CN107222628A - A kind of method and device of information processing - Google Patents
A kind of method and device of information processing Download PDFInfo
- Publication number
- CN107222628A CN107222628A CN201710464441.0A CN201710464441A CN107222628A CN 107222628 A CN107222628 A CN 107222628A CN 201710464441 A CN201710464441 A CN 201710464441A CN 107222628 A CN107222628 A CN 107222628A
- Authority
- CN
- China
- Prior art keywords
- information
- picture
- decryption
- configuration information
- privacy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72439—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method and device of information processing.This method includes:Configuration information is obtained in real time, and the configuration information is used for the object for configuring privacy information;According to the configuration information, the information relevant with the object is converted into picture;Shown after the picture is carried out into fuzzy virtualization processing.The method that the present invention is provided is solved in the case where electronic equipment is not by my use; the privacy information easily spied on by other people into electronic equipment; the problem of privacy of user can not obtain protection; realization will need privacy information to be protected to carry out Fuzzy processing; prevent other people from spying on privacy information, the privacy for the user that adequately protects.
Description
Technical field
The present invention relates to electronic apparatus application technology, more particularly to a kind of method and device of information processing.
Background technology
With the continuous development of scientific technology, electronic equipment every field in life is widely used.Such as mobile phone
And the electronic equipment such as flat board has become personal communication instrument indispensable in people's life.
In general, the visitors such as short message, Email and MSN can be provided with most electronic equipment
Family end in order to other people contact and exchange.But inevitably, the electronic equipment that people are possessed, which occurs, to be lent to him
The situation that people uses.When electronic equipment is lent to other people in use, hidden in being possible to be spied on to the electronic equipment by other people
Personal letter ceases, or during other people use the electronic equipment, the information such as short message or mail is received suddenly so that other people are not
Carefully see the privacy information received.In addition, when electronic equipment is positioned over into somewhere, if the short message or mail that receive
Etc. presentation of information when on the screen of electronic equipment, it is also possible to spied on by other people to privacy information.
Therefore, in the case where electronic equipment is not by my use, the privacy easily spied on by other people into electronic equipment is believed
Breath, the privacy of user can not be protected.
The content of the invention
The present invention provides a kind of method and device of information processing, handles privacy information with realizing, prevents other people
Privacy information is spied on, the privacy for the user that adequately protects.
In a first aspect, the embodiments of the invention provide a kind of method of information processing, this method includes:
Configuration information is obtained in real time, and the configuration information is used for the object for configuring privacy information;
According to the configuration information, the information relevant with the object is converted into picture;
Shown after the picture is carried out into fuzzy virtualization processing.
Second aspect, the embodiment of the present invention additionally provides a kind of device of information processing, and the device includes:
Configuration information acquisition module, for obtaining configuration information in real time, the configuration information is used to configure privacy information
Object;
Picture modular converter, for according to the configuration information, the information relevant with the object to be converted into picture;
Picture display module, for being shown after the picture is carried out into fuzzy virtualization processing.
The present invention by obtaining configuration information in real time, wherein, configuration information is used for the object for configuring privacy information;According to
Confidence is ceased, and the information relevant with object is converted into picture;It has been shown that, solved in electronics after picture is carried out into fuzzy virtualization processing
In the case that equipment is not by my use, the privacy information easily spied on by other people into electronic equipment, the privacy of user can not be obtained
To the problem of protection, realization will need privacy information to be protected to carry out Fuzzy processing, prevent other people from spying on privacy information, fill
Code insurance protects the privacy of user.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the method for information processing in the embodiment of the present invention one;
Fig. 2 is a kind of flow chart of the method for information processing in the embodiment of the present invention two;
Fig. 3 is a kind of structured flowchart of the device of information processing in the embodiment of the present invention three.
Embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that, in order to just
Part related to the present invention rather than entire infrastructure are illustrate only in description, accompanying drawing.
Embodiment one
Fig. 1 is a kind of flow chart of the method for information processing that the embodiment of the present invention one is provided, and the present embodiment is applicable to
Protection situation need to be carried out to the information in electronic equipment, this method can perform by the device of information processing, the device can be by
Software and or hardware composition, and can typically be integrated in electronic equipment.The method that the present embodiment is provided specifically includes following step
Suddenly:
Step 110, configuration information is obtained in real time.
Wherein, configuration information is used for the object for configuring privacy information.
Optionally, the setting list for having privacy information object can be set in the electronic device, wherein, the choosing of the setting list
It may include there is default application program in, and sub- option may also include under the option of each default application program, the choosing of its neutron
It may include contact person's account in the application program in, such as under the sub- option of a wechat application program, it may include the wechat
All wechat good friend accounts, then when selecting any application program in list is set or select any sub- option of application program
Afterwards, the application program or the sub- option of the application program are set to the object of privacy information.
It is preferred that, privacy information includes short message, Email Information or instant messaging application information, then believes in privacy
Ceasing the default application program set in list of object at least includes short message and email application, and wechat or QQ
Deng instant messaging application program.
Exemplary, configuration information includes the application name corresponding to the object of privacy information in the present embodiment
With or contact person's account.If in list is set selection short message application program and wechat application program option, then configuration information
Include the application name of short message and wechat, if the telephone number A in selection short message application program in setting list,
Configuration information includes the application name and telephone number A of short message.
Thus, contact person's account in a certain application program or a certain application program is being set to the object of privacy information
Afterwards, you can get configuration information to configure the object of privacy information.
Step 120, according to configuration information, the information relevant with object is converted into picture.
It is the object that can determine that privacy information according to configuration information, and then this pair can be obtained after configuration information is got
Picture is converted to as relevant information, and by the information relevant with the object.
Exemplary, if the telephone number A in short message application program to be set to the object of privacy information, with the object
Relevant information includes the transmitting-receiving short message relevant with telephone number A, then after the object of privacy information is set, can obtain and phone
Every short message is simultaneously converted to picture by relevant number A transmitting-receiving short message.
Exemplary, if the mail account B of email application is set into the object of privacy information, with this pair
As relevant information includes the receiving and dispatching mail relevant with mail account B, then after the object of privacy information is set, it can obtain and postal
Receiving and dispatching mail relevant part account B, and the message body of every envelope mail is converted into picture, alternatively, also it will can often seal mail
Addressee, sender and theme be converted into picture.
Exemplary, it is when a certain application program to be set to the object of privacy information, then relevant with the application program
Information can be the information relevant with All Contacts' account in the application program.Such as when short message application program is set to privacy information
Object when, then the transmitting-receiving short message of all telephone numbers is converted into picture.
Exemplary, the method that the information relevant with the object of privacy information is converted to picture can be acquisition and this pair
As the text information to be converted in the relevant corresponding text importing window of information, and text information to be converted is converted to
Picture.If the object of the privacy information set is the telephone number A in short message application program, then short message application program can be obtained
In the transmitting-receiving short message relevant with telephone number A each text importing window in the corresponding text information of every short message, wherein word
Information may include the information such as the line number of word, number, word size and word content of word of often composing a piece of writing, then according to the row of word
Number, the often number of style of writing word and the width and height adaptability of single word determine the width of the corresponding picture of this short message
And height, the width of such as picture can be that the word number of most long a line be multiplied by the width of single word, and the height of picture can be text
The line number of word is multiplied by the height of single word, and word content is drawn in picture with default font, or, the word letter of acquisition
The information such as character script or background color are may also include in breath, then the background color of picture can be set to the background face obtained
Color, and word content is drawn in the picture with the character script of acquisition, and then obtain picture corresponding with this short message.
Thus, the information relevant with the object of privacy information can be converted to by picture by the above method.
Step 130, picture is subjected to fuzzy virtualization processing after show.
The information relevant with object is converted to after picture, then the picture of acquisition is subjected to fuzzy virtualization processing and shown,
And then can prevent other people from peeping the information relevant with the object of privacy information, the privacy for the user that adequately protects.
It is exemplary, can be after every short message is converted to corresponding picture and picture is carried out to fuzzy virtualization processing
Picture corresponding with this short message is inserted in the corresponding display window of every short message, and causes the picture to cover former word content,
So as to which short message content can not be can be clearly seen that, privacy information is protected.
It is preferred that, shown again after picture is carried out into fuzzy virtualization processing using Gaussian Blur algorithm.
It is exemplary, when by the setting list of privacy information object by a certain application program or a certain application program
Contact person's account when being no longer set to the object of privacy information, then can by with the connection in the application program or the application program
It is that picture corresponding to the relevant information of people's account is removed from correspondence display window, and then the information relevant with the application program
Still shown in the form of text, secret protection no longer is carried out to it.
The present embodiment by obtaining configuration information in real time, wherein, configuration information is used to configure the object of privacy information;According to
Configuration information, picture is converted to by the information relevant with object;It has been shown that, solved in electricity after picture is carried out into fuzzy virtualization processing
In the case that sub- equipment is not by my use, the privacy information easily spied on by other people into electronic equipment, the privacy of user can not
The problem of obtaining protection, realization will need privacy information to be protected to carry out Fuzzy processing, prevent other people from spying on privacy information,
Adequately protect the privacy of user.
Embodiment two
Fig. 2 is a kind of flow chart of the method for information processing that the embodiment of the present invention two is provided, and the present embodiment is above-mentioned
Further optimized on the basis of embodiment, the method that the present embodiment is provided includes:
Step 210, configuration information is obtained in real time.
Wherein, configuration information is used for the object for configuring privacy information and the manner of decryption for configuring privacy information and corresponding
Solve confidential information.
It is preferred that, after the object of privacy information is set up, corresponding manner of decryption and corresponding solution secret letter also can be set
Breath.
Wherein, different privacy informations may be configured with identical manner of decryption and corresponding solution confidential information, can also match somebody with somebody respectively
The manner of decryption differed and corresponding solution confidential information are equipped with, the present invention is not limited this.
Exemplary, it is settable to have manner of decryption setting options, each decryption side is provided with manner of decryption setting options
The corresponding option of formula, after a certain manner of decryption option is selected, can eject solution confidential information input circle corresponding with the manner of decryption
Face is to be decrypted the setting of information, after decryption information input interface input solution confidential information, you can obtain manner of decryption and phase
The solution confidential information answered simultaneously is preserved to configuration information, by configuration information by the manner of decryption of all privacy informations and corresponding decryption
The manner of decryption that information is each configured to set conciliates confidential information.Wherein, manner of decryption is conciliate confidential information and can modified.
It is exemplary, can also be completed in user in the setting list of the object of privacy information to a certain application program or
After the setting of contact person's account in a certain application program, the list of manner of decryption is ejected, corresponding solution is selected in the list
After close mode, decryption information input interface corresponding with the manner of decryption is ejected so that the setting of information is decrypted, in solution secret letter
Cease after inputting interface input solution confidential information, you can obtain manner of decryption and corresponding solution confidential information and preserve into configuration information with
Manner of decryption and corresponding solution confidential information for configuring the application program, so that different application programs can correspond to different solutions
Close mode and corresponding solution confidential information.
It is preferred that, manner of decryption includes numerical ciphers decryption, the decryption of pattern password and presets gesture decryption.
Wherein, solution confidential information corresponding with the decryption of default gesture can be singly to refer to double click operation, double finger double click operations, singly refer to cunning
The operation such as dynamic operation or double finger slides.
Step 220, according to configuration information, the information relevant with object is converted into picture.
It is preferred that, according to configuration information, the information relevant with object is converted into picture, including:
According to configuration information, the historical information relevant with object is converted into picture;And/or
According to configuration information, current receive and send messages relevant with object is converted into picture.
Exemplary, then will be with telephone number A after the telephone number A in short message is set into the object of privacy information
Relevant history transmitting-receiving short message is converted into picture, or, the current transmitting-receiving short message relevant with telephone crosstalk number A is converted to
Picture, or, the history relevant with telephone number A is received and dispatched into short message and current transmitting-receiving short message is converted into picture.
Step 230, picture is subjected to fuzzy virtualization processing after show.
Whether step 240, in real time sensing picture are clicked, if so, step 250 is performed, if it is not, then continuing real-time influence chart
Whether piece is clicked.
Step 250, corresponding decryption oprerations are started according to manner of decryption, solved so that user's input is corresponding with manner of decryption
Confidential information.
It is preferred that, after picture is carried out into obfuscation virtualization processing, whether sensing picture is clicked in real time, works as any picture
After being clicked, then corresponding decryption oprerations are started according to manner of decryption, if manner of decryption is decrypted for numerical ciphers, then work as picture
After being clicked, numerical ciphers inputting interface can be ejected, so as to user's input numerical ciphers.
Step 260, judge user input solution confidential information and configuration information in solution confidential information whether match, if so,
Step 270 is performed, if it is not, can then point out user to solve confidential information input error, points out user to input solution confidential information again, and judge
Whether the solution confidential information of user's input matches with the solution confidential information in configuration information.
Step 270, the information relevant with object shown in the form of text.
When user input it is corresponding with manner of decryption solve confidential information after, judge user input solution confidential information whether with configuration
Decryption information matches in information, if it does, then the information relevant with the object of privacy information is shown in the form of text
Show.
It is exemplary, can be by the information corresponding picture relevant with the object from right after the correct solution confidential information of input
Removed in the display window answered, i.e., privacy information is still shown with original textual form, and then when the correct solution of user's input
After confidential information, it can be clearly seen that the information relevant with the object.
Exemplary, after the decryption information match solved in confidential information and configuration information that user inputs, if electronics is set
It is standby to enter screen lock state, then the information relevant with the object is shown with the picture of fuzzy virtualization processing, if need to clearly see
To the information relevant with the object, correct solution confidential information need to be inputted again.
The present embodiment by sensing the clicking operation of picture in real time;When sensing that picture is clicked, then according to manner of decryption
Start corresponding decryption oprerations, confidential information is solved so that user's input is corresponding with the manner of decryption;Judge the solution of user's input
Whether confidential information matches with the solution confidential information in configuration information, and when being judged as matching, by the information relevant with object
It has been shown that, realize after the correct solution confidential information of currently used user input of electronic equipment, user can be clearly in the form of text
See the information relevant with object, be easy to user to check information, if the currently used user of electronic equipment can not input correctly
Confidential information is solved, then can not see the information relevant with object, and then protect the privacy of user.
Embodiment three
Fig. 3 is a kind of structured flowchart of the device for information processing that the embodiment of the present invention three is provided.The device is applied to need
Protection situation is carried out to the information in electronic equipment, can by software and or hardware constitute, and can typically be integrated in electronic equipment
In.The device that the present embodiment is provided includes:Configuration information acquisition module 310, picture modular converter 320 and picture display module
330, wherein,
Configuration information acquisition module 310, for obtaining configuration information in real time, the configuration information is used to configure privacy information
Object;
Picture modular converter 320, for according to the configuration information, the information relevant with the object to be converted into figure
Piece;
Picture display module 330, for being shown after the picture is carried out into fuzzy virtualization processing.
In such scheme, optionally, the configuration information is additionally operable to configure the manner of decryption of privacy information and corresponding
Solve confidential information;
Described device also includes:
Clicking operation induction module, the clicking operation for sensing the picture in real time;
Manner of decryption starting module, for when sensing that the picture is clicked, then starting phase according to the manner of decryption
The decryption oprerations answered, confidential information is solved so that user's input is corresponding with the manner of decryption;
Text message display module, solution confidential information and the solution confidential information in the configuration information for judging user's input
Whether match, and when being judged as matching, the information relevant with the object is shown in the form of text.
In such scheme, optionally, the picture modular converter specifically for:
According to the configuration information, the historical information relevant with the object is converted into picture;And/or
According to the configuration information, current receive and send messages relevant with the object is converted into picture.
In such scheme, optionally, the picture display module specifically for:
Shown after the picture is carried out into fuzzy virtualization processing using Gaussian Blur algorithm.
In such scheme, optionally, the privacy information includes:Short message, Email Information or instant messaging application
Program information.
In such scheme, optionally, the manner of decryption includes:Numerical ciphers decryption, pattern password are decrypted and pre-
If gesture is decrypted.
The present embodiment obtains configuration information in real time by configuration information acquisition module, and picture modular converter is according to confidence
Breath, picture is converted to by the information relevant with object, and picture is carried out showing after fuzzy virtualization is handled, solved by picture display module
In the case where electronic equipment is not by my use, the privacy information easily spied on by other people into electronic equipment, user's is hidden
The problem of private can not obtain protection, realization will need privacy information to be protected to carry out Fuzzy processing, prevent other people from spying on hidden
Personal letter ceases, the privacy for the user that adequately protects.
Said apparatus can perform the method that any embodiment of the present invention is provided, and possess the execution corresponding function of the above method
Module and beneficial effect.Not ins and outs of detailed description in the present embodiment, reference can be made to any embodiment of the present invention is provided
Method.
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that
The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art it is various it is obvious change,
Readjust and substitute without departing from protection scope of the present invention.Therefore, although the present invention is carried out by above example
It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also
Other more equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.
Claims (12)
1. a kind of method of information processing, it is characterised in that including:
Configuration information is obtained in real time, and the configuration information is used for the object for configuring privacy information;
According to the configuration information, the information relevant with the object is converted into picture;
Shown after the picture is carried out into fuzzy virtualization processing.
2. according to the method described in claim 1, it is characterised in that the configuration information is additionally operable to configure the decryption of privacy information
Mode and corresponding solution confidential information;
Accordingly, after being shown after the picture virtualization is handled, methods described also includes:
The clicking operation of the picture is sensed in real time;
When sensing that the picture is clicked, then corresponding decryption oprerations are started according to the manner of decryption, so that user inputs
It is corresponding with the manner of decryption to solve confidential information;
Judge whether the solution confidential information of user's input matches with the solution confidential information in the configuration information, and be judged as phase
Timing, the information relevant with the object is shown in the form of text.
3. according to the method described in claim 1, it is characterised in that described according to the configuration information, will have with the object
The information of pass is converted to picture, including:
According to the configuration information, the historical information relevant with the object is converted into picture;And/or
According to the configuration information, current receive and send messages relevant with the object is converted into picture.
4. according to the method described in claim 1, it is characterised in that show bag after the picture is carried out into fuzzy virtualization processing
Include:
Shown after the picture is carried out into fuzzy virtualization processing using Gaussian Blur algorithm.
5. according to any described method in claim 1-4, it is characterised in that the privacy information includes:Short message, electronics postal
Part information or instant messaging application information.
6. method according to claim 2, it is characterised in that the manner of decryption includes:Numerical ciphers decryption, pattern are close
Code decryption and the decryption of default gesture.
7. a kind of device of information processing, it is characterised in that including:
Configuration information acquisition module, for obtaining configuration information in real time, the configuration information is used for the object for configuring privacy information;
Picture modular converter, for according to the configuration information, the information relevant with the object to be converted into picture;
Picture display module, for being shown after the picture is carried out into fuzzy virtualization processing.
8. device according to claim 7, it is characterised in that the configuration information is additionally operable to configure the decryption of privacy information
Mode and corresponding solution confidential information;
Described device also includes:
Clicking operation induction module, the clicking operation for sensing the picture in real time;
Manner of decryption starting module, for when sensing that the picture is clicked, then being started according to the manner of decryption corresponding
Decryption oprerations, confidential information is solved so that user's input is corresponding with the manner of decryption;
Text message display module, whether the solution confidential information in solution confidential information and the configuration information for judging user's input
Match, and when being judged as matching, the information relevant with the object is shown in the form of text.
9. device according to claim 7, it is characterised in that the picture modular converter specifically for:
According to the configuration information, the historical information relevant with the object is converted into picture;And/or
According to the configuration information, current receive and send messages relevant with the object is converted into picture.
10. device according to claim 7, it is characterised in that the picture display module specifically for:
Shown after the picture is carried out into fuzzy virtualization processing using Gaussian Blur algorithm.
11. according to any described device in claim 7-10, it is characterised in that the privacy information includes:Short message, electronics
E-mail messages or instant messaging application information.
12. device according to claim 8, it is characterised in that the manner of decryption includes:Numerical ciphers decryption, pattern
Gesture decryption is decrypted and preset to password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710464441.0A CN107222628A (en) | 2017-06-19 | 2017-06-19 | A kind of method and device of information processing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710464441.0A CN107222628A (en) | 2017-06-19 | 2017-06-19 | A kind of method and device of information processing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107222628A true CN107222628A (en) | 2017-09-29 |
Family
ID=59950314
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710464441.0A Pending CN107222628A (en) | 2017-06-19 | 2017-06-19 | A kind of method and device of information processing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107222628A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005258679A (en) * | 2004-03-10 | 2005-09-22 | Advanced Telecommunication Research Institute International | Image photographing device |
CN103714291A (en) * | 2013-12-30 | 2014-04-09 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN103914634A (en) * | 2014-03-26 | 2014-07-09 | 小米科技有限责任公司 | Image encryption method, image encryption device and electronic device |
CN104066060A (en) * | 2014-06-26 | 2014-09-24 | 福州大学 | Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication |
CN105069364A (en) * | 2015-06-30 | 2015-11-18 | 广东欧珀移动通信有限公司 | Picture display method and mobile terminal |
CN105528555A (en) * | 2015-12-01 | 2016-04-27 | 杭州安司源科技有限公司 | Information display protection method using covering graph and information transmission method |
CN106469280A (en) * | 2015-08-14 | 2017-03-01 | 腾讯科技(深圳)有限公司 | The method and device of instant messaging interface processing |
CN106534570A (en) * | 2016-11-30 | 2017-03-22 | 广东欧珀移动通信有限公司 | Privacy protection method and device |
-
2017
- 2017-06-19 CN CN201710464441.0A patent/CN107222628A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005258679A (en) * | 2004-03-10 | 2005-09-22 | Advanced Telecommunication Research Institute International | Image photographing device |
CN103714291A (en) * | 2013-12-30 | 2014-04-09 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN103914634A (en) * | 2014-03-26 | 2014-07-09 | 小米科技有限责任公司 | Image encryption method, image encryption device and electronic device |
CN104066060A (en) * | 2014-06-26 | 2014-09-24 | 福州大学 | Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication |
CN105069364A (en) * | 2015-06-30 | 2015-11-18 | 广东欧珀移动通信有限公司 | Picture display method and mobile terminal |
CN106469280A (en) * | 2015-08-14 | 2017-03-01 | 腾讯科技(深圳)有限公司 | The method and device of instant messaging interface processing |
CN105528555A (en) * | 2015-12-01 | 2016-04-27 | 杭州安司源科技有限公司 | Information display protection method using covering graph and information transmission method |
CN106534570A (en) * | 2016-11-30 | 2017-03-22 | 广东欧珀移动通信有限公司 | Privacy protection method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12003498B2 (en) | Establishing access to a secure network based on user-created credential indicia | |
CN104967721B (en) | The treating method and apparatus of unread message | |
US10009378B2 (en) | Method and apparatus for providing authentication using policy-controlled authentication articles and techniques | |
US8353447B2 (en) | Device and method for contact information exchange | |
US20090092253A1 (en) | Optimizing amount of data passed during software license activation | |
US20120167199A1 (en) | Computing device with graphical authentication interface | |
CN110392054A (en) | Log in method of calibration, device, system, equipment and readable storage medium storing program for executing | |
CA2719862C (en) | Device and method for contact information exchange | |
CN104933343A (en) | Secrecy method and apparatus of application program, and electronic device | |
CN104424409A (en) | Application unlocking method and device | |
EP3582131A1 (en) | Electronic device and method of providing information for display | |
EP1868125A1 (en) | Method for identifying a user of a computer system | |
CN105653902A (en) | Software registration method and device and registration code generating method and device | |
CN107506198A (en) | The display methods and mobile terminal of a kind of mobile terminal | |
CN104618227B (en) | A kind of method and apparatus of protection instant communication contacts relevant information | |
CN111669744B (en) | Information processing method and device and electronic equipment | |
CN111949192A (en) | Password input prompting method and device and electronic equipment | |
CN107222628A (en) | A kind of method and device of information processing | |
CN107181852A (en) | A kind of method for sending information, method for information display and mobile terminal | |
CN103354580A (en) | Color differentiating a portion of a text message shown in alisting on a handheld communication device | |
CN109118551A (en) | A kind of image processing method, terminal and storage medium | |
CN106332011A (en) | Short message encrypted communication method and terminal | |
CN107579906B (en) | Information display device | |
JP3642021B2 (en) | Terminal device for displaying e-mail and e-mail display method | |
CN112035901A (en) | Information input method, information input device, electronic equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170929 |