CN107358111B - A kind of method for secret protection and mobile terminal - Google Patents
A kind of method for secret protection and mobile terminal Download PDFInfo
- Publication number
- CN107358111B CN107358111B CN201710752511.2A CN201710752511A CN107358111B CN 107358111 B CN107358111 B CN 107358111B CN 201710752511 A CN201710752511 A CN 201710752511A CN 107358111 B CN107358111 B CN 107358111B
- Authority
- CN
- China
- Prior art keywords
- application program
- picture
- content
- secret protection
- transparency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Abstract
The present invention provides a kind of method for secret protection and mobile terminal, this method comprises: whether the application program for judging operation is default ecret protection application program;If the application program of the operation is the default ecret protection application program, it is determined that need to carry out the privacy area of secret protection in the display interface of the application program;Secret protection processing is carried out to the content of the privacy area.In this way, when the application program of operation is default ecret protection application program secret protection processing can be carried out to the content of privacy area.Leakage of private information is prevented, the effect of secret protection is preferable.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of method for secret protection and mobile terminal.
Background technique
It improves with the development of science and technology, mobile terminal is more more and more universal, and the function that mobile terminal has is increasingly
Diversification.For example, audio-frequency function, camera function, camera function and store function etc. all have become the indispensable function of mobile terminal
Energy.The function abundant of mobile terminal is that the work and life of user is provided convenience, while there is also certain information hidden danger.
For example, terminal screen is shown interior with when instant communication mode chat, checking mail or input password
It is easy to be seen by other people.In the prior art, the method for pasting frosted film or light polarizing film to the screen of terminal is generallyd use.Mill
Sand film can reduce the display brightness of screen, if you need to reach satisfactory display brightness, need for screen backlight brightness to be turned up, this
Sample will increase the power consumption of terminal.Light polarizing film can reduce screen visible angle, but can bring inconvenience to the use of some applications, example
The case where such as playing video.Therefore, in the prior art, the effect of secret protection is poor.
Summary of the invention
The embodiment of the present invention provides a kind of method for secret protection and mobile terminal, to solve secret protection in the prior art
The poor problem of effect.
In a first aspect, the embodiment of the invention provides a kind of method for secret protection, comprising:
Whether the application program for judging operation is default ecret protection application program;
If the application program of the operation is the default ecret protection application program, it is determined that the application program is shown
Show the privacy area for needing to carry out secret protection in interface;
Secret protection processing is carried out to the content of the privacy area.
Second aspect, the embodiment of the present invention also provide a kind of mobile terminal, comprising:
Judgment module, for judging whether the application program of operation is default ecret protection application program;
First determining module, if the application program for the operation is the default ecret protection application program, really
Need to carry out the privacy area of secret protection in the display interface of the fixed application program;
Processing module carries out secret protection processing for the content to the privacy area.
The third aspect, the embodiment of the present invention also provide a kind of mobile terminal, which is characterized in that including processor, memory
And it is stored in the secret protection program that can be run on the memory and on the processor, the secret protection program is by institute
State the step of realizing above-mentioned method for secret protection when processor executes.
Fourth aspect, the embodiment of the present invention also provide a kind of computer-readable storage medium, which is characterized in that the meter
Secret protection program is stored on calculation machine read/write memory medium, the secret protection program is realized above-mentioned when being executed by processor
The step of method for secret protection.
In this way, judging whether the application program of operation is default ecret protection application program in the embodiment of the present invention;If institute
The application program for stating operation is the default ecret protection application program, it is determined that is needed in the display interface of the application program
Carry out the privacy area of secret protection;Secret protection processing is carried out to the content of the privacy area.In this way, when the application of operation
When program is default ecret protection application program, secret protection processing can be carried out to the content of privacy area.Prevent privacy from believing
Breath leakage, the effect of secret protection are preferable.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention
Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention,
For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is a kind of flow chart of method for secret protection provided in an embodiment of the present invention;
Fig. 2 is a kind of picture that blocks provided in an embodiment of the present invention to needing the privacy area for carrying out secret protection to hide
The schematic diagram of gear;
Fig. 3 is that another kind provided in an embodiment of the present invention blocks privacy area progress of the picture to needing to carry out secret protection
The schematic diagram blocked;
Fig. 4 is the flow chart of another method for secret protection provided in an embodiment of the present invention;
Fig. 5 is the schematic diagram of the progress bar for the transparency that picture is blocked in a kind of adjustment provided in an embodiment of the present invention;
Fig. 6 is the signal that the content that pending area in picture is covered is blocked in a kind of display provided in an embodiment of the present invention
Figure;
Fig. 7 is the flow chart of another method for secret protection provided in an embodiment of the present invention;
Fig. 8 is a kind of structure chart of mobile terminal provided in an embodiment of the present invention;
Fig. 9 is the structure chart of another mobile terminal provided in an embodiment of the present invention;
Figure 10 is the structure chart of another mobile terminal provided in an embodiment of the present invention;
Figure 11 is the structure chart of another mobile terminal provided in an embodiment of the present invention;
Figure 12 is the structure chart of another mobile terminal provided in an embodiment of the present invention;
Figure 13 is the structure chart of another mobile terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
It is a kind of flow chart of method for secret protection provided in an embodiment of the present invention referring to Fig. 1, Fig. 1, as shown in Figure 1, packet
Include following steps:
Whether step 101, the application program for judging operation are default ecret protection application program.
In a step 101, default ecret protection application program can be preassigned.For example, can be by instant communication mode
Program, e-mail program and short message program etc. are appointed as default ecret protection application program.
Mobile terminal can first judge whether the application program of operation is default ecret protection application program.
If step 102, the application program of the operation are the default ecret protection application program, it is determined that the application
Need to carry out the privacy area of secret protection in the display interface of program.
In a step 102, if mobile terminal judges that the application program of operation is default ecret protection application program,
It can determine the privacy area for needing to carry out secret protection in the display interface of application program.
For example, it is assumed that the application program of operation is instant communication mode program, and instant communication mode program is hidden to preset
Private protection application program.The display interface of instant communication mode program can be divided into two interfaces up and down, and will be above
Interface be determined as the privacy area for needing to carry out secret protection.It can also be by the display interface equal part of instant communication mode program
For three interfaces of upper, middle and lower, and interface above is determined as to the privacy area for needing to carry out secret protection.
Step 103 carries out secret protection processing to the content of the privacy area.
In step 103, next, available block picture.Obtain block picture mode can there are two types of.First
Kind of mode is to preassign a picture as blocking picture, for example, can select a picture as blocking from picture library
Picture.When showing the interface of default ecret protection application program, this can be popped up and block picture.The second way is to default
The interface of ecret protection application program carries out screenshot, and then using cut figure as blocking picture.
When the display interface of instant communication mode program is divided into two interfaces up and down, and interface above is determined
When privacy area to need to carry out secret protection, the area for blocking picture can be the display interface of instant communication mode program
Area half.The area for blocking picture popped up can be the area of the display interface of instant communication mode program
Half, alternatively, carrying out the screenshot area obtained for blocking picture to the interface of default ecret protection application program
It can be the half of the area of the display interface of instant communication mode program.Interface above can be covered in by blocking picture
On, i.e., Occlusion Map sector-meeting shelters from the content at interface above namely Occlusion Map sector-meeting will need to carry out secret protection
The content of privacy area shelters from.As shown in Fig. 2, being carried out for a kind of picture that blocks to the privacy area for needing to carry out secret protection
The schematic diagram blocked.
It should be noted that blocking picture can arbitrarily drag, i.e., user can will block according to the wish of oneself
Picture drags to any position of the display interface of application program.And the size for blocking picture is adjustable.
In addition, the characteristics of mobile terminal can be according to the application program of operation, the display interface of automatic identification application program
The middle privacy area for needing to carry out secret protection.For example, mobile terminal can be known when the application program of operation is short message program
Not Chu " contact person region " and " telephone number region " in the display interface of short message program, and then blocking picture can be only right
The content in " contact person region " and the content of " telephone number region " are blocked, and in the display interface of short message program
Other regions are then without blocking.Further, mobile whole when short message content is related to bank's card number, identifying code or password
End can also automatically identify bank's card number field, identifying code region or cryptographic zone, and then blocking picture can also be to silver
Row card number field, identifying code region or cryptographic zone are blocked.As shown in figure 3, for another kind block picture to need into
The schematic diagram that the privacy area of row secret protection is blocked.
When user wants to check the content in the region that is blocked, the modes such as picture can be blocked by double-click and be blocked to cancel
Picture.And revocation block picture mode can there are many, however it is not limited to above-mentioned double-click mode.Above embodiment is only one
Kind illustrates.
In the embodiment of the present invention, above-mentioned mobile terminal can be mobile phone, tablet computer (Tablet Personal
Computer), laptop computer (Laptop Computer), personal digital assistant (personal digital
Assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, MID) or wearable device
(Wearable Device) etc..
The method for secret protection of the embodiment of the present invention judges whether the application program of operation is default secret protection application journey
Sequence;If the application program of the operation is the default ecret protection application program, it is determined that display circle of the application program
Need to carry out the privacy area of secret protection in face;Secret protection processing is carried out to the content of the privacy area.In this way, when fortune
When capable application program is default ecret protection application program, secret protection processing can be carried out to the content of privacy area.Into
One step, it can use and block picture the content of privacy area is blocked, it is convenient and efficient.Leakage of private information is prevented, it is hidden
The effect of private protection is preferable.
Referring to fig. 4, Fig. 4 is the flow chart of another method for secret protection provided in an embodiment of the present invention, as shown in figure 4,
The following steps are included:
Whether step 401, the application program for judging operation are default ecret protection application program.
In step 401, mobile terminal may determine that whether the application program of operation is default ecret protection application program.
For example, mobile terminal may determine that whether the application program of operation is pre-set application program.If the application journey of operation
Sequence is pre-set application program, then can determine that the application program of operation is default ecret protection application program.For example, pre-
The application program being first arranged can be instant communication mode program, e-mail program and short message program etc..
If step 402, the application program of the operation are the default ecret protection application program, it is determined that the application
Need to carry out the privacy area of secret protection in the display interface of program.
In step 402, if mobile terminal judges that the application program of operation is default ecret protection application program,
It can determine the privacy area for needing to carry out secret protection in the display interface of application program.
For example, it is assumed that the application program of operation is instant communication mode program, and instant communication mode program is hidden to preset
Private protection application program.The display interface of instant communication mode program can be divided into three interfaces of upper, middle and lower, and will be upper
The interface in face is determined as the privacy area for needing to carry out secret protection.
Picture is blocked in step 403, acquisition, wherein the picture that blocks is to carry out for the content to the privacy area
The picture blocked.
In step 403, available to block picture.Wherein, blocking picture is to carry out for the content to privacy area
The picture blocked.Obtain block picture mode can there are two types of.First way is to preset picture conduct to block
Picture, for example, can select a picture as blocking picture from picture library.Ecret protection application program is preset when showing
When interface, this can be popped up and block picture.The second way is to carry out screenshot to the interface of default ecret protection application program, into
And using cut figure as blocking picture.
When the display interface of instant communication mode program is divided into three interfaces of upper, middle and lower, and interface above is true
When being set to the privacy area for needing to carry out secret protection, the area for blocking picture can be display circle of instant communication mode program
The one third of the area in face.The area for blocking picture popped up can be the face of the display interface of instant communication mode program
Long-pending one third, alternatively, the interface to default ecret protection application program carries out the screenshot area obtained for blocking picture
Or the one third of the area of the display interface of instant communication mode program.Boundary above can be covered in by blocking picture
On face, i.e., Occlusion Map sector-meeting shelters from the content at interface above namely Occlusion Map sector-meeting will need to carry out secret protection
The content of privacy area shelter from.
Step 404 adjusts the transparency for blocking picture to first object transparency.
In step 404, it gets after blocking picture, further, the transparency for blocking picture can be adjusted
To first object transparency.
For example, mobile terminal can automatically adjust the transparency for blocking picture to first object transparency.Alternatively,
The transparency for blocking picture can also be adjusted to first object transparency manually by user.For example, one can be shown
For adjusting the progress bar for blocking the transparency of picture, when user drags the regulation button on progress bar with finger, so that it may
To realize that the transparency of picture is blocked in adjustment.When transparency is 100%, it is fully transparent to block picture, i.e., to privacy zone
The content in domain is not blocked;When transparency is 0%, it is completely opaque to block picture.Transparency between 0%-100% it
Between, and transparency is bigger, the content of privacy area is more clear, i.e., user can be easier to see the content of privacy area clearly.
User can be adjusted the transparency for blocking picture according to itself wish.For example, when user thinks to run
Application program display interface in content it is extremely important, and surrounding can will block the transparent journey of picture when having many people
Degree is adjusted lower, guarantees that oneself can see clearly the content of privacy area.And the people of surrounding can not then see privacy zone clearly
The content in domain.Not only the leakage of privacy information had been prevented, but also the content that user reads privacy area will not be delayed.As shown in figure 5, being
It is a kind of to adjust the schematic diagram for blocking the progress bar of transparency of picture.
Step 405, control transparency block picture to the privacy area for the first object transparency
Content is blocked.
In step 405, the transparency for blocking picture is adjusted to first object transparency, so that it may control
Transparency is that the picture that blocks of first object transparency blocks the content of privacy area.
Optionally, picture is blocked to the privacy zone for the first object transparency in the control transparency
After the step of content in domain is blocked, the method also includes:
It receives and the first object for blocking picture is operated;
Detect the touch location of the first object operation on the screen of the mobile terminal;
The first object operation is detected to pressure value caused by the screen;
If the pressure value detected is more than or equal to preset pressure threshold value, according to the pressure value and pressure detected
The default corresponding relationship of value and display area range is determined using the touch location as the pending area of reference position, wherein
The pending area is the partial region for blocking picture;
The second target clear is determined according to the default corresponding relationship of the pressure value and pressure value and transparency that detect
Degree;
The transparency of the pending area is adjusted to the second target clear degree.
The content of privacy area is blocked using the picture that blocks that transparency is adjusted to first object transparency
Later, it can receive and the first object for blocking picture operated.Here still using the application program of operation as instant communication mode journey
It is illustrated for sequence.
It receives after being operated to the first object for blocking picture, can detecte first object operation in the screen of mobile terminal
Touch location and first object on curtain are operated to pressure value caused by screen.If the pressure value detected be greater than or
It, then can be true according to the default corresponding relationship of the pressure value and pressure value detected and display area range equal to preset threshold
Determine using touch location as the pending area of reference position, wherein pending area is to block the partial region of picture.
For example, first is chatted using instant communication mode and second, and second needs to log in oneself mailbox and removes downloading document.But
Second is inconvenient to log in mailbox, oneself mailbox user name and login password can be sent to first by instant communication mode, by
First logs in the mailbox of second, and then helps second that profile download is got off.Due to mailbox user name and login password belong to it is more hidden
Private information, can block mailbox user name and login password with picture is blocked.First can press and block picture, if
The pressing force angle value that mobile terminal detects is more than or equal to preset threshold, can be according to the pressure value and pressure detected
The default corresponding relationship of value and display area range is determined using touch location as the pending area of reference position, it can according to
The default corresponding relationship of the pressure value and pressure value and display area range that detect is determined using pressing position as center position
Pending area.The pressure value that mobile terminal detects is bigger, and the range of pending area is bigger.
Mobile terminal can also be true according to the default corresponding relationship of the pressure value and pressure value and transparency that detect
Fixed second target clear degree.The pressure value that mobile terminal detects is bigger, and transparency is bigger.Finally, can will be to be processed
The transparency in region is adjusted to the second target clear degree.At this point, user, which can see clearly, blocks pending area in picture
The content covered.I.e. first can see the mailbox user name for blocking the second that pending area in picture is covered clearly and log in close
Code.As shown in fig. 6, blocking the schematic diagram for the content that pending area in picture covers by a kind of display.In this way, working as Occlusion Map
When piece covers the content of privacy area, checking for the content only covered to the partial region for blocking picture is realized, into
One step improves secret protection effect.
User can also block the modes such as picture by double-click and block picture to cancel.And revocation block the mode of picture can
There are many, however it is not limited to above-mentioned double-click mode.Above embodiment is only a kind of illustration.The embodiment of the present invention it is hidden
Private guard method can carry out the content of privacy area when the application program of operation is default ecret protection application program
Secret protection processing.It can use and block picture the content of privacy area is blocked, prevent leakage of private information, it is convenient fast
It is prompt.Further, user can also adjust the transparency for blocking picture according to their needs, change the content of privacy area
The effect of identifiability, secret protection is preferable.
It is the flow chart of another method for secret protection provided in an embodiment of the present invention referring to Fig. 7, Fig. 7, as shown in fig. 7,
The following steps are included:
The second object run of step 701, reception to the display interface, if second object run and default triggering
The operation for carrying out secret protection matches, it is determined that the application program of the operation is the default ecret protection application program.
In step 701, the second object run to the display interface of the application program of operation can receive.If second
The operation that object run carries out secret protection with default triggering matches, then can determine that the application program of operation is default privacy
Protect application program.
For example, user's picture in browse graph valut in public, and certain pictures in picture library may relate to use
The privacy at family.When user browses to the picture for being related to privacy, private information disclosure, user can use three fingers in order to prevent
The slide downward on privacy picture.After mobile terminal detects slide, it can be determined that the slide that detects and default
Whether the operation that triggering carries out secret protection matches.If mobile terminal judge the slide detected and it is default trigger into
The operation of row secret protection matches, then can pop up and block picture.User can according to need the size that picture is blocked in adjustment,
And the position of privacy involved in browsed picture picture will be blocked is dragged to, using blocking picture to the content of privacy area
It is blocked, to prevent private information disclosure.
If step 702, the application program of the operation are the default ecret protection application program, it is determined that the application
Need to carry out the privacy area of secret protection in the display interface of program.
In a step 702, if mobile terminal judges that the application program of operation is default ecret protection application program,
It can determine the privacy area for needing to carry out secret protection in the display interface of application program.
For example, it is assumed that the application program of operation is instant communication mode program, and instant communication mode program is hidden to preset
Private protection application program.For example, mobile terminal the entire display interface of instant communication mode program can be determined as needing into
The privacy area of row secret protection.
The background color of the display interface of step 703, the identification application program.
In step 703, mobile terminal can be with the background color of the display interface of recognition application.I.e. mobile terminal can
To identify the background color of the display interface of instant communication mode program.Assuming that mobile terminal identifies instant communication mode program
Display interface background color be green.
The color of the content of the privacy area is adjusted to the back with the display interface of the application program by step 704
The color that scape color matches.
It in step 704, can will be in privacy area after the background color for identifying the display interface of application program
The color of appearance is adjusted to the color to match with the background color of the display interface of application program.It can be by instant communication mode
The color of the content of privacy area in the display interface of program is adjusted to the back with the display interface of instant communication mode program
The green that scape color matches.When entire display circle that the privacy area for needing to carry out secret protection is instant communication mode program
When face, the color of the text in the entire display interface of instant communication mode program can be adjusted to and instant communication mode
The green that the background color of the display interface of program matches.It is mobile and during being chatted using instant communication mode
The color of emerging text can be adjusted to the background color with the display interface of instant communication mode program by terminal in real time
The green to match.For example, if the background color of the display interface of application program is light green color, it can be by privacy area
The color of content is adjusted to the bottle green to match with light green color.In this way, due to privacy area in the display interface of application program
Content color it is close with the background color of the display interface of application program, it is ensured that user sees clearly the interior of privacy area
Hold, and the people of surrounding can not then see the content of privacy area clearly.Not only the leakage of privacy information had been prevented, but also user's reading will not be delayed
Take the content of privacy area.
User can also be by way of from left to right being slided on the display interface of application program by privacy zone with finger
The color of the content in domain reverts to original color.And restore privacy area content color mode can there are many, and
It is not limited to the above-mentioned mode from left to right slided.Above embodiment is only a kind of illustration.
The method for secret protection of the embodiment of the present invention, when the application program of operation is default ecret protection application program,
Secret protection processing can be carried out to the content of privacy area.Leakage of private information is prevented, it is convenient and efficient.It further, can be with
The color of the content of privacy area in the display interface of application program is adjusted to the background face with the display interface of application program
The matched color of form and aspect, changes the identifiability of the content of privacy area, and the effect of secret protection is preferable.
It is the structure chart that the present invention implements the mobile terminal provided referring to Fig. 8, Fig. 8, as shown in figure 8, mobile terminal 800 wraps
Include judgment module 801, the first determining module 802 and processing module 803, in which:
Judgment module 801, for judging whether the application program of operation is default ecret protection application program;
First determining module 802, if the application program for the operation is the default ecret protection application program,
Determine the privacy area for needing to carry out secret protection in the display interface of the application program;
Processing module 803 carries out secret protection processing for the content to the privacy area.
Optionally, as shown in figure 9, the processing module 803 includes:
Acquisition submodule 8031 blocks picture for obtaining, wherein the picture that blocks is for the privacy area
The picture that is blocked of content;
Submodule 8032 is blocked, described picture blocked for controlling the content of the privacy area is blocked.
Optionally, as shown in Figure 10, the mobile terminal further include:
The first adjustment module 804, for adjusting the transparency for blocking picture to first object transparency;
The submodule 8032 that blocks is specifically used for the Occlusion Map that control transparency is the first object transparency
Piece blocks the content of the privacy area.
Optionally, as shown in figure 11, the mobile terminal further include:
Receiving module 805, for receiving to the first object operation for blocking picture;
First detection module 806, for detecting the touch location of the first object operation on the screen of the mobile terminal;
Second detection module 807, for detecting the first object operation to pressure value caused by the screen;
Second determining module 808, if the pressure value for detecting is more than or equal to preset pressure threshold value, according to inspection
The default corresponding relationship of the pressure value and pressure value and display area range that measure is determined using the touch location as reference bit
The pending area set, wherein the pending area is the partial region for blocking picture;
Third determining module 809, the pressure value and pressure value detected for basis are default corresponding with transparency
Relationship determines the second target clear degree;
Second adjustment module 8010, for the transparency of the pending area to be adjusted to second target clear
Degree.
Optionally, as shown in figure 12, the processing module 803 further include:
Identify submodule 8033, for identification the background color of the display interface of the application program;
Adjusting submodule 8034, for the color of the content of the privacy area to be adjusted to aobvious with the application program
Show the color that the background color at interface matches.
Optionally, the judgment module 801 is specifically used for receiving the second object run to the display interface, if described
The operation that second object run carries out secret protection with default triggering matches, it is determined that the application program of the operation is described
Default ecret protection application program.
Mobile terminal 800 can be realized each process that mobile terminal is realized in the embodiment of the method for Fig. 1, Fig. 4 and Fig. 7,
To avoid repeating, which is not described herein again.And mobile terminal 800 may be implemented when the application program of operation to be that default secret protection is answered
When with program, secret protection processing can be carried out to the content of privacy area.It can use and block picture in privacy area
Appearance is blocked, and leakage of private information is prevented, convenient and efficient.Further, user can also adjust according to their needs and block
The transparency of picture.Alternatively, the color of the content of privacy area in the display interface of application program can be adjusted to and be answered
The color to be matched with the background color of the display interface of program changes the identifiability of the content of privacy area, secret protection
Effect it is preferable.
It is the structure chart that the present invention implements the mobile terminal provided, as shown in figure 13, mobile terminal referring to Figure 13, Figure 13
1300 include: at least one processor 1301, memory 1302, at least one network interface 1304 and user interface 1303 and deposit
The secret protection program that can be run on memory 1302 and on processor 1301 is stored up, secret protection program is by processor 1301
The step of above-mentioned method for secret protection is realized when execution.Various components in mobile terminal 1300 are coupled by bus system 1305
Together.It is understood that bus system 1305 is for realizing the connection communication between these components.It includes number that bus system 1305, which is removed,
It further include power bus, control bus and status signal bus in addition except bus.But for the sake of clear explanation, in Figure 13
It is middle that various buses are all designated as bus system 1305.
Wherein, user interface 1303 may include display, keyboard or pointing device (for example, mouse, trace ball
(track ball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 1302 in the embodiment of the present invention can be volatile memory or non-volatile memories
Device, or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory
(Read-Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), erasable programmable are only
Read memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM,
) or flash memory EEPROM.Volatile memory can be random access memory (Random Access Memory, RAM), use
Make External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random-access
Memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random-access
Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data
Rate SDRAM, DDRSDRAM), it is enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronous
Connect dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory
(Direct Rambus RAM, DRRAM).The memory 1302 of system and method described herein is intended to include but is not limited to this
A little and any other suitable type memory.
In some embodiments, memory 1302 stores following element, executable modules or data structures, or
Their subset of person or their superset: operating system 13021 and application program 13022.
Wherein, operating system 13021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 13022 includes various application programs, such as matchmaker
Body player (Media Player), browser (Browser) etc., for realizing various applied business.Realize that the present invention is implemented
The program of example method may be embodied in application program 13022.
In embodiments of the present invention, by the program or instruction of calling memory 1302 to store, specifically, can be application
The program or instruction stored in program 13022, computer program can realize following steps when being executed by processor 1301:
Whether the application program for judging operation is default ecret protection application program;
If the application program of the operation is the default ecret protection application program, it is determined that the application program is shown
Show the privacy area for needing to carry out secret protection in interface;
Secret protection processing is carried out to the content of the privacy area.
The method that the embodiments of the present invention disclose can be applied in processor 1301, or real by processor 1301
It is existing.Processor 1301 may be a kind of IC chip, the processing capacity with signal.During realization, the above method
Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1301 or software form.Above-mentioned
Processor 1301 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated
Integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor
And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only
In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at
The step of memory 1302, processor 1301 reads the information in memory 1302, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein
The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or
It is realized outside processor.
Optionally, following steps be can also be achieved when computer program is executed by processor 1301:
Picture is blocked in acquisition, wherein the picture that blocks is the figure blocked for the content to the privacy area
Piece;
Picture is blocked described in control to block the content of the privacy area.
Optionally, following steps be can also be achieved when computer program is executed by processor 1301:
The transparency for blocking picture is adjusted to first object transparency;
Control transparency is that the picture that blocks of the first object transparency carries out the content of the privacy area
It blocks.
Optionally, following steps be can also be achieved when computer program is executed by processor 1301:
It receives and the first object for blocking picture is operated;
Detect the touch location of the first object operation on the screen of the mobile terminal;
The first object operation is detected to pressure value caused by the screen;
If the pressure value detected is more than or equal to preset pressure threshold value, according to the pressure value and pressure detected
The default corresponding relationship of value and display area range is determined using the touch location as the pending area of reference position, wherein
The pending area is the partial region for blocking picture;
The second target clear is determined according to the default corresponding relationship of the pressure value and pressure value and transparency that detect
Degree;
The transparency of the pending area is adjusted to the second target clear degree.
Optionally, following steps be can also be achieved when computer program is executed by processor 1301:
Identify the background color of the display interface of the application program;
The color of the content of the privacy area is adjusted to the background color phase with the display interface of the application program
Matched color.
Optionally, following steps be can also be achieved when computer program is executed by processor 1301:
The second object run to the display interface is received, if second object run and default triggering carry out privacy
The operation of protection matches, it is determined that the application program of the operation is the default ecret protection application program.
Mobile terminal 1300 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, this
In repeat no more.And mobile terminal 1300 may be implemented when the application program of operation is default ecret protection application program, it can
Secret protection processing is carried out with the content to privacy area.It can use and block picture the content of privacy area is blocked,
Leakage of private information is prevented, it is convenient and efficient.Further, user can also adjust the transparent journey for blocking picture according to their needs
Degree.Alternatively, the color of the content of privacy area in the display interface of application program can be adjusted to the display with application program
The color that the background color at interface matches, changes the identifiability of the content of privacy area, and the effect of secret protection is preferable.
The embodiment of the present invention also provides a kind of computer-readable storage medium, which is characterized in that described computer-readable
It takes and is stored with secret protection program on storage medium, the secret protection program realizes above-mentioned fingerprint privacy when being executed by processor
The step of guard method.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others
Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit
It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs
Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code
Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (8)
1. a kind of method for secret protection characterized by comprising
Whether the application program for judging operation is default ecret protection application program;
If the application program of the operation is the default ecret protection application program, it is determined that display circle of the application program
Need to carry out the privacy area of secret protection in face;
Secret protection processing is carried out to the content of the privacy area;
The content to the privacy area carries out secret protection processing, comprising:
Picture is blocked in acquisition, wherein the picture that blocks is the picture blocked for the content to the privacy area;
Picture is blocked described in control to block the content of the privacy area;
After the step of picture is blocked in the acquisition, block described in the control picture to the content of the privacy area into
Before the step of row blocks, the method also includes:
The transparency for blocking picture is adjusted to first object transparency;
Picture is blocked described in the control to block the content of the privacy area, comprising:
Control transparency is that the picture that blocks of the first object transparency blocks the content of the privacy area;
The control transparency be the first object transparency block picture to the content of the privacy area into
After the step of row blocks, the method also includes:
It receives and the first object for blocking picture is operated;
Detect the touch location of the first object operation on the screen of the mobile terminal;
The first object operation is detected to pressure value caused by the screen;
If the pressure value detected is more than or equal to preset pressure threshold value, according to the pressure value that detects and pressure value with
The default corresponding relationship of display area range is determined using the touch location as the pending area of reference position, wherein described
Pending area is the partial region for blocking picture;
The second target clear degree is determined according to the default corresponding relationship of the pressure value and pressure value and transparency that detect;
The transparency of the pending area is adjusted to the second target clear degree.
2. the method as described in claim 1, which is characterized in that the content to the privacy area carries out at secret protection
Reason, comprising:
Identify the background color of the display interface of the application program;
The color of the content of the privacy area is adjusted to match with the background color of the display interface of the application program
Color.
3. method according to claim 1 or 2, which is characterized in that it is described judge operation application program whether be preset it is hidden
Private protection application program, comprising:
The second object run to the display interface is received, if second object run and default triggering carry out secret protection
Operation match, it is determined that the application program of the operation be the default ecret protection application program.
4. a kind of mobile terminal characterized by comprising
Judgment module, for judging whether the application program of operation is default ecret protection application program;
First determining module, if the application program for the operation is the default ecret protection application program, it is determined that institute
State the privacy area for needing to carry out secret protection in the display interface of application program;
Processing module carries out secret protection processing for the content to the privacy area;The processing module includes:
Acquisition submodule, for obtain block picture, wherein it is described block picture be for the content to the privacy area into
The picture that row blocks;
Submodule is blocked, described picture blocked for controlling the content of the privacy area is blocked;
The mobile terminal further include:
The first adjustment module, for adjusting the transparency for blocking picture to first object transparency;
It is described that block submodule to be specifically used for control transparency be that the first object transparency blocks picture to described
The content of privacy area is blocked;
The mobile terminal further include:
Receiving module, for receiving to the first object operation for blocking picture;
First detection module, for detecting the touch location of the first object operation on the screen of the mobile terminal;
Second detection module, for detecting the first object operation to pressure value caused by the screen;
Second determining module, if the pressure value for detecting is more than or equal to preset pressure threshold value, according to what is detected
The default corresponding relationship of pressure value and pressure value and display area range, determine using the touch location as reference position to
Processing region, wherein the pending area is the partial region for blocking picture;
Third determining module, for being determined according to the default corresponding relationship of the pressure value and pressure value and transparency that detect
Second target clear degree;
Second adjustment module, for the transparency of the pending area to be adjusted to the second target clear degree.
5. mobile terminal as claimed in claim 4, which is characterized in that the processing module further include:
Identify submodule, for identification the background color of the display interface of the application program;
Adjusting submodule, for the color of the content of the privacy area to be adjusted to and the display interface of the application program
The color that background color matches.
6. mobile terminal as described in claim 4 or 5, which is characterized in that the judgment module is specifically used for receiving to described
Second object run of display interface, if the operation that second object run carries out secret protection with default triggering matches,
The application program for then determining the operation is the default ecret protection application program.
7. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be described
The secret protection program run on processor realizes such as claim 1 when the secret protection program is executed by the processor
The step of to method for secret protection described in any one of 3.
8. a kind of computer-readable storage medium, which is characterized in that be stored in the computer-readable storage medium hidden
Private protective program, the secret protection program realize privacy as claimed any one in claims 1 to 3 when being executed by processor
The step of guard method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710752511.2A CN107358111B (en) | 2017-08-28 | 2017-08-28 | A kind of method for secret protection and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710752511.2A CN107358111B (en) | 2017-08-28 | 2017-08-28 | A kind of method for secret protection and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107358111A CN107358111A (en) | 2017-11-17 |
CN107358111B true CN107358111B (en) | 2019-11-22 |
Family
ID=60288180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710752511.2A Active CN107358111B (en) | 2017-08-28 | 2017-08-28 | A kind of method for secret protection and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107358111B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110324482A (en) * | 2018-03-31 | 2019-10-11 | 神盾网络安全信息化中心股份有限公司 | A kind of information management-control method of the mobile phone based on face recognition |
CN108563929A (en) * | 2018-04-16 | 2018-09-21 | 深圳市联软科技股份有限公司 | It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium |
CN108563930B (en) * | 2018-04-16 | 2020-09-25 | 深圳市联软科技股份有限公司 | Method, device, medium and system for adding watermark to confidential file |
CN108965982B (en) * | 2018-08-28 | 2020-01-31 | 百度在线网络技术(北京)有限公司 | Video recording method and device, electronic equipment and readable storage medium |
CN110968889A (en) * | 2018-09-30 | 2020-04-07 | 中兴通讯股份有限公司 | Data protection method, equipment, device and computer storage medium |
CN111259421A (en) * | 2020-01-15 | 2020-06-09 | 奇安信科技集团股份有限公司 | Privacy authority anti-disclosure processing method and device, electronic equipment and storage medium |
CN111581664B (en) * | 2020-05-07 | 2023-10-10 | 上海盛付通电子支付服务有限公司 | Information protection method and device |
CN112950443B (en) * | 2021-02-05 | 2023-11-24 | 深圳市镜玩科技有限公司 | Self-adaptive privacy protection method, system, equipment and medium based on image sticker |
CN115240281A (en) * | 2022-09-23 | 2022-10-25 | 平安银行股份有限公司 | Private information display method and device, storage medium and mobile terminal |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462991A (en) * | 2013-09-16 | 2015-03-25 | 中兴通讯股份有限公司 | Method and device for protecting privacy information of mobile terminal |
CN104679387A (en) * | 2015-02-13 | 2015-06-03 | 广东欧珀移动通信有限公司 | Privacy information protection method and terminal |
CN105956486A (en) * | 2016-04-29 | 2016-09-21 | 北京小米移动软件有限公司 | Remote control method and apparatus |
CN106055999A (en) * | 2016-06-10 | 2016-10-26 | 安徽朗格暖通设备有限公司 | Method for protecting privacy of mobile terminal and mobile terminal |
CN106569662A (en) * | 2016-10-31 | 2017-04-19 | 维沃移动通信有限公司 | Display method of application interface and mobile terminal |
CN106778338A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | A kind of method for secret protection and device, mobile terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8527779B1 (en) * | 2010-09-01 | 2013-09-03 | Open Invention Network, Llc | Method and apparatus of performing distributed steganography of a data message |
CN105824693B (en) * | 2015-11-30 | 2019-04-12 | 维沃移动通信有限公司 | A kind of control method that multitask is shown and mobile terminal |
-
2017
- 2017-08-28 CN CN201710752511.2A patent/CN107358111B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462991A (en) * | 2013-09-16 | 2015-03-25 | 中兴通讯股份有限公司 | Method and device for protecting privacy information of mobile terminal |
CN104679387A (en) * | 2015-02-13 | 2015-06-03 | 广东欧珀移动通信有限公司 | Privacy information protection method and terminal |
CN105956486A (en) * | 2016-04-29 | 2016-09-21 | 北京小米移动软件有限公司 | Remote control method and apparatus |
CN106055999A (en) * | 2016-06-10 | 2016-10-26 | 安徽朗格暖通设备有限公司 | Method for protecting privacy of mobile terminal and mobile terminal |
CN106569662A (en) * | 2016-10-31 | 2017-04-19 | 维沃移动通信有限公司 | Display method of application interface and mobile terminal |
CN106778338A (en) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | A kind of method for secret protection and device, mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN107358111A (en) | 2017-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107358111B (en) | A kind of method for secret protection and mobile terminal | |
JP6719011B2 (en) | Implementation of biometrics | |
JP6736686B1 (en) | Implementation of biometrics | |
DK180328B1 (en) | Implementation of biometric authentication | |
US10728499B2 (en) | Electronic apparatus and communication method thereof | |
CN106055195B (en) | A kind of operating method and mobile terminal of file | |
US20170011557A1 (en) | Method for providing augmented reality and virtual reality and electronic device using the same | |
CN106937054B (en) | A kind of take pictures weakening method and the mobile terminal of mobile terminal | |
CN106127076B (en) | A kind of inspection method and mobile terminal of photograph album photo | |
WO2019001152A1 (en) | Photographing method and mobile terminal | |
CN106648382B (en) | A kind of picture browsing method and mobile terminal | |
CN105827816B (en) | A kind of the split screen method and mobile terminal of terminal screen | |
JP2020500344A (en) | Implementation of biometric authentication | |
CN103246476A (en) | Method, device and terminal device for rotating screen contents | |
CN110457963B (en) | Display control method, display control device, mobile terminal and computer-readable storage medium | |
CN105868617B (en) | Application program encryption method and mobile terminal | |
CN106650367A (en) | Private content display method and mobile terminal | |
CN106502545B (en) | A kind of operating method and mobile terminal for sliding control | |
CN107194907B (en) | A kind of screenshot synthetic method and mobile terminal | |
CN106250757B (en) | A kind of control method and mobile terminal of application program | |
CN107480500A (en) | The method and mobile terminal of a kind of face verification | |
CN106713715A (en) | Photographing method and mobile terminal | |
CN107679381A (en) | A kind of announcement information processing method and mobile terminal | |
CN112783388B (en) | Display method, display device and electronic equipment | |
CN106210293A (en) | A kind of information processing method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |