CN107358111B - A kind of method for secret protection and mobile terminal - Google Patents

A kind of method for secret protection and mobile terminal Download PDF

Info

Publication number
CN107358111B
CN107358111B CN201710752511.2A CN201710752511A CN107358111B CN 107358111 B CN107358111 B CN 107358111B CN 201710752511 A CN201710752511 A CN 201710752511A CN 107358111 B CN107358111 B CN 107358111B
Authority
CN
China
Prior art keywords
application program
picture
content
secret protection
transparency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710752511.2A
Other languages
Chinese (zh)
Other versions
CN107358111A (en
Inventor
李凤亮
屠光明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710752511.2A priority Critical patent/CN107358111B/en
Publication of CN107358111A publication Critical patent/CN107358111A/en
Application granted granted Critical
Publication of CN107358111B publication Critical patent/CN107358111B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Abstract

The present invention provides a kind of method for secret protection and mobile terminal, this method comprises: whether the application program for judging operation is default ecret protection application program;If the application program of the operation is the default ecret protection application program, it is determined that need to carry out the privacy area of secret protection in the display interface of the application program;Secret protection processing is carried out to the content of the privacy area.In this way, when the application program of operation is default ecret protection application program secret protection processing can be carried out to the content of privacy area.Leakage of private information is prevented, the effect of secret protection is preferable.

Description

A kind of method for secret protection and mobile terminal
Technical field
The present invention relates to field of communication technology more particularly to a kind of method for secret protection and mobile terminal.
Background technique
It improves with the development of science and technology, mobile terminal is more more and more universal, and the function that mobile terminal has is increasingly Diversification.For example, audio-frequency function, camera function, camera function and store function etc. all have become the indispensable function of mobile terminal Energy.The function abundant of mobile terminal is that the work and life of user is provided convenience, while there is also certain information hidden danger.
For example, terminal screen is shown interior with when instant communication mode chat, checking mail or input password It is easy to be seen by other people.In the prior art, the method for pasting frosted film or light polarizing film to the screen of terminal is generallyd use.Mill Sand film can reduce the display brightness of screen, if you need to reach satisfactory display brightness, need for screen backlight brightness to be turned up, this Sample will increase the power consumption of terminal.Light polarizing film can reduce screen visible angle, but can bring inconvenience to the use of some applications, example The case where such as playing video.Therefore, in the prior art, the effect of secret protection is poor.
Summary of the invention
The embodiment of the present invention provides a kind of method for secret protection and mobile terminal, to solve secret protection in the prior art The poor problem of effect.
In a first aspect, the embodiment of the invention provides a kind of method for secret protection, comprising:
Whether the application program for judging operation is default ecret protection application program;
If the application program of the operation is the default ecret protection application program, it is determined that the application program is shown Show the privacy area for needing to carry out secret protection in interface;
Secret protection processing is carried out to the content of the privacy area.
Second aspect, the embodiment of the present invention also provide a kind of mobile terminal, comprising:
Judgment module, for judging whether the application program of operation is default ecret protection application program;
First determining module, if the application program for the operation is the default ecret protection application program, really Need to carry out the privacy area of secret protection in the display interface of the fixed application program;
Processing module carries out secret protection processing for the content to the privacy area.
The third aspect, the embodiment of the present invention also provide a kind of mobile terminal, which is characterized in that including processor, memory And it is stored in the secret protection program that can be run on the memory and on the processor, the secret protection program is by institute State the step of realizing above-mentioned method for secret protection when processor executes.
Fourth aspect, the embodiment of the present invention also provide a kind of computer-readable storage medium, which is characterized in that the meter Secret protection program is stored on calculation machine read/write memory medium, the secret protection program is realized above-mentioned when being executed by processor The step of method for secret protection.
In this way, judging whether the application program of operation is default ecret protection application program in the embodiment of the present invention;If institute The application program for stating operation is the default ecret protection application program, it is determined that is needed in the display interface of the application program Carry out the privacy area of secret protection;Secret protection processing is carried out to the content of the privacy area.In this way, when the application of operation When program is default ecret protection application program, secret protection processing can be carried out to the content of privacy area.Prevent privacy from believing Breath leakage, the effect of secret protection are preferable.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is a kind of flow chart of method for secret protection provided in an embodiment of the present invention;
Fig. 2 is a kind of picture that blocks provided in an embodiment of the present invention to needing the privacy area for carrying out secret protection to hide The schematic diagram of gear;
Fig. 3 is that another kind provided in an embodiment of the present invention blocks privacy area progress of the picture to needing to carry out secret protection The schematic diagram blocked;
Fig. 4 is the flow chart of another method for secret protection provided in an embodiment of the present invention;
Fig. 5 is the schematic diagram of the progress bar for the transparency that picture is blocked in a kind of adjustment provided in an embodiment of the present invention;
Fig. 6 is the signal that the content that pending area in picture is covered is blocked in a kind of display provided in an embodiment of the present invention Figure;
Fig. 7 is the flow chart of another method for secret protection provided in an embodiment of the present invention;
Fig. 8 is a kind of structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 9 is the structure chart of another mobile terminal provided in an embodiment of the present invention;
Figure 10 is the structure chart of another mobile terminal provided in an embodiment of the present invention;
Figure 11 is the structure chart of another mobile terminal provided in an embodiment of the present invention;
Figure 12 is the structure chart of another mobile terminal provided in an embodiment of the present invention;
Figure 13 is the structure chart of another mobile terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It is a kind of flow chart of method for secret protection provided in an embodiment of the present invention referring to Fig. 1, Fig. 1, as shown in Figure 1, packet Include following steps:
Whether step 101, the application program for judging operation are default ecret protection application program.
In a step 101, default ecret protection application program can be preassigned.For example, can be by instant communication mode Program, e-mail program and short message program etc. are appointed as default ecret protection application program.
Mobile terminal can first judge whether the application program of operation is default ecret protection application program.
If step 102, the application program of the operation are the default ecret protection application program, it is determined that the application Need to carry out the privacy area of secret protection in the display interface of program.
In a step 102, if mobile terminal judges that the application program of operation is default ecret protection application program, It can determine the privacy area for needing to carry out secret protection in the display interface of application program.
For example, it is assumed that the application program of operation is instant communication mode program, and instant communication mode program is hidden to preset Private protection application program.The display interface of instant communication mode program can be divided into two interfaces up and down, and will be above Interface be determined as the privacy area for needing to carry out secret protection.It can also be by the display interface equal part of instant communication mode program For three interfaces of upper, middle and lower, and interface above is determined as to the privacy area for needing to carry out secret protection.
Step 103 carries out secret protection processing to the content of the privacy area.
In step 103, next, available block picture.Obtain block picture mode can there are two types of.First Kind of mode is to preassign a picture as blocking picture, for example, can select a picture as blocking from picture library Picture.When showing the interface of default ecret protection application program, this can be popped up and block picture.The second way is to default The interface of ecret protection application program carries out screenshot, and then using cut figure as blocking picture.
When the display interface of instant communication mode program is divided into two interfaces up and down, and interface above is determined When privacy area to need to carry out secret protection, the area for blocking picture can be the display interface of instant communication mode program Area half.The area for blocking picture popped up can be the area of the display interface of instant communication mode program Half, alternatively, carrying out the screenshot area obtained for blocking picture to the interface of default ecret protection application program It can be the half of the area of the display interface of instant communication mode program.Interface above can be covered in by blocking picture On, i.e., Occlusion Map sector-meeting shelters from the content at interface above namely Occlusion Map sector-meeting will need to carry out secret protection The content of privacy area shelters from.As shown in Fig. 2, being carried out for a kind of picture that blocks to the privacy area for needing to carry out secret protection The schematic diagram blocked.
It should be noted that blocking picture can arbitrarily drag, i.e., user can will block according to the wish of oneself Picture drags to any position of the display interface of application program.And the size for blocking picture is adjustable.
In addition, the characteristics of mobile terminal can be according to the application program of operation, the display interface of automatic identification application program The middle privacy area for needing to carry out secret protection.For example, mobile terminal can be known when the application program of operation is short message program Not Chu " contact person region " and " telephone number region " in the display interface of short message program, and then blocking picture can be only right The content in " contact person region " and the content of " telephone number region " are blocked, and in the display interface of short message program Other regions are then without blocking.Further, mobile whole when short message content is related to bank's card number, identifying code or password End can also automatically identify bank's card number field, identifying code region or cryptographic zone, and then blocking picture can also be to silver Row card number field, identifying code region or cryptographic zone are blocked.As shown in figure 3, for another kind block picture to need into The schematic diagram that the privacy area of row secret protection is blocked.
When user wants to check the content in the region that is blocked, the modes such as picture can be blocked by double-click and be blocked to cancel Picture.And revocation block picture mode can there are many, however it is not limited to above-mentioned double-click mode.Above embodiment is only one Kind illustrates.
In the embodiment of the present invention, above-mentioned mobile terminal can be mobile phone, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal digital Assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..
The method for secret protection of the embodiment of the present invention judges whether the application program of operation is default secret protection application journey Sequence;If the application program of the operation is the default ecret protection application program, it is determined that display circle of the application program Need to carry out the privacy area of secret protection in face;Secret protection processing is carried out to the content of the privacy area.In this way, when fortune When capable application program is default ecret protection application program, secret protection processing can be carried out to the content of privacy area.Into One step, it can use and block picture the content of privacy area is blocked, it is convenient and efficient.Leakage of private information is prevented, it is hidden The effect of private protection is preferable.
Referring to fig. 4, Fig. 4 is the flow chart of another method for secret protection provided in an embodiment of the present invention, as shown in figure 4, The following steps are included:
Whether step 401, the application program for judging operation are default ecret protection application program.
In step 401, mobile terminal may determine that whether the application program of operation is default ecret protection application program. For example, mobile terminal may determine that whether the application program of operation is pre-set application program.If the application journey of operation Sequence is pre-set application program, then can determine that the application program of operation is default ecret protection application program.For example, pre- The application program being first arranged can be instant communication mode program, e-mail program and short message program etc..
If step 402, the application program of the operation are the default ecret protection application program, it is determined that the application Need to carry out the privacy area of secret protection in the display interface of program.
In step 402, if mobile terminal judges that the application program of operation is default ecret protection application program, It can determine the privacy area for needing to carry out secret protection in the display interface of application program.
For example, it is assumed that the application program of operation is instant communication mode program, and instant communication mode program is hidden to preset Private protection application program.The display interface of instant communication mode program can be divided into three interfaces of upper, middle and lower, and will be upper The interface in face is determined as the privacy area for needing to carry out secret protection.
Picture is blocked in step 403, acquisition, wherein the picture that blocks is to carry out for the content to the privacy area The picture blocked.
In step 403, available to block picture.Wherein, blocking picture is to carry out for the content to privacy area The picture blocked.Obtain block picture mode can there are two types of.First way is to preset picture conduct to block Picture, for example, can select a picture as blocking picture from picture library.Ecret protection application program is preset when showing When interface, this can be popped up and block picture.The second way is to carry out screenshot to the interface of default ecret protection application program, into And using cut figure as blocking picture.
When the display interface of instant communication mode program is divided into three interfaces of upper, middle and lower, and interface above is true When being set to the privacy area for needing to carry out secret protection, the area for blocking picture can be display circle of instant communication mode program The one third of the area in face.The area for blocking picture popped up can be the face of the display interface of instant communication mode program Long-pending one third, alternatively, the interface to default ecret protection application program carries out the screenshot area obtained for blocking picture Or the one third of the area of the display interface of instant communication mode program.Boundary above can be covered in by blocking picture On face, i.e., Occlusion Map sector-meeting shelters from the content at interface above namely Occlusion Map sector-meeting will need to carry out secret protection The content of privacy area shelter from.
Step 404 adjusts the transparency for blocking picture to first object transparency.
In step 404, it gets after blocking picture, further, the transparency for blocking picture can be adjusted To first object transparency.
For example, mobile terminal can automatically adjust the transparency for blocking picture to first object transparency.Alternatively, The transparency for blocking picture can also be adjusted to first object transparency manually by user.For example, one can be shown For adjusting the progress bar for blocking the transparency of picture, when user drags the regulation button on progress bar with finger, so that it may To realize that the transparency of picture is blocked in adjustment.When transparency is 100%, it is fully transparent to block picture, i.e., to privacy zone The content in domain is not blocked;When transparency is 0%, it is completely opaque to block picture.Transparency between 0%-100% it Between, and transparency is bigger, the content of privacy area is more clear, i.e., user can be easier to see the content of privacy area clearly.
User can be adjusted the transparency for blocking picture according to itself wish.For example, when user thinks to run Application program display interface in content it is extremely important, and surrounding can will block the transparent journey of picture when having many people Degree is adjusted lower, guarantees that oneself can see clearly the content of privacy area.And the people of surrounding can not then see privacy zone clearly The content in domain.Not only the leakage of privacy information had been prevented, but also the content that user reads privacy area will not be delayed.As shown in figure 5, being It is a kind of to adjust the schematic diagram for blocking the progress bar of transparency of picture.
Step 405, control transparency block picture to the privacy area for the first object transparency Content is blocked.
In step 405, the transparency for blocking picture is adjusted to first object transparency, so that it may control Transparency is that the picture that blocks of first object transparency blocks the content of privacy area.
Optionally, picture is blocked to the privacy zone for the first object transparency in the control transparency After the step of content in domain is blocked, the method also includes:
It receives and the first object for blocking picture is operated;
Detect the touch location of the first object operation on the screen of the mobile terminal;
The first object operation is detected to pressure value caused by the screen;
If the pressure value detected is more than or equal to preset pressure threshold value, according to the pressure value and pressure detected The default corresponding relationship of value and display area range is determined using the touch location as the pending area of reference position, wherein The pending area is the partial region for blocking picture;
The second target clear is determined according to the default corresponding relationship of the pressure value and pressure value and transparency that detect Degree;
The transparency of the pending area is adjusted to the second target clear degree.
The content of privacy area is blocked using the picture that blocks that transparency is adjusted to first object transparency Later, it can receive and the first object for blocking picture operated.Here still using the application program of operation as instant communication mode journey It is illustrated for sequence.
It receives after being operated to the first object for blocking picture, can detecte first object operation in the screen of mobile terminal Touch location and first object on curtain are operated to pressure value caused by screen.If the pressure value detected be greater than or It, then can be true according to the default corresponding relationship of the pressure value and pressure value detected and display area range equal to preset threshold Determine using touch location as the pending area of reference position, wherein pending area is to block the partial region of picture.
For example, first is chatted using instant communication mode and second, and second needs to log in oneself mailbox and removes downloading document.But Second is inconvenient to log in mailbox, oneself mailbox user name and login password can be sent to first by instant communication mode, by First logs in the mailbox of second, and then helps second that profile download is got off.Due to mailbox user name and login password belong to it is more hidden Private information, can block mailbox user name and login password with picture is blocked.First can press and block picture, if The pressing force angle value that mobile terminal detects is more than or equal to preset threshold, can be according to the pressure value and pressure detected The default corresponding relationship of value and display area range is determined using touch location as the pending area of reference position, it can according to The default corresponding relationship of the pressure value and pressure value and display area range that detect is determined using pressing position as center position Pending area.The pressure value that mobile terminal detects is bigger, and the range of pending area is bigger.
Mobile terminal can also be true according to the default corresponding relationship of the pressure value and pressure value and transparency that detect Fixed second target clear degree.The pressure value that mobile terminal detects is bigger, and transparency is bigger.Finally, can will be to be processed The transparency in region is adjusted to the second target clear degree.At this point, user, which can see clearly, blocks pending area in picture The content covered.I.e. first can see the mailbox user name for blocking the second that pending area in picture is covered clearly and log in close Code.As shown in fig. 6, blocking the schematic diagram for the content that pending area in picture covers by a kind of display.In this way, working as Occlusion Map When piece covers the content of privacy area, checking for the content only covered to the partial region for blocking picture is realized, into One step improves secret protection effect.
User can also block the modes such as picture by double-click and block picture to cancel.And revocation block the mode of picture can There are many, however it is not limited to above-mentioned double-click mode.Above embodiment is only a kind of illustration.The embodiment of the present invention it is hidden Private guard method can carry out the content of privacy area when the application program of operation is default ecret protection application program Secret protection processing.It can use and block picture the content of privacy area is blocked, prevent leakage of private information, it is convenient fast It is prompt.Further, user can also adjust the transparency for blocking picture according to their needs, change the content of privacy area The effect of identifiability, secret protection is preferable.
It is the flow chart of another method for secret protection provided in an embodiment of the present invention referring to Fig. 7, Fig. 7, as shown in fig. 7, The following steps are included:
The second object run of step 701, reception to the display interface, if second object run and default triggering The operation for carrying out secret protection matches, it is determined that the application program of the operation is the default ecret protection application program.
In step 701, the second object run to the display interface of the application program of operation can receive.If second The operation that object run carries out secret protection with default triggering matches, then can determine that the application program of operation is default privacy Protect application program.
For example, user's picture in browse graph valut in public, and certain pictures in picture library may relate to use The privacy at family.When user browses to the picture for being related to privacy, private information disclosure, user can use three fingers in order to prevent The slide downward on privacy picture.After mobile terminal detects slide, it can be determined that the slide that detects and default Whether the operation that triggering carries out secret protection matches.If mobile terminal judge the slide detected and it is default trigger into The operation of row secret protection matches, then can pop up and block picture.User can according to need the size that picture is blocked in adjustment, And the position of privacy involved in browsed picture picture will be blocked is dragged to, using blocking picture to the content of privacy area It is blocked, to prevent private information disclosure.
If step 702, the application program of the operation are the default ecret protection application program, it is determined that the application Need to carry out the privacy area of secret protection in the display interface of program.
In a step 702, if mobile terminal judges that the application program of operation is default ecret protection application program, It can determine the privacy area for needing to carry out secret protection in the display interface of application program.
For example, it is assumed that the application program of operation is instant communication mode program, and instant communication mode program is hidden to preset Private protection application program.For example, mobile terminal the entire display interface of instant communication mode program can be determined as needing into The privacy area of row secret protection.
The background color of the display interface of step 703, the identification application program.
In step 703, mobile terminal can be with the background color of the display interface of recognition application.I.e. mobile terminal can To identify the background color of the display interface of instant communication mode program.Assuming that mobile terminal identifies instant communication mode program Display interface background color be green.
The color of the content of the privacy area is adjusted to the back with the display interface of the application program by step 704 The color that scape color matches.
It in step 704, can will be in privacy area after the background color for identifying the display interface of application program The color of appearance is adjusted to the color to match with the background color of the display interface of application program.It can be by instant communication mode The color of the content of privacy area in the display interface of program is adjusted to the back with the display interface of instant communication mode program The green that scape color matches.When entire display circle that the privacy area for needing to carry out secret protection is instant communication mode program When face, the color of the text in the entire display interface of instant communication mode program can be adjusted to and instant communication mode The green that the background color of the display interface of program matches.It is mobile and during being chatted using instant communication mode The color of emerging text can be adjusted to the background color with the display interface of instant communication mode program by terminal in real time The green to match.For example, if the background color of the display interface of application program is light green color, it can be by privacy area The color of content is adjusted to the bottle green to match with light green color.In this way, due to privacy area in the display interface of application program Content color it is close with the background color of the display interface of application program, it is ensured that user sees clearly the interior of privacy area Hold, and the people of surrounding can not then see the content of privacy area clearly.Not only the leakage of privacy information had been prevented, but also user's reading will not be delayed Take the content of privacy area.
User can also be by way of from left to right being slided on the display interface of application program by privacy zone with finger The color of the content in domain reverts to original color.And restore privacy area content color mode can there are many, and It is not limited to the above-mentioned mode from left to right slided.Above embodiment is only a kind of illustration.
The method for secret protection of the embodiment of the present invention, when the application program of operation is default ecret protection application program, Secret protection processing can be carried out to the content of privacy area.Leakage of private information is prevented, it is convenient and efficient.It further, can be with The color of the content of privacy area in the display interface of application program is adjusted to the background face with the display interface of application program The matched color of form and aspect, changes the identifiability of the content of privacy area, and the effect of secret protection is preferable.
It is the structure chart that the present invention implements the mobile terminal provided referring to Fig. 8, Fig. 8, as shown in figure 8, mobile terminal 800 wraps Include judgment module 801, the first determining module 802 and processing module 803, in which:
Judgment module 801, for judging whether the application program of operation is default ecret protection application program;
First determining module 802, if the application program for the operation is the default ecret protection application program, Determine the privacy area for needing to carry out secret protection in the display interface of the application program;
Processing module 803 carries out secret protection processing for the content to the privacy area.
Optionally, as shown in figure 9, the processing module 803 includes:
Acquisition submodule 8031 blocks picture for obtaining, wherein the picture that blocks is for the privacy area The picture that is blocked of content;
Submodule 8032 is blocked, described picture blocked for controlling the content of the privacy area is blocked.
Optionally, as shown in Figure 10, the mobile terminal further include:
The first adjustment module 804, for adjusting the transparency for blocking picture to first object transparency;
The submodule 8032 that blocks is specifically used for the Occlusion Map that control transparency is the first object transparency Piece blocks the content of the privacy area.
Optionally, as shown in figure 11, the mobile terminal further include:
Receiving module 805, for receiving to the first object operation for blocking picture;
First detection module 806, for detecting the touch location of the first object operation on the screen of the mobile terminal;
Second detection module 807, for detecting the first object operation to pressure value caused by the screen;
Second determining module 808, if the pressure value for detecting is more than or equal to preset pressure threshold value, according to inspection The default corresponding relationship of the pressure value and pressure value and display area range that measure is determined using the touch location as reference bit The pending area set, wherein the pending area is the partial region for blocking picture;
Third determining module 809, the pressure value and pressure value detected for basis are default corresponding with transparency Relationship determines the second target clear degree;
Second adjustment module 8010, for the transparency of the pending area to be adjusted to second target clear Degree.
Optionally, as shown in figure 12, the processing module 803 further include:
Identify submodule 8033, for identification the background color of the display interface of the application program;
Adjusting submodule 8034, for the color of the content of the privacy area to be adjusted to aobvious with the application program Show the color that the background color at interface matches.
Optionally, the judgment module 801 is specifically used for receiving the second object run to the display interface, if described The operation that second object run carries out secret protection with default triggering matches, it is determined that the application program of the operation is described Default ecret protection application program.
Mobile terminal 800 can be realized each process that mobile terminal is realized in the embodiment of the method for Fig. 1, Fig. 4 and Fig. 7, To avoid repeating, which is not described herein again.And mobile terminal 800 may be implemented when the application program of operation to be that default secret protection is answered When with program, secret protection processing can be carried out to the content of privacy area.It can use and block picture in privacy area Appearance is blocked, and leakage of private information is prevented, convenient and efficient.Further, user can also adjust according to their needs and block The transparency of picture.Alternatively, the color of the content of privacy area in the display interface of application program can be adjusted to and be answered The color to be matched with the background color of the display interface of program changes the identifiability of the content of privacy area, secret protection Effect it is preferable.
It is the structure chart that the present invention implements the mobile terminal provided, as shown in figure 13, mobile terminal referring to Figure 13, Figure 13 1300 include: at least one processor 1301, memory 1302, at least one network interface 1304 and user interface 1303 and deposit The secret protection program that can be run on memory 1302 and on processor 1301 is stored up, secret protection program is by processor 1301 The step of above-mentioned method for secret protection is realized when execution.Various components in mobile terminal 1300 are coupled by bus system 1305 Together.It is understood that bus system 1305 is for realizing the connection communication between these components.It includes number that bus system 1305, which is removed, It further include power bus, control bus and status signal bus in addition except bus.But for the sake of clear explanation, in Figure 13 It is middle that various buses are all designated as bus system 1305.
Wherein, user interface 1303 may include display, keyboard or pointing device (for example, mouse, trace ball (track ball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 1302 in the embodiment of the present invention can be volatile memory or non-volatile memories Device, or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), erasable programmable are only Read memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, ) or flash memory EEPROM.Volatile memory can be random access memory (Random Access Memory, RAM), use Make External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random-access Memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random-access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), it is enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronous Connect dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 1302 of system and method described herein is intended to include but is not limited to this A little and any other suitable type memory.
In some embodiments, memory 1302 stores following element, executable modules or data structures, or Their subset of person or their superset: operating system 13021 and application program 13022.
Wherein, operating system 13021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 13022 includes various application programs, such as matchmaker Body player (Media Player), browser (Browser) etc., for realizing various applied business.Realize that the present invention is implemented The program of example method may be embodied in application program 13022.
In embodiments of the present invention, by the program or instruction of calling memory 1302 to store, specifically, can be application The program or instruction stored in program 13022, computer program can realize following steps when being executed by processor 1301:
Whether the application program for judging operation is default ecret protection application program;
If the application program of the operation is the default ecret protection application program, it is determined that the application program is shown Show the privacy area for needing to carry out secret protection in interface;
Secret protection processing is carried out to the content of the privacy area.
The method that the embodiments of the present invention disclose can be applied in processor 1301, or real by processor 1301 It is existing.Processor 1301 may be a kind of IC chip, the processing capacity with signal.During realization, the above method Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1301 or software form.Above-mentioned Processor 1301 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated Integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at The step of memory 1302, processor 1301 reads the information in memory 1302, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or It is realized outside processor.
Optionally, following steps be can also be achieved when computer program is executed by processor 1301:
Picture is blocked in acquisition, wherein the picture that blocks is the figure blocked for the content to the privacy area Piece;
Picture is blocked described in control to block the content of the privacy area.
Optionally, following steps be can also be achieved when computer program is executed by processor 1301:
The transparency for blocking picture is adjusted to first object transparency;
Control transparency is that the picture that blocks of the first object transparency carries out the content of the privacy area It blocks.
Optionally, following steps be can also be achieved when computer program is executed by processor 1301:
It receives and the first object for blocking picture is operated;
Detect the touch location of the first object operation on the screen of the mobile terminal;
The first object operation is detected to pressure value caused by the screen;
If the pressure value detected is more than or equal to preset pressure threshold value, according to the pressure value and pressure detected The default corresponding relationship of value and display area range is determined using the touch location as the pending area of reference position, wherein The pending area is the partial region for blocking picture;
The second target clear is determined according to the default corresponding relationship of the pressure value and pressure value and transparency that detect Degree;
The transparency of the pending area is adjusted to the second target clear degree.
Optionally, following steps be can also be achieved when computer program is executed by processor 1301:
Identify the background color of the display interface of the application program;
The color of the content of the privacy area is adjusted to the background color phase with the display interface of the application program Matched color.
Optionally, following steps be can also be achieved when computer program is executed by processor 1301:
The second object run to the display interface is received, if second object run and default triggering carry out privacy The operation of protection matches, it is determined that the application program of the operation is the default ecret protection application program.
Mobile terminal 1300 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, this In repeat no more.And mobile terminal 1300 may be implemented when the application program of operation is default ecret protection application program, it can Secret protection processing is carried out with the content to privacy area.It can use and block picture the content of privacy area is blocked, Leakage of private information is prevented, it is convenient and efficient.Further, user can also adjust the transparent journey for blocking picture according to their needs Degree.Alternatively, the color of the content of privacy area in the display interface of application program can be adjusted to the display with application program The color that the background color at interface matches, changes the identifiability of the content of privacy area, and the effect of secret protection is preferable.
The embodiment of the present invention also provides a kind of computer-readable storage medium, which is characterized in that described computer-readable It takes and is stored with secret protection program on storage medium, the secret protection program realizes above-mentioned fingerprint privacy when being executed by processor The step of guard method.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (8)

1. a kind of method for secret protection characterized by comprising
Whether the application program for judging operation is default ecret protection application program;
If the application program of the operation is the default ecret protection application program, it is determined that display circle of the application program Need to carry out the privacy area of secret protection in face;
Secret protection processing is carried out to the content of the privacy area;
The content to the privacy area carries out secret protection processing, comprising:
Picture is blocked in acquisition, wherein the picture that blocks is the picture blocked for the content to the privacy area;
Picture is blocked described in control to block the content of the privacy area;
After the step of picture is blocked in the acquisition, block described in the control picture to the content of the privacy area into Before the step of row blocks, the method also includes:
The transparency for blocking picture is adjusted to first object transparency;
Picture is blocked described in the control to block the content of the privacy area, comprising:
Control transparency is that the picture that blocks of the first object transparency blocks the content of the privacy area;
The control transparency be the first object transparency block picture to the content of the privacy area into After the step of row blocks, the method also includes:
It receives and the first object for blocking picture is operated;
Detect the touch location of the first object operation on the screen of the mobile terminal;
The first object operation is detected to pressure value caused by the screen;
If the pressure value detected is more than or equal to preset pressure threshold value, according to the pressure value that detects and pressure value with The default corresponding relationship of display area range is determined using the touch location as the pending area of reference position, wherein described Pending area is the partial region for blocking picture;
The second target clear degree is determined according to the default corresponding relationship of the pressure value and pressure value and transparency that detect;
The transparency of the pending area is adjusted to the second target clear degree.
2. the method as described in claim 1, which is characterized in that the content to the privacy area carries out at secret protection Reason, comprising:
Identify the background color of the display interface of the application program;
The color of the content of the privacy area is adjusted to match with the background color of the display interface of the application program Color.
3. method according to claim 1 or 2, which is characterized in that it is described judge operation application program whether be preset it is hidden Private protection application program, comprising:
The second object run to the display interface is received, if second object run and default triggering carry out secret protection Operation match, it is determined that the application program of the operation be the default ecret protection application program.
4. a kind of mobile terminal characterized by comprising
Judgment module, for judging whether the application program of operation is default ecret protection application program;
First determining module, if the application program for the operation is the default ecret protection application program, it is determined that institute State the privacy area for needing to carry out secret protection in the display interface of application program;
Processing module carries out secret protection processing for the content to the privacy area;The processing module includes:
Acquisition submodule, for obtain block picture, wherein it is described block picture be for the content to the privacy area into The picture that row blocks;
Submodule is blocked, described picture blocked for controlling the content of the privacy area is blocked;
The mobile terminal further include:
The first adjustment module, for adjusting the transparency for blocking picture to first object transparency;
It is described that block submodule to be specifically used for control transparency be that the first object transparency blocks picture to described The content of privacy area is blocked;
The mobile terminal further include:
Receiving module, for receiving to the first object operation for blocking picture;
First detection module, for detecting the touch location of the first object operation on the screen of the mobile terminal;
Second detection module, for detecting the first object operation to pressure value caused by the screen;
Second determining module, if the pressure value for detecting is more than or equal to preset pressure threshold value, according to what is detected The default corresponding relationship of pressure value and pressure value and display area range, determine using the touch location as reference position to Processing region, wherein the pending area is the partial region for blocking picture;
Third determining module, for being determined according to the default corresponding relationship of the pressure value and pressure value and transparency that detect Second target clear degree;
Second adjustment module, for the transparency of the pending area to be adjusted to the second target clear degree.
5. mobile terminal as claimed in claim 4, which is characterized in that the processing module further include:
Identify submodule, for identification the background color of the display interface of the application program;
Adjusting submodule, for the color of the content of the privacy area to be adjusted to and the display interface of the application program The color that background color matches.
6. mobile terminal as described in claim 4 or 5, which is characterized in that the judgment module is specifically used for receiving to described Second object run of display interface, if the operation that second object run carries out secret protection with default triggering matches, The application program for then determining the operation is the default ecret protection application program.
7. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be described The secret protection program run on processor realizes such as claim 1 when the secret protection program is executed by the processor The step of to method for secret protection described in any one of 3.
8. a kind of computer-readable storage medium, which is characterized in that be stored in the computer-readable storage medium hidden Private protective program, the secret protection program realize privacy as claimed any one in claims 1 to 3 when being executed by processor The step of guard method.
CN201710752511.2A 2017-08-28 2017-08-28 A kind of method for secret protection and mobile terminal Active CN107358111B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710752511.2A CN107358111B (en) 2017-08-28 2017-08-28 A kind of method for secret protection and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710752511.2A CN107358111B (en) 2017-08-28 2017-08-28 A kind of method for secret protection and mobile terminal

Publications (2)

Publication Number Publication Date
CN107358111A CN107358111A (en) 2017-11-17
CN107358111B true CN107358111B (en) 2019-11-22

Family

ID=60288180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710752511.2A Active CN107358111B (en) 2017-08-28 2017-08-28 A kind of method for secret protection and mobile terminal

Country Status (1)

Country Link
CN (1) CN107358111B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110324482A (en) * 2018-03-31 2019-10-11 神盾网络安全信息化中心股份有限公司 A kind of information management-control method of the mobile phone based on face recognition
CN108563929A (en) * 2018-04-16 2018-09-21 深圳市联软科技股份有限公司 It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium
CN108563930B (en) * 2018-04-16 2020-09-25 深圳市联软科技股份有限公司 Method, device, medium and system for adding watermark to confidential file
CN108965982B (en) * 2018-08-28 2020-01-31 百度在线网络技术(北京)有限公司 Video recording method and device, electronic equipment and readable storage medium
CN110968889A (en) * 2018-09-30 2020-04-07 中兴通讯股份有限公司 Data protection method, equipment, device and computer storage medium
CN111259421A (en) * 2020-01-15 2020-06-09 奇安信科技集团股份有限公司 Privacy authority anti-disclosure processing method and device, electronic equipment and storage medium
CN111581664B (en) * 2020-05-07 2023-10-10 上海盛付通电子支付服务有限公司 Information protection method and device
CN112950443B (en) * 2021-02-05 2023-11-24 深圳市镜玩科技有限公司 Self-adaptive privacy protection method, system, equipment and medium based on image sticker
CN115240281A (en) * 2022-09-23 2022-10-25 平安银行股份有限公司 Private information display method and device, storage medium and mobile terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462991A (en) * 2013-09-16 2015-03-25 中兴通讯股份有限公司 Method and device for protecting privacy information of mobile terminal
CN104679387A (en) * 2015-02-13 2015-06-03 广东欧珀移动通信有限公司 Privacy information protection method and terminal
CN105956486A (en) * 2016-04-29 2016-09-21 北京小米移动软件有限公司 Remote control method and apparatus
CN106055999A (en) * 2016-06-10 2016-10-26 安徽朗格暖通设备有限公司 Method for protecting privacy of mobile terminal and mobile terminal
CN106569662A (en) * 2016-10-31 2017-04-19 维沃移动通信有限公司 Display method of application interface and mobile terminal
CN106778338A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 A kind of method for secret protection and device, mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8527779B1 (en) * 2010-09-01 2013-09-03 Open Invention Network, Llc Method and apparatus of performing distributed steganography of a data message
CN105824693B (en) * 2015-11-30 2019-04-12 维沃移动通信有限公司 A kind of control method that multitask is shown and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462991A (en) * 2013-09-16 2015-03-25 中兴通讯股份有限公司 Method and device for protecting privacy information of mobile terminal
CN104679387A (en) * 2015-02-13 2015-06-03 广东欧珀移动通信有限公司 Privacy information protection method and terminal
CN105956486A (en) * 2016-04-29 2016-09-21 北京小米移动软件有限公司 Remote control method and apparatus
CN106055999A (en) * 2016-06-10 2016-10-26 安徽朗格暖通设备有限公司 Method for protecting privacy of mobile terminal and mobile terminal
CN106569662A (en) * 2016-10-31 2017-04-19 维沃移动通信有限公司 Display method of application interface and mobile terminal
CN106778338A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 A kind of method for secret protection and device, mobile terminal

Also Published As

Publication number Publication date
CN107358111A (en) 2017-11-17

Similar Documents

Publication Publication Date Title
CN107358111B (en) A kind of method for secret protection and mobile terminal
JP6719011B2 (en) Implementation of biometrics
JP6736686B1 (en) Implementation of biometrics
DK180328B1 (en) Implementation of biometric authentication
US10728499B2 (en) Electronic apparatus and communication method thereof
CN106055195B (en) A kind of operating method and mobile terminal of file
US20170011557A1 (en) Method for providing augmented reality and virtual reality and electronic device using the same
CN106937054B (en) A kind of take pictures weakening method and the mobile terminal of mobile terminal
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
WO2019001152A1 (en) Photographing method and mobile terminal
CN106648382B (en) A kind of picture browsing method and mobile terminal
CN105827816B (en) A kind of the split screen method and mobile terminal of terminal screen
JP2020500344A (en) Implementation of biometric authentication
CN103246476A (en) Method, device and terminal device for rotating screen contents
CN110457963B (en) Display control method, display control device, mobile terminal and computer-readable storage medium
CN105868617B (en) Application program encryption method and mobile terminal
CN106650367A (en) Private content display method and mobile terminal
CN106502545B (en) A kind of operating method and mobile terminal for sliding control
CN107194907B (en) A kind of screenshot synthetic method and mobile terminal
CN106250757B (en) A kind of control method and mobile terminal of application program
CN107480500A (en) The method and mobile terminal of a kind of face verification
CN106713715A (en) Photographing method and mobile terminal
CN107679381A (en) A kind of announcement information processing method and mobile terminal
CN112783388B (en) Display method, display device and electronic equipment
CN106210293A (en) A kind of information processing method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant