of the picture, and the corresponding restoration processing is to perform defuzzification processing on the sensitive area of the picture and identify a restored picture; the information hiding processing type is that the sensitive area of the picture is encrypted, and the corresponding restoration processing is that the sensitive area of the picture is decrypted; and if the information hiding processing type is to encrypt the picture, the corresponding restoration processing is to decrypt the picture according to the authorization information, and the like. And after the restoration processing of the checked picture is finished, the terminal can display the restored picture.
Step S910, displaying the viewed picture.
In this embodiment, when the screenshot containing the sensitive information is checked, the input authorization information is verified first, then the picture is restored and displayed, so that the condition that the screenshot containing the sensitive information is leaked can be further prevented, and the security of the screenshot is effectively improved.
As shown in fig. 10, in an embodiment, a screenshot device 1000 is provided, which includes a to-be-screenshot area determining module 1010, a sensitive information detecting module 1020, a verifying module 1030, and a screenshot module 1040.
And a to-be-screenshot area determining module 1010, configured to receive a screenshot instruction, and determine the to-be-screenshot area according to the screenshot instruction.
And the sensitive information detection module 1020 is configured to detect whether the area to be captured contains preset sensitive information.
And the verification module 1030 is configured to, if the authorization information includes the identifier, obtain the input authorization information, and verify the authorization information.
And the screenshot module 1040 is configured to capture the content of the area to be screenshot and generate a picture if the verification is passed.
The screenshot device receives the screenshot command, determines the area to be screenshot according to the screenshot command, detects whether the area to be screenshot contains preset sensitive information, acquires the authorization information input by a user if the area to be screenshot contains the preset sensitive information, verifies the authorization information, and can intercept the content of the area to be screenshot and generate a picture when the authorization information passes verification, so that information leakage during screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 11, in an embodiment, the sensitive information detecting module 1020 includes a coordinate obtaining unit 1022, an interface obtaining unit 1024, a detecting unit 1026, and a to-be-screenshot object obtaining unit 1028.
A coordinate obtaining unit 1022, configured to obtain coordinate information of the area to be screenshot.
And the interface obtaining unit 1024 is configured to obtain interface level information corresponding to the area to be screenshot according to the coordinate information.
The detecting unit 1026 is configured to extract the text information from the interface hierarchy information, and detect whether the text information includes preset sensitive information.
And the to-be-screenshot object obtaining unit 1028 is configured to obtain information of the to-be-screenshot object associated with the to-be-screenshot area.
The detecting unit 1026 is further configured to detect whether the information of the object to be captured includes preset sensitive information.
In this embodiment, the text information corresponding to the screenshot area can be detected, when the text information includes sensitive information, the input authorization information needs to be verified, and the screenshot can be performed after the verification is passed, so that information leakage during screenshot can be prevented, and the screenshot safety is effectively improved.
In addition, the information of the object to be captured associated with the area to be captured can be detected, when the information of the object to be captured associated with the area to be captured contains sensitive information, the input authorization information needs to be verified, the image capture can be carried out after the verification is passed, the information leakage during the image capture can be prevented, and the safety of the image capture is effectively improved.
As shown in fig. 12, in an embodiment, the screenshot device 1000 includes, in addition to a to-be-screenshot area determining module 1010, a sensitive information detecting module 1020, a verifying module 1030, and a screenshot module 1040, a sensitive area determining module 1050, a creating module 1060, an overlaying module 1070, and a blurring processing module 1080.
And the sensitive region determining module 1050 is configured to determine a sensitive region of the picture according to the sensitive information included in the region to be captured.
A creating module 1060, configured to create an information occlusion layer according to the authorization information.
The covering module 1070 is configured to cover the information blocking layer on the sensitive area of the picture, so as to obtain an information hidden picture.
And the fuzzification processing module 1080 is configured to perform fuzzification or encryption processing on the sensitive area according to the authorization information to obtain an information hidden picture.
In this embodiment, the information shielding layer can be covered on the sensitive area in the picture, so that the sensitive information contained in the picture is hidden, information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
In addition, in the embodiment, the sensitive area of the picture can be fuzzified or encrypted, so that sensitive information contained in the picture is hidden, information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 13, in an embodiment, the screenshot device 1000 further includes an encryption module 1090 in addition to the to-be-screenshot area determining module 1010, the sensitive information detecting module 1020, the verifying module 1030, the screenshot module 1040, the sensitive area determining module 1050, the creating module 1060, the covering module 1070, and the fuzzification processing module 1080.
And an encryption module 1090 which is used for encrypting the picture by using a preset encryption algorithm and using the authorization information as a key.
In the embodiment, the authorization information is used as the key to encrypt the picture, so that information leakage after screenshot can be prevented, and the screenshot safety is effectively improved.
As shown in fig. 14, in an embodiment, the screenshot device 1000 includes a mark detection module 1100 and a presentation module 1110 in addition to the to-be-screenshot area determination module 1010, the sensitive information detection module 1020, the verification module 1030, the screenshot module 1040, the sensitive area determination module 1050, the creation module 1060, the coverage module 1070, the fuzzification processing module 1080 and the encryption module 1090.
The mark detection module 1100 is configured to receive a picture viewing instruction, and detect whether a viewed picture includes a preset mark according to the picture viewing instruction.
The verifying module 1030 is further configured to verify the input authorization information if the checked picture includes a preset mark.
The display module 1110 is configured to perform restoration processing on the checked picture and display the restored picture if the verification passes.
In this embodiment, when the screenshot containing the sensitive information is checked, the input authorization information is verified first, then the picture is restored and displayed, so that the condition that the screenshot containing the sensitive information is leaked can be further prevented, and the security of the screenshot is effectively improved.
The embodiment of the invention also provides computer equipment. As shown in fig. 15, for convenience of illustration, only the portion related to the embodiment of the present invention is shown, and the detailed technical details are not disclosed, please refer to the method portion of the embodiment of the present invention. The computer device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, a wearable device, and the like, taking the computer device as the mobile phone as an example:
fig. 15 is a block diagram of a partial structure of a cellular phone related to a computer device provided in an embodiment of the present invention. Referring to fig. 15, the cellular phone includes: radio Frequency (RF) circuitry 1510, memory 1520, input unit 1530, display unit 1540, sensors 1550, audio circuitry 1560, WiFi module 1570, processor 1580, and power supply 1590. Those skilled in the art will appreciate that the handset configuration shown in fig. 15 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The RF circuit 1510 may be configured to receive and transmit signals during information transmission and reception or during a call, and may receive downlink information of a base station and then process the downlink information to the processor 1580; the uplink data may also be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuit 1510 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM, General Packet Radio Service (GPRS), CDMA, Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 1520 may be used to store software programs and modules, and the processor 1580 performs various functional applications and data processing of the cellular phone by operating the software programs and modules stored in the memory 1520. The memory 1520 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function (such as an application program for a sound playing function, an application program for an image playing function, etc.), and the like; the data storage area may store data (such as audio data, an address book, etc.) created according to the use of the mobile phone, and the like. Further, the memory 1520 may include high-speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The input unit 1530 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone 1500. In particular, the input unit 1530 may include a touch panel 1532 and other input devices 1534. Touch panel 1532, also referred to as a touch screen, can collect touch operations by a user on or near the touch panel 1532 (e.g., operations by a user on or near the touch panel 1532 using any suitable object or accessory such as a finger, stylus, etc.) and drive the corresponding connection device according to a predetermined program. In one embodiment, the touch panel 1532 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 1580, and can receive and execute commands sent by the processor 1580. In addition, the touch panel 1532 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 1530 may include other input devices 1534 in addition to the touch panel 1532. In particular, other input devices 1534 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), and the like.
The display unit 1540 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The display unit 1540 may include a display panel 1542. In one embodiment, the Display panel 1542 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. In one embodiment, the touch panel 1532 can cover the display panel 1542, and when the touch panel 1532 detects a touch operation on or near the touch panel 1532, the touch operation can be transmitted to the processor 1580 to determine the type of the touch event, and then the processor 1580 can provide a corresponding visual output on the display panel 1542 according to the type of the touch event. Although in fig. 15, the touch panel 1532 and the display panel 1542 are two separate components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 1532 and the display panel 1542 can be integrated to implement the input and output functions of the mobile phone.
The cell phone 1500 can also include at least one sensor 1550, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 1542 according to the brightness of ambient light and a proximity sensor that turns off the display panel 1542 and/or the backlight when the mobile phone is moved to the ear. The motion sensor can comprise an acceleration sensor, the acceleration sensor can detect the magnitude of acceleration in each direction, the magnitude and the direction of gravity can be detected when the mobile phone is static, and the motion sensor can be used for identifying the application of the gesture of the mobile phone (such as horizontal and vertical screen switching), the vibration identification related functions (such as pedometer and knocking) and the like; the mobile phone may be provided with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor.
Audio circuit 1560, speaker 1562, and microphone 1564 may provide an audio interface between a user and a cell phone. The audio circuit 1560 may transmit the electrical signal converted from the received audio data to the speaker 1562, and convert the electrical signal into an audio signal by the speaker 1562 and output the audio signal; on the other hand, the microphone 1564 converts the collected sound signal into an electric signal, and the electric signal is received by the audio circuit 1560 and converted into audio data, and then the audio data is processed by the audio data output processor 1580, and then the audio data is transmitted to another mobile phone through the RF circuit 1510, or the audio data is output to the memory 1520 for subsequent processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through a WiFi module 1570, and provides wireless broadband internet access for the user.
The processor 1580 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 1520 and calling data stored in the memory 1520, thereby integrally monitoring the mobile phone. In one embodiment, the processor 1580 may include one or more processing units. In one embodiment, the processor 1580 may integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application program, and the like; the modem processor handles primarily wireless communications. It is to be appreciated that the modem processor may not be integrated into the processor 1580.
The handset 1500 also includes a power supply 1590 (e.g., a battery) for powering the various components, and preferably, the power supply 1590 is logically connected to the processor 1580 via a power management system, such that the power management system may be used to manage charging, discharging, and power consumption.
In one embodiment, the handset 1500 may also include a camera, a bluetooth module, and the like.
In the embodiment of the present invention, the processor 1580 included in the mobile terminal implements the screenshot method when executing the computer program stored in the memory.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (12)

1. A method of screenshot, comprising:
receiving a screenshot instruction, and determining a region to be screenshot according to the screenshot instruction;
determining an application identifier associated with the area to be captured, and detecting whether the area to be captured contains sensitive information corresponding to the application identifier;
if yes, acquiring input authorization information, and verifying the authorization information;
if the verification is passed, intercepting the content of the area to be subjected to screenshot and generating a picture;
determining a sensitive area of the picture according to sensitive information contained in the area to be captured;
fuzzification or encryption processing is carried out on the sensitive area according to the authorization information to obtain an information hiding picture;
receiving a picture viewing instruction, and detecting whether the viewed picture contains a preset mark according to the picture viewing instruction;
if the preset mark is included, verifying the input authorization information; if the verification is passed, the checked picture is subjected to restoration processing, and the restored picture is displayed;
and if the preset mark is not included, displaying the viewed picture.
2. The method of claim 1, wherein the detecting whether the area to be captured contains sensitive information corresponding to the application identifier comprises:
acquiring coordinate information of the area to be captured;
acquiring interface level information corresponding to the area to be captured according to the coordinate information;
extracting text information from the interface level information, and detecting whether the text information contains sensitive information corresponding to the application identification.
3. The method according to claim 1 or 2, wherein the detecting whether the area to be captured contains sensitive information corresponding to the application identifier comprises:
acquiring information of an object to be captured associated with the area to be captured;
and detecting whether the information of the object to be captured contains sensitive information corresponding to the application identifier.
4. The method according to claim 1, wherein after the intercepting the content of the area to be captured and generating a picture if the verification is passed, the method further comprises:
determining a sensitive area of the picture according to sensitive information contained in the area to be captured;
creating an information shielding layer according to the authorization information;
and covering the information shielding layer on the sensitive area of the picture to obtain an information hiding picture.
5. The method according to claim 1, wherein after the intercepting the content of the area to be captured and generating a picture if the verification is passed, the method further comprises:
and encrypting the picture by using the authorization information as a key by adopting a preset encryption algorithm.
6. A screenshot device, comprising:
the device comprises a to-be-screenshot area determining module, a screenshot judging module and a screenshot judging module, wherein the to-be-screenshot area determining module is used for receiving a screenshot instruction and determining a to-be-screenshot area according to the screenshot instruction;
the sensitive information detection module is used for determining an application identifier associated with the area to be subjected to screenshot and detecting whether the area to be subjected to screenshot contains sensitive information corresponding to the application identifier;
the verification module is used for acquiring the input authorization information and verifying the authorization information if the authorization information is included;
the screenshot module is used for intercepting the content of the area to be screenshot and generating a picture if the verification is passed;
the sensitive area determining module is used for determining the sensitive area of the picture according to the sensitive information contained in the area to be captured;
the fuzzification processing module is used for fuzzifying or encrypting the sensitive area according to the authorization information to obtain an information hidden picture;
the mark detection module is used for receiving a picture viewing instruction and detecting whether the viewed picture contains a preset mark according to the picture viewing instruction;
the verification module is further used for verifying the input authorization information if the checked picture contains the preset mark;
the display module is used for restoring the checked picture and displaying the restored picture if the verification is passed; and if the preset mark is not included, displaying the viewed picture.
7. The apparatus of claim 6, wherein the sensitive information detection module comprises:
the coordinate acquisition unit is used for acquiring coordinate information of the area to be captured;
the interface acquisition unit is used for acquiring interface level information corresponding to the area to be captured according to the coordinate information;
and the detection unit is used for extracting text information from the interface hierarchy information and detecting whether the text information contains sensitive information corresponding to the application identifier.
8. The apparatus of claim 7, wherein the sensitive information detection module further comprises:
the acquisition unit of the object to be captured is used for acquiring the information of the object to be captured related to the area to be captured;
the detection unit is further configured to detect whether the information of the object to be captured includes sensitive information corresponding to the application identifier.
9. The apparatus of claim 6, further comprising:
the sensitive area determining module is used for determining the sensitive area of the picture according to the sensitive information contained in the area to be captured;
the creating module is used for creating an information shielding layer according to the authorization information;
and the covering module is used for covering the information shielding layer on the sensitive area of the picture to obtain an information hiding picture.
10. The apparatus of claim 6, further comprising:
and the encryption module is used for encrypting the picture by using the authorization information as a key by adopting a preset encryption algorithm.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1 to 5 when executing the program.
12. A non-transitory computer-readable storage medium having computer-executable instructions stored thereon, wherein the computer-executable instructions, when executed by a processor, implement the method of any of claims 1 to 5.
CN201710296221.1A 2017-04-28 2017-04-28 Screenshot method and device and computer equipment Active CN107145795B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710296221.1A CN107145795B (en) 2017-04-28 2017-04-28 Screenshot method and device and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710296221.1A CN107145795B (en) 2017-04-28 2017-04-28 Screenshot method and device and computer equipment

Publications (2)

Publication Number Publication Date
CN107145795A CN107145795A (en) 2017-09-08
CN107145795B true CN107145795B (en) 2020-08-18

Family

ID=59775295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710296221.1A Active CN107145795B (en) 2017-04-28 2017-04-28 Screenshot method and device and computer equipment

Country Status (1)

Country Link
CN (1) CN107145795B (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679419B (en) * 2017-10-17 2020-07-14 南通纤麦家纺科技有限公司 Screen capturing method and device
CN108038827A (en) * 2017-11-30 2018-05-15 努比亚技术有限公司 Image processing method, mobile terminal and computer-readable recording medium
CN108153468A (en) * 2017-12-14 2018-06-12 阿里巴巴集团控股有限公司 Image processing method and device
CN108279843B (en) * 2018-01-11 2019-12-03 维沃移动通信有限公司 A kind of screenshot method and mobile terminal
CN110633116A (en) * 2018-06-21 2019-12-31 钉钉控股(开曼)有限公司 Screenshot processing method and device
CN109067566B (en) * 2018-07-09 2021-08-17 奇安信科技集团股份有限公司 Method, terminal and monitoring equipment for screenshot in silent mode
CN108924381B (en) * 2018-07-23 2020-11-06 上海掌门科技有限公司 Image processing method, image processing apparatus, and computer readable medium
CN109085975A (en) * 2018-08-06 2018-12-25 Oppo广东移动通信有限公司 Screenshotss method, apparatus, storage medium and electronic device
US20210312080A1 (en) * 2018-08-28 2021-10-07 Visa International Service Association Methodology to obfuscate sensitive information in mobile application background snapshot
CN109598138B (en) * 2018-11-15 2023-07-11 创新先进技术有限公司 Method and device for identifying, covering and sensing whether sensitive information in picture is checked or not
CN109710362B (en) * 2018-12-26 2020-02-07 掌阅科技股份有限公司 Screenshot processing method, computing device and computer storage medium
CN110377202A (en) * 2019-06-05 2019-10-25 平安科技(深圳)有限公司 Image processing method, device, electronic equipment and storage medium
CN112306590B (en) * 2019-07-30 2022-04-26 腾讯科技(深圳)有限公司 Screenshot generating method and related device
CN111552422A (en) * 2020-04-20 2020-08-18 广东以诺通讯有限公司 Intelligent terminal screen capture local fuzzy method and device and terminal
CN112783399A (en) * 2020-05-13 2021-05-11 北京金山办公软件股份有限公司 Screenshot method and device
CN114548343A (en) * 2020-11-27 2022-05-27 海能达通信股份有限公司 Graphic code display method, terminal and computer readable storage medium
CN112800449A (en) * 2021-02-03 2021-05-14 网易(杭州)网络有限公司 Encryption method and device for page screenshot, electronic equipment and storage medium
CN113204404A (en) * 2021-05-20 2021-08-03 北京字跳网络技术有限公司 Screen capture method and device and electronic equipment
CN113254820A (en) * 2021-06-11 2021-08-13 支付宝(杭州)信息技术有限公司 Webpage evidence storing method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408686A (en) * 2014-10-31 2015-03-11 宇龙计算机通信科技(深圳)有限公司 Method, system and terminal for screen capturing
CN104808916A (en) * 2015-04-13 2015-07-29 深圳市金立通信设备有限公司 Screen-shooting method
CN105117122A (en) * 2015-07-30 2015-12-02 深圳市金立通信设备有限公司 Terminal screenshot method and terminal
CN105893866A (en) * 2016-02-15 2016-08-24 努比亚技术有限公司 Screen capture method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408686A (en) * 2014-10-31 2015-03-11 宇龙计算机通信科技(深圳)有限公司 Method, system and terminal for screen capturing
CN104808916A (en) * 2015-04-13 2015-07-29 深圳市金立通信设备有限公司 Screen-shooting method
CN105117122A (en) * 2015-07-30 2015-12-02 深圳市金立通信设备有限公司 Terminal screenshot method and terminal
CN105893866A (en) * 2016-02-15 2016-08-24 努比亚技术有限公司 Screen capture method and device

Also Published As

Publication number Publication date
CN107145795A (en) 2017-09-08

Similar Documents

Publication Publication Date Title
CN107145795B (en) Screenshot method and device and computer equipment
KR102089191B1 (en) Methods, devices and systems for processing order information
CN108510022B (en) Two-dimensional code generation and verification method and server
CN107784232B (en) Picture processing method and mobile terminal
WO2017084288A1 (en) Method and device for verifying identity
CN110188524B (en) Information encryption method, information decryption method and terminal
CN107784089B (en) Multimedia data storage method, processing method and mobile terminal
US9940448B2 (en) Unlock processing method and device
CN109145552B (en) Information encryption method and terminal equipment
CN108901020B (en) Network access method, mobile terminal and server
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN108459788B (en) Picture display method and terminal
CN110990849A (en) Encryption and decryption method for private data and terminal
CN111181909B (en) Identity information acquisition method and related device
CN110149628B (en) Information processing method and terminal equipment
CN110035183B (en) Information sharing method and terminal
WO2018095216A1 (en) Relationship chain processing method, terminal and storage medium
CN110457879A (en) Object displaying method and terminal device
CN108491713B (en) Safety reminding method and electronic equipment
CN109446794B (en) Password input method and mobile terminal thereof
TW201826158A (en) Method, Device and Terminal for Displaying Data
CN108109188B (en) Image processing method and mobile terminal
CN107835297B (en) Information updating method, mobile terminal and computer readable storage medium
CN111159687B (en) Account information processing method, electronic equipment and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant