CN107222628A - A kind of method and device of information processing - Google Patents

A kind of method and device of information processing Download PDF

Info

Publication number
CN107222628A
CN107222628A CN201710464441.0A CN201710464441A CN107222628A CN 107222628 A CN107222628 A CN 107222628A CN 201710464441 A CN201710464441 A CN 201710464441A CN 107222628 A CN107222628 A CN 107222628A
Authority
CN
China
Prior art keywords
information
picture
decryption
configuration information
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710464441.0A
Other languages
Chinese (zh)
Inventor
罗小芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Genius Technology Co Ltd
Original Assignee
Guangdong Genius Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Genius Technology Co Ltd filed Critical Guangdong Genius Technology Co Ltd
Priority to CN201710464441.0A priority Critical patent/CN107222628A/en
Publication of CN107222628A publication Critical patent/CN107222628A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72439User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method and device of information processing.This method includes:Configuration information is obtained in real time, and the configuration information is used for the object for configuring privacy information;According to the configuration information, the information relevant with the object is converted into picture;Shown after the picture is carried out into fuzzy virtualization processing.The method that the present invention is provided is solved in the case where electronic equipment is not by my use; the privacy information easily spied on by other people into electronic equipment; the problem of privacy of user can not obtain protection; realization will need privacy information to be protected to carry out Fuzzy processing; prevent other people from spying on privacy information, the privacy for the user that adequately protects.

Description

A kind of method and device of information processing
Technical field
The present invention relates to electronic apparatus application technology, more particularly to a kind of method and device of information processing.
Background technology
With the continuous development of scientific technology, electronic equipment every field in life is widely used.Such as mobile phone And the electronic equipment such as flat board has become personal communication instrument indispensable in people's life.
In general, the visitors such as short message, Email and MSN can be provided with most electronic equipment Family end in order to other people contact and exchange.But inevitably, the electronic equipment that people are possessed, which occurs, to be lent to him The situation that people uses.When electronic equipment is lent to other people in use, hidden in being possible to be spied on to the electronic equipment by other people Personal letter ceases, or during other people use the electronic equipment, the information such as short message or mail is received suddenly so that other people are not Carefully see the privacy information received.In addition, when electronic equipment is positioned over into somewhere, if the short message or mail that receive Etc. presentation of information when on the screen of electronic equipment, it is also possible to spied on by other people to privacy information.
Therefore, in the case where electronic equipment is not by my use, the privacy easily spied on by other people into electronic equipment is believed Breath, the privacy of user can not be protected.
The content of the invention
The present invention provides a kind of method and device of information processing, handles privacy information with realizing, prevents other people Privacy information is spied on, the privacy for the user that adequately protects.
In a first aspect, the embodiments of the invention provide a kind of method of information processing, this method includes:
Configuration information is obtained in real time, and the configuration information is used for the object for configuring privacy information;
According to the configuration information, the information relevant with the object is converted into picture;
Shown after the picture is carried out into fuzzy virtualization processing.
Second aspect, the embodiment of the present invention additionally provides a kind of device of information processing, and the device includes:
Configuration information acquisition module, for obtaining configuration information in real time, the configuration information is used to configure privacy information Object;
Picture modular converter, for according to the configuration information, the information relevant with the object to be converted into picture;
Picture display module, for being shown after the picture is carried out into fuzzy virtualization processing.
The present invention by obtaining configuration information in real time, wherein, configuration information is used for the object for configuring privacy information;According to Confidence is ceased, and the information relevant with object is converted into picture;It has been shown that, solved in electronics after picture is carried out into fuzzy virtualization processing In the case that equipment is not by my use, the privacy information easily spied on by other people into electronic equipment, the privacy of user can not be obtained To the problem of protection, realization will need privacy information to be protected to carry out Fuzzy processing, prevent other people from spying on privacy information, fill Code insurance protects the privacy of user.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the method for information processing in the embodiment of the present invention one;
Fig. 2 is a kind of flow chart of the method for information processing in the embodiment of the present invention two;
Fig. 3 is a kind of structured flowchart of the device of information processing in the embodiment of the present invention three.
Embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that, in order to just Part related to the present invention rather than entire infrastructure are illustrate only in description, accompanying drawing.
Embodiment one
Fig. 1 is a kind of flow chart of the method for information processing that the embodiment of the present invention one is provided, and the present embodiment is applicable to Protection situation need to be carried out to the information in electronic equipment, this method can perform by the device of information processing, the device can be by Software and or hardware composition, and can typically be integrated in electronic equipment.The method that the present embodiment is provided specifically includes following step Suddenly:
Step 110, configuration information is obtained in real time.
Wherein, configuration information is used for the object for configuring privacy information.
Optionally, the setting list for having privacy information object can be set in the electronic device, wherein, the choosing of the setting list It may include there is default application program in, and sub- option may also include under the option of each default application program, the choosing of its neutron It may include contact person's account in the application program in, such as under the sub- option of a wechat application program, it may include the wechat All wechat good friend accounts, then when selecting any application program in list is set or select any sub- option of application program Afterwards, the application program or the sub- option of the application program are set to the object of privacy information.
It is preferred that, privacy information includes short message, Email Information or instant messaging application information, then believes in privacy Ceasing the default application program set in list of object at least includes short message and email application, and wechat or QQ Deng instant messaging application program.
Exemplary, configuration information includes the application name corresponding to the object of privacy information in the present embodiment With or contact person's account.If in list is set selection short message application program and wechat application program option, then configuration information Include the application name of short message and wechat, if the telephone number A in selection short message application program in setting list, Configuration information includes the application name and telephone number A of short message.
Thus, contact person's account in a certain application program or a certain application program is being set to the object of privacy information Afterwards, you can get configuration information to configure the object of privacy information.
Step 120, according to configuration information, the information relevant with object is converted into picture.
It is the object that can determine that privacy information according to configuration information, and then this pair can be obtained after configuration information is got Picture is converted to as relevant information, and by the information relevant with the object.
Exemplary, if the telephone number A in short message application program to be set to the object of privacy information, with the object Relevant information includes the transmitting-receiving short message relevant with telephone number A, then after the object of privacy information is set, can obtain and phone Every short message is simultaneously converted to picture by relevant number A transmitting-receiving short message.
Exemplary, if the mail account B of email application is set into the object of privacy information, with this pair As relevant information includes the receiving and dispatching mail relevant with mail account B, then after the object of privacy information is set, it can obtain and postal Receiving and dispatching mail relevant part account B, and the message body of every envelope mail is converted into picture, alternatively, also it will can often seal mail Addressee, sender and theme be converted into picture.
Exemplary, it is when a certain application program to be set to the object of privacy information, then relevant with the application program Information can be the information relevant with All Contacts' account in the application program.Such as when short message application program is set to privacy information Object when, then the transmitting-receiving short message of all telephone numbers is converted into picture.
Exemplary, the method that the information relevant with the object of privacy information is converted to picture can be acquisition and this pair As the text information to be converted in the relevant corresponding text importing window of information, and text information to be converted is converted to Picture.If the object of the privacy information set is the telephone number A in short message application program, then short message application program can be obtained In the transmitting-receiving short message relevant with telephone number A each text importing window in the corresponding text information of every short message, wherein word Information may include the information such as the line number of word, number, word size and word content of word of often composing a piece of writing, then according to the row of word Number, the often number of style of writing word and the width and height adaptability of single word determine the width of the corresponding picture of this short message And height, the width of such as picture can be that the word number of most long a line be multiplied by the width of single word, and the height of picture can be text The line number of word is multiplied by the height of single word, and word content is drawn in picture with default font, or, the word letter of acquisition The information such as character script or background color are may also include in breath, then the background color of picture can be set to the background face obtained Color, and word content is drawn in the picture with the character script of acquisition, and then obtain picture corresponding with this short message.
Thus, the information relevant with the object of privacy information can be converted to by picture by the above method.
Step 130, picture is subjected to fuzzy virtualization processing after show.
The information relevant with object is converted to after picture, then the picture of acquisition is subjected to fuzzy virtualization processing and shown, And then can prevent other people from peeping the information relevant with the object of privacy information, the privacy for the user that adequately protects.
It is exemplary, can be after every short message is converted to corresponding picture and picture is carried out to fuzzy virtualization processing Picture corresponding with this short message is inserted in the corresponding display window of every short message, and causes the picture to cover former word content, So as to which short message content can not be can be clearly seen that, privacy information is protected.
It is preferred that, shown again after picture is carried out into fuzzy virtualization processing using Gaussian Blur algorithm.
It is exemplary, when by the setting list of privacy information object by a certain application program or a certain application program Contact person's account when being no longer set to the object of privacy information, then can by with the connection in the application program or the application program It is that picture corresponding to the relevant information of people's account is removed from correspondence display window, and then the information relevant with the application program Still shown in the form of text, secret protection no longer is carried out to it.
The present embodiment by obtaining configuration information in real time, wherein, configuration information is used to configure the object of privacy information;According to Configuration information, picture is converted to by the information relevant with object;It has been shown that, solved in electricity after picture is carried out into fuzzy virtualization processing In the case that sub- equipment is not by my use, the privacy information easily spied on by other people into electronic equipment, the privacy of user can not The problem of obtaining protection, realization will need privacy information to be protected to carry out Fuzzy processing, prevent other people from spying on privacy information, Adequately protect the privacy of user.
Embodiment two
Fig. 2 is a kind of flow chart of the method for information processing that the embodiment of the present invention two is provided, and the present embodiment is above-mentioned Further optimized on the basis of embodiment, the method that the present embodiment is provided includes:
Step 210, configuration information is obtained in real time.
Wherein, configuration information is used for the object for configuring privacy information and the manner of decryption for configuring privacy information and corresponding Solve confidential information.
It is preferred that, after the object of privacy information is set up, corresponding manner of decryption and corresponding solution secret letter also can be set Breath.
Wherein, different privacy informations may be configured with identical manner of decryption and corresponding solution confidential information, can also match somebody with somebody respectively The manner of decryption differed and corresponding solution confidential information are equipped with, the present invention is not limited this.
Exemplary, it is settable to have manner of decryption setting options, each decryption side is provided with manner of decryption setting options The corresponding option of formula, after a certain manner of decryption option is selected, can eject solution confidential information input circle corresponding with the manner of decryption Face is to be decrypted the setting of information, after decryption information input interface input solution confidential information, you can obtain manner of decryption and phase The solution confidential information answered simultaneously is preserved to configuration information, by configuration information by the manner of decryption of all privacy informations and corresponding decryption The manner of decryption that information is each configured to set conciliates confidential information.Wherein, manner of decryption is conciliate confidential information and can modified.
It is exemplary, can also be completed in user in the setting list of the object of privacy information to a certain application program or After the setting of contact person's account in a certain application program, the list of manner of decryption is ejected, corresponding solution is selected in the list After close mode, decryption information input interface corresponding with the manner of decryption is ejected so that the setting of information is decrypted, in solution secret letter Cease after inputting interface input solution confidential information, you can obtain manner of decryption and corresponding solution confidential information and preserve into configuration information with Manner of decryption and corresponding solution confidential information for configuring the application program, so that different application programs can correspond to different solutions Close mode and corresponding solution confidential information.
It is preferred that, manner of decryption includes numerical ciphers decryption, the decryption of pattern password and presets gesture decryption.
Wherein, solution confidential information corresponding with the decryption of default gesture can be singly to refer to double click operation, double finger double click operations, singly refer to cunning The operation such as dynamic operation or double finger slides.
Step 220, according to configuration information, the information relevant with object is converted into picture.
It is preferred that, according to configuration information, the information relevant with object is converted into picture, including:
According to configuration information, the historical information relevant with object is converted into picture;And/or
According to configuration information, current receive and send messages relevant with object is converted into picture.
Exemplary, then will be with telephone number A after the telephone number A in short message is set into the object of privacy information Relevant history transmitting-receiving short message is converted into picture, or, the current transmitting-receiving short message relevant with telephone crosstalk number A is converted to Picture, or, the history relevant with telephone number A is received and dispatched into short message and current transmitting-receiving short message is converted into picture.
Step 230, picture is subjected to fuzzy virtualization processing after show.
Whether step 240, in real time sensing picture are clicked, if so, step 250 is performed, if it is not, then continuing real-time influence chart Whether piece is clicked.
Step 250, corresponding decryption oprerations are started according to manner of decryption, solved so that user's input is corresponding with manner of decryption Confidential information.
It is preferred that, after picture is carried out into obfuscation virtualization processing, whether sensing picture is clicked in real time, works as any picture After being clicked, then corresponding decryption oprerations are started according to manner of decryption, if manner of decryption is decrypted for numerical ciphers, then work as picture After being clicked, numerical ciphers inputting interface can be ejected, so as to user's input numerical ciphers.
Step 260, judge user input solution confidential information and configuration information in solution confidential information whether match, if so, Step 270 is performed, if it is not, can then point out user to solve confidential information input error, points out user to input solution confidential information again, and judge Whether the solution confidential information of user's input matches with the solution confidential information in configuration information.
Step 270, the information relevant with object shown in the form of text.
When user input it is corresponding with manner of decryption solve confidential information after, judge user input solution confidential information whether with configuration Decryption information matches in information, if it does, then the information relevant with the object of privacy information is shown in the form of text Show.
It is exemplary, can be by the information corresponding picture relevant with the object from right after the correct solution confidential information of input Removed in the display window answered, i.e., privacy information is still shown with original textual form, and then when the correct solution of user's input After confidential information, it can be clearly seen that the information relevant with the object.
Exemplary, after the decryption information match solved in confidential information and configuration information that user inputs, if electronics is set It is standby to enter screen lock state, then the information relevant with the object is shown with the picture of fuzzy virtualization processing, if need to clearly see To the information relevant with the object, correct solution confidential information need to be inputted again.
The present embodiment by sensing the clicking operation of picture in real time;When sensing that picture is clicked, then according to manner of decryption Start corresponding decryption oprerations, confidential information is solved so that user's input is corresponding with the manner of decryption;Judge the solution of user's input Whether confidential information matches with the solution confidential information in configuration information, and when being judged as matching, by the information relevant with object It has been shown that, realize after the correct solution confidential information of currently used user input of electronic equipment, user can be clearly in the form of text See the information relevant with object, be easy to user to check information, if the currently used user of electronic equipment can not input correctly Confidential information is solved, then can not see the information relevant with object, and then protect the privacy of user.
Embodiment three
Fig. 3 is a kind of structured flowchart of the device for information processing that the embodiment of the present invention three is provided.The device is applied to need Protection situation is carried out to the information in electronic equipment, can by software and or hardware constitute, and can typically be integrated in electronic equipment In.The device that the present embodiment is provided includes:Configuration information acquisition module 310, picture modular converter 320 and picture display module 330, wherein,
Configuration information acquisition module 310, for obtaining configuration information in real time, the configuration information is used to configure privacy information Object;
Picture modular converter 320, for according to the configuration information, the information relevant with the object to be converted into figure Piece;
Picture display module 330, for being shown after the picture is carried out into fuzzy virtualization processing.
In such scheme, optionally, the configuration information is additionally operable to configure the manner of decryption of privacy information and corresponding Solve confidential information;
Described device also includes:
Clicking operation induction module, the clicking operation for sensing the picture in real time;
Manner of decryption starting module, for when sensing that the picture is clicked, then starting phase according to the manner of decryption The decryption oprerations answered, confidential information is solved so that user's input is corresponding with the manner of decryption;
Text message display module, solution confidential information and the solution confidential information in the configuration information for judging user's input Whether match, and when being judged as matching, the information relevant with the object is shown in the form of text.
In such scheme, optionally, the picture modular converter specifically for:
According to the configuration information, the historical information relevant with the object is converted into picture;And/or
According to the configuration information, current receive and send messages relevant with the object is converted into picture.
In such scheme, optionally, the picture display module specifically for:
Shown after the picture is carried out into fuzzy virtualization processing using Gaussian Blur algorithm.
In such scheme, optionally, the privacy information includes:Short message, Email Information or instant messaging application Program information.
In such scheme, optionally, the manner of decryption includes:Numerical ciphers decryption, pattern password are decrypted and pre- If gesture is decrypted.
The present embodiment obtains configuration information in real time by configuration information acquisition module, and picture modular converter is according to confidence Breath, picture is converted to by the information relevant with object, and picture is carried out showing after fuzzy virtualization is handled, solved by picture display module In the case where electronic equipment is not by my use, the privacy information easily spied on by other people into electronic equipment, user's is hidden The problem of private can not obtain protection, realization will need privacy information to be protected to carry out Fuzzy processing, prevent other people from spying on hidden Personal letter ceases, the privacy for the user that adequately protects.
Said apparatus can perform the method that any embodiment of the present invention is provided, and possess the execution corresponding function of the above method Module and beneficial effect.Not ins and outs of detailed description in the present embodiment, reference can be made to any embodiment of the present invention is provided Method.
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art it is various it is obvious change, Readjust and substitute without departing from protection scope of the present invention.Therefore, although the present invention is carried out by above example It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also Other more equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (12)

1. a kind of method of information processing, it is characterised in that including:
Configuration information is obtained in real time, and the configuration information is used for the object for configuring privacy information;
According to the configuration information, the information relevant with the object is converted into picture;
Shown after the picture is carried out into fuzzy virtualization processing.
2. according to the method described in claim 1, it is characterised in that the configuration information is additionally operable to configure the decryption of privacy information Mode and corresponding solution confidential information;
Accordingly, after being shown after the picture virtualization is handled, methods described also includes:
The clicking operation of the picture is sensed in real time;
When sensing that the picture is clicked, then corresponding decryption oprerations are started according to the manner of decryption, so that user inputs It is corresponding with the manner of decryption to solve confidential information;
Judge whether the solution confidential information of user's input matches with the solution confidential information in the configuration information, and be judged as phase Timing, the information relevant with the object is shown in the form of text.
3. according to the method described in claim 1, it is characterised in that described according to the configuration information, will have with the object The information of pass is converted to picture, including:
According to the configuration information, the historical information relevant with the object is converted into picture;And/or
According to the configuration information, current receive and send messages relevant with the object is converted into picture.
4. according to the method described in claim 1, it is characterised in that show bag after the picture is carried out into fuzzy virtualization processing Include:
Shown after the picture is carried out into fuzzy virtualization processing using Gaussian Blur algorithm.
5. according to any described method in claim 1-4, it is characterised in that the privacy information includes:Short message, electronics postal Part information or instant messaging application information.
6. method according to claim 2, it is characterised in that the manner of decryption includes:Numerical ciphers decryption, pattern are close Code decryption and the decryption of default gesture.
7. a kind of device of information processing, it is characterised in that including:
Configuration information acquisition module, for obtaining configuration information in real time, the configuration information is used for the object for configuring privacy information;
Picture modular converter, for according to the configuration information, the information relevant with the object to be converted into picture;
Picture display module, for being shown after the picture is carried out into fuzzy virtualization processing.
8. device according to claim 7, it is characterised in that the configuration information is additionally operable to configure the decryption of privacy information Mode and corresponding solution confidential information;
Described device also includes:
Clicking operation induction module, the clicking operation for sensing the picture in real time;
Manner of decryption starting module, for when sensing that the picture is clicked, then being started according to the manner of decryption corresponding Decryption oprerations, confidential information is solved so that user's input is corresponding with the manner of decryption;
Text message display module, whether the solution confidential information in solution confidential information and the configuration information for judging user's input Match, and when being judged as matching, the information relevant with the object is shown in the form of text.
9. device according to claim 7, it is characterised in that the picture modular converter specifically for:
According to the configuration information, the historical information relevant with the object is converted into picture;And/or
According to the configuration information, current receive and send messages relevant with the object is converted into picture.
10. device according to claim 7, it is characterised in that the picture display module specifically for:
Shown after the picture is carried out into fuzzy virtualization processing using Gaussian Blur algorithm.
11. according to any described device in claim 7-10, it is characterised in that the privacy information includes:Short message, electronics E-mail messages or instant messaging application information.
12. device according to claim 8, it is characterised in that the manner of decryption includes:Numerical ciphers decryption, pattern Gesture decryption is decrypted and preset to password.
CN201710464441.0A 2017-06-19 2017-06-19 A kind of method and device of information processing Pending CN107222628A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710464441.0A CN107222628A (en) 2017-06-19 2017-06-19 A kind of method and device of information processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710464441.0A CN107222628A (en) 2017-06-19 2017-06-19 A kind of method and device of information processing

Publications (1)

Publication Number Publication Date
CN107222628A true CN107222628A (en) 2017-09-29

Family

ID=59950314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710464441.0A Pending CN107222628A (en) 2017-06-19 2017-06-19 A kind of method and device of information processing

Country Status (1)

Country Link
CN (1) CN107222628A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005258679A (en) * 2004-03-10 2005-09-22 Advanced Telecommunication Research Institute International Image photographing device
CN103714291A (en) * 2013-12-30 2014-04-09 联想(北京)有限公司 Information processing method and electronic equipment
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN104066060A (en) * 2014-06-26 2014-09-24 福州大学 Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication
CN105069364A (en) * 2015-06-30 2015-11-18 广东欧珀移动通信有限公司 Picture display method and mobile terminal
CN105528555A (en) * 2015-12-01 2016-04-27 杭州安司源科技有限公司 Information display protection method using covering graph and information transmission method
CN106469280A (en) * 2015-08-14 2017-03-01 腾讯科技(深圳)有限公司 The method and device of instant messaging interface processing
CN106534570A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Privacy protection method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005258679A (en) * 2004-03-10 2005-09-22 Advanced Telecommunication Research Institute International Image photographing device
CN103714291A (en) * 2013-12-30 2014-04-09 联想(北京)有限公司 Information processing method and electronic equipment
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN104066060A (en) * 2014-06-26 2014-09-24 福州大学 Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication
CN105069364A (en) * 2015-06-30 2015-11-18 广东欧珀移动通信有限公司 Picture display method and mobile terminal
CN106469280A (en) * 2015-08-14 2017-03-01 腾讯科技(深圳)有限公司 The method and device of instant messaging interface processing
CN105528555A (en) * 2015-12-01 2016-04-27 杭州安司源科技有限公司 Information display protection method using covering graph and information transmission method
CN106534570A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Privacy protection method and device

Similar Documents

Publication Publication Date Title
US12003498B2 (en) Establishing access to a secure network based on user-created credential indicia
CN104967721B (en) The treating method and apparatus of unread message
US10009378B2 (en) Method and apparatus for providing authentication using policy-controlled authentication articles and techniques
US8353447B2 (en) Device and method for contact information exchange
US20090092253A1 (en) Optimizing amount of data passed during software license activation
US20120167199A1 (en) Computing device with graphical authentication interface
CN110392054A (en) Log in method of calibration, device, system, equipment and readable storage medium storing program for executing
CA2719862C (en) Device and method for contact information exchange
CN104933343A (en) Secrecy method and apparatus of application program, and electronic device
CN104424409A (en) Application unlocking method and device
EP3582131A1 (en) Electronic device and method of providing information for display
EP1868125A1 (en) Method for identifying a user of a computer system
CN105653902A (en) Software registration method and device and registration code generating method and device
CN107506198A (en) The display methods and mobile terminal of a kind of mobile terminal
CN104618227B (en) A kind of method and apparatus of protection instant communication contacts relevant information
CN111669744B (en) Information processing method and device and electronic equipment
CN111949192A (en) Password input prompting method and device and electronic equipment
CN107222628A (en) A kind of method and device of information processing
CN107181852A (en) A kind of method for sending information, method for information display and mobile terminal
CN103354580A (en) Color differentiating a portion of a text message shown in alisting on a handheld communication device
CN109118551A (en) A kind of image processing method, terminal and storage medium
CN106332011A (en) Short message encrypted communication method and terminal
CN107579906B (en) Information display device
JP3642021B2 (en) Terminal device for displaying e-mail and e-mail display method
CN112035901A (en) Information input method, information input device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170929