CN107992730A - A kind of screen message guard method and device - Google Patents
A kind of screen message guard method and device Download PDFInfo
- Publication number
- CN107992730A CN107992730A CN201711216959.9A CN201711216959A CN107992730A CN 107992730 A CN107992730 A CN 107992730A CN 201711216959 A CN201711216959 A CN 201711216959A CN 107992730 A CN107992730 A CN 107992730A
- Authority
- CN
- China
- Prior art keywords
- screen message
- targeted customer
- information
- pupil information
- pupil
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/18—Eye characteristics, e.g. of the iris
- G06V40/19—Sensors therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/18—Eye characteristics, e.g. of the iris
- G06V40/197—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Ophthalmology & Optometry (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
This application discloses a kind of screen message guard method and device, the described method includes:Obtain the pupil information in default angular field of view;By iris recognition, judge whether the corresponding user of pupil information is targeted customer, wherein, targeted customer is to possess the user for checking authority to screen message;If it is determined that the corresponding user of pupil information is not targeted customer, then carrying out secret protection to screen message shows.The application, which can avoid not possessing the user for checking authority, peeps screen message, effectively prevents the leakage of screen message, improves the security of screen message.
Description
Technical field
This application involves field of terminal technology, more particularly to a kind of screen message guard method and device.
Background technology
With the development of intelligent terminal technology, intelligent terminal has become article indispensable in people's daily life.
The function of existing intelligent terminal is increasingly abundanter, can check relevant information, etc. with chat communication, receiving and dispatching mail, online.When
User shows when the larger place of flow of the people (for example, market, subway station when) browses information by intelligent terminal on screen
Information can inevitably be peeped by other people to, if the information shown on screen be user privacy information (for example, financial information),
It is likely to result in the leakage of user information.
The content of the invention
The embodiment of the present application provides a kind of screen message guard method and device, is stolen to solve existing screen message
Caused by peeping the problem of user information leakage.
The embodiment of the present application provides a kind of screen message guard method, including:
Obtain the pupil information in default angular field of view;
By iris recognition, judge whether the corresponding user of the pupil information is targeted customer, wherein, the target is used
Family is to possess the user for checking authority to screen message;
If it is determined that the corresponding user of the pupil information is not the targeted customer, then privacy is carried out to the screen message
Protection display.
Alternatively, the method further includes:
If it is determined that the corresponding user of the pupil information is the targeted customer, then by carrying out eye to the pupil information
Dynamic tracking, judges whether the targeted customer watches the screen message attentively;
If it is determined that the targeted customer does not watch the screen message attentively, then carrying out secret protection to the screen message shows
Show.
Alternatively, secret protection is carried out to the screen message to show, including:
The screen message is shown with default display mode;Or,
Determine the privacy information in the screen message, and the privacy information shown with the default display mode,
The default display mode make it that the privacy information in the screen message is protected.
Alternatively, the default display mode includes:Fuzzy display, mess code are shown.
Alternatively, the pupil information in default angular field of view is obtained, including:
The application program for needing to carry out screen message protection is determined as destination application;
When detecting that the destination application starts, the pupil information in the default angular field of view is obtained.
The embodiment of the present application also provides a kind of screen message protective device, including:Acquisition module, processing module and display mould
Block, wherein:
The acquisition module, for obtaining the pupil information in default angular field of view;
The processing module, for by iris recognition, judging whether the corresponding user of the pupil information is that target is used
Family, wherein, the targeted customer is to possess the user for checking authority to screen message;
The display module, for when it is not the targeted customer to determine the corresponding user of the pupil information, to institute
Screen message progress secret protection is stated to show.
Alternatively, the processing unit, is additionally operable to determining that the corresponding user of the pupil information is the targeted customer
When, tracking is moved by carrying out eye to the pupil information, judges whether the targeted customer watches the screen message attentively;
The display unit, is additionally operable to when the definite targeted customer does not watch the screen message attentively, to the screen
Information carries out secret protection and shows.
Alternatively, the display unit is specifically used for:
The screen message is shown with default display mode;Or,
Determine the privacy information in the screen message, and the privacy information shown with the default display mode,
The default display mode make it that the privacy information in the screen message is protected.
Alternatively, the default display mode includes:Fuzzy display, mess code are shown.
Alternatively, described device further includes:Determination unit, wherein:
The determination unit, for the application program for needing to carry out screen message protection to be determined as destination application;
The acquiring unit is specifically used for:When detecting that the destination application starts, the default visual angle is obtained
In the range of pupil information.
The embodiment of the present application also provides a kind of screen message protective device, including:Memory, processor and it is stored in described
It is real when the computer program is performed by the processor on memory and the computer program that can run on the processor
Now the step of method as described above.
The embodiment of the present application also provides a kind of computer-readable recording medium, is stored on the computer-readable recording medium
There is the step of computer program, the computer program realizes method as described above when being executed by processor.
Above-mentioned at least one technical solution that the embodiment of the present application uses can reach following beneficial effect:
By obtaining the pupil information in default angular field of view, and then the corresponding use of pupil information is judged by iris recognition
Whether family is to possess the targeted customer for checking authority to screen message, however, it is determined that the corresponding user of pupil information is not that target is used
Family, then carry out secret protection to screen message and show, screen message is peeped so as to avoid not possessing the user for checking authority,
Effectively prevent the leakage of screen message, improve the security of screen message.
Brief description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen
Schematic description and description please is used to explain the application, does not form the improper restriction to the application.In the accompanying drawings:
Fig. 1 is a kind of flow diagram of screen message guard method provided by the embodiments of the present application;
Fig. 2 is a kind of schematic diagram of screen message guard method provided by the embodiments of the present application;
Fig. 3 is the schematic configuration diagram of a kind of electronic equipment provided by the embodiments of the present application;
Fig. 4 is a kind of structure diagram of screen message protective device provided by the embodiments of the present application.
Embodiment
In order to realize the purpose of the application, the embodiment of the present application provides a kind of screen message guard method, device and terminal
Equipment, the described method includes:Judge that pupil is believed by obtaining the pupil information in default angular field of view, and then by iris recognition
Cease whether corresponding user is to possess the targeted customer for checking authority to screen message, however, it is determined that the corresponding user of pupil information is not
It is targeted customer, then carrying out secret protection to screen message shows, is peeped so as to avoid not possessing the user for checking authority
Screen message, effectively prevents the leakage of screen message, improves the security of screen message.
Technical scheme is clearly and completely retouched with reference to the application specific embodiment and corresponding attached drawing
State.Obviously, the described embodiments are only a part but not all of the embodiments of the present application.Based in the application
Embodiment, those of ordinary skill in the art's all other embodiments obtained without making creative work,
It shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical solution that each embodiment of the application provides is described in detail.
Embodiment 1
Fig. 1 is a kind of flow diagram of screen message guard method provided by the embodiments of the present application.The method can be with
It is as follows.
Step 102:Obtain the pupil information in default angular field of view.
When user browses information by terminal device, if desired the screen message of terminal device screen display is protected
Shield, can start the safe display pattern of terminal device.
It should be noted that user can be by showing the safety in terminal device screen control performs default triggering behaviour
Make, to start the safe display pattern of terminal device, to show come the safety started in terminal device by other predetermined registration operations
Show pattern.
After terminal device detects that safe display pattern starts, start camera, obtain the pupil in default angular field of view
Hole information.
It should be noted that default angular field of view can be the maximum angular field of view of camera or pre-set
Angular field of view, be not specifically limited here.
In the embodiment of the present application, the pupil information in default angular field of view is obtained, including:
The application program for needing to carry out screen message protection is determined as destination application;
When detecting that destination application starts, the pupil information in default angular field of view is obtained.
In practical application, the privacy information of user is included in some application programs in terminal device, for example, Alipay,
Bank app etc., it is destination application that user, which can pre-set the application program for needing to carry out screen message protection,.
When terminal device detects that destination application starts, the safe display pattern of automatic start, opens camera, obtains
Pupil information in default angular field of view.
In order to more neatly meet the demands of individuals of user, terminal device is detecting that destination application starts it
Afterwards, prompted dialog frame is ejected in screen, asks the user whether to start safe display pattern.
If the surrounding environment that user is presently in is safer, for example, in the family of user oneself, user can select not open
Move safe display pattern;
If the surrounding environment that user is presently in is dangerous, for example, when in the larger market of flow of the people, user can select
Select and start safe display pattern, open camera, obtain the pupil information in default angular field of view.
Step 104:By iris recognition, judge whether the corresponding user of pupil information is targeted customer.
Wherein, targeted customer is to possess the user for checking authority to screen message.
After terminal device gets pupil information in default angular field of view, pupil can be judged by iris recognition
Whether the corresponding user of information is to possess the user for checking authority to screen message.
The mandate iris information for possessing the targeted customer for checking authority to screen message is previously stored with terminal device, is led to
Cross iris information in the pupil information for judging to be got in default angular field of view and whether the mandate iris information is consistent, if one
Cause, then the corresponding user of the pupil information is that possess the user for checking authority to screen message;If inconsistent, the pupil information
Corresponding user is not to possess the user for checking authority to screen message.
Check that the targeted customer of authority can be one or multiple it should be noted that possessing to screen message.
Step 106:If it is determined that the corresponding user of pupil information is not targeted customer, then secret protection is carried out to screen message
Display.
Terminal device determines the corresponding user of pupil information got in default angular field of view not by iris recognition
When being targeted customer, expression, which there is currently, not to be possessed the disabled user for checking authority screen message is peeped, terminal device
Secret protection is carried out to screen message to show.
In the embodiment of the present application, secret protection is carried out to screen message and is shown, including:
To preset display mode display screen information;Or,
Determine the privacy information in screen message, and privacy information is shown with default display mode, preset display mode
So that the privacy information in screen message is protected.
In the embodiment of the present application, default display mode includes:Fuzzy display, mess code are shown.
Terminal device, which determines there is currently, not to be possessed when checking that the disabled user of authority peeps screen message, can be with
Screen message is avoided to reveal by obscuring display to screen message or mess code showing;Alternatively,
Terminal device, which determines there is currently, not to be possessed when checking that the disabled user of authority peeps screen message, can be with
Determine the privacy information (for example, data message etc.) in the financial page in screen message, and privacy information is obscured
Display or mess code show so that check that the disabled user of authority is peeping screen message even if not possessing to screen message, also without
Method peeps the privacy information of user.
In order to more neatly meet the demands of individuals of targeted customer, terminal device is checked determining there is currently not possess
When the disabled user of authority peeps screen message, prompted dialog frame can be ejected in screen, prompts targeted customer to work as
Preceding there are other people can view screen message, so that targeted customer checks the safety of surrounding environment in time.
In practical application, the pupil information that terminal device is got in default angular field of view can be one, can also
It is multiple.
When terminal device gets multiple pupil informations, iris recognition is carried out to each pupil information, if the plurality of pupil
, can be to screen message or screen when information corresponding multiple users in hole include not possessing the user for checking authority to screen message
Privacy information in curtain information carries out fuzzy display or mess code is shown.
In order to more neatly meet the demands of individuals of targeted customer, terminal device is determining to obtain in default angular field of view
To the corresponding multiple users of multiple pupil informations include not possessing the user for checking authority to screen message when, can shield
Prompted dialog frame is ejected in curtain, screen message can be viewed by prompting targeted customer to there is currently other people, so that target is used
The safety of surrounding environment is checked at family in time.
In practical application, there may be the demand for needing to share screen message with other people, at this time, targeted customer by targeted customer
Can be by closing the safe display pattern in terminal device, alternatively, typing needs to share with screen message person in terminal device
Iris information, i.e., the person that shares with screen message to the needs carries out screen message and checks mandate.
In the embodiment of the present application, further include:
If it is determined that the corresponding user of pupil information is targeted customer, then tracking is moved by carrying out eye to pupil information, judged
Whether targeted customer watches screen message attentively;
If it is determined that targeted customer does not watch screen message attentively, then carrying out secret protection to screen message shows.
In practical application, targeted customer may have that sight frames out information, at this time, if screen message
Normal display, is easily peeped by disabled user.
Terminal device after the corresponding user of pupil information for determining to get in default angular field of view is targeted customer,
Also need further to move tracking by carrying out eye to the pupil information of targeted customer, judge whether targeted customer watches screen message attentively,
And when definite targeted customer is to watch screen message attentively, fuzzy display is carried out to the privacy information in screen message or screen message
Or mess code is shown, screen message is avoided to be peeped leakage.
In the embodiment of the present application, before screen display screen information is lighted, iris recognition technology and eye can also be moved
Tracer technique is unlocked screen.Specifically, first, by iris recognition technology judge it is current attempt unlock user whether be
Targeted customer;Secondly, if so, then by eye move tracer technique judge it is current attempt unlock user whether be targeted customer two dimension
Image;Finally, if so, then refusing unlocking screen, and alarm, so that before screen display screen information is lighted,
Effectively avoid the unlocking screen of disabled user from operating, prevent screen message from being peeped leakage.
The technical solution that the embodiment of the present application is recorded, by obtaining the pupil information in default angular field of view, and then passes through
Iris recognition judges whether the corresponding user of pupil information is to possess the targeted customer for checking authority to screen message, however, it is determined that pupil
Information corresponding user in hole is not targeted customer, then carrying out secret protection to screen message shows, so as to avoid not possessing
Check that the user of authority peeps screen message, effectively prevent the leakage of screen message, improve the security of screen message.
Embodiment 2
Present invention design is described based on previous embodiment 1 in detail, for the ease of being better understood from the application's
Technical characteristic, means and effect, the screen message guard method to the application below is described further, so as to form the application
Another embodiment.
Screen message protection process protects process phase with screen message described in above-described embodiment 1 in the embodiment of the present invention 2
Seemingly, some other step not made referrals in embodiment 2 may refer to the associated description in embodiment 1, and details are not described herein again.
Fig. 2 is a kind of schematic diagram of screen message guard method provided by the embodiments of the present application.The method can be as follows
It is shown.
Step 201:The iris information for possessing the targeted customer for checking authority to screen message is prestored, and will be needed
The application program for carrying out screen message protection is determined as destination application.
Step 202:When detecting that destination application starts, prompted dialog frame is ejected, asks the user whether to open peace
Full display pattern.
Step 203:After the instruction of the safe display pattern of user's unlatching is received, the pupil in default angular field of view is obtained
Hole information.
Step 204:By iris recognition, judge whether the corresponding user of pupil information is targeted customer.Held if so, redirecting
Row step 205;Step 206 is performed if it is not, redirecting.
Step 205:Tracking is moved by carrying out eye to pupil information, judges whether targeted customer watches screen message attentively, if it is not,
Perform step 206.
Step 206:Fuzzy display is carried out to screen message;Or, the privacy information in definite screen message, and to privacy
Information carries out fuzzy display.
The technical solution that the embodiment of the present application is recorded, by obtaining the pupil information in default angular field of view, and then passes through
Iris recognition judges whether the corresponding user of pupil information is to possess the targeted customer for checking authority to screen message, however, it is determined that pupil
Information corresponding user in hole is not targeted customer, then carrying out secret protection to screen message shows, so as to avoid not possessing
Check that the user of authority peeps screen message, effectively prevent the leakage of screen message, improve the security of screen message.
Embodiment 3
Fig. 3 is the schematic configuration diagram of a kind of electronic equipment provided by the embodiments of the present application.As shown in figure 3, in hardware view,
The electronic equipment includes processor, alternatively further includes internal bus, network interface, memory.Wherein, memory may include
Memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile deposit
Reservoir (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible that it
The required hardware of his business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA
(Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral
Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard
Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always
Line etc..For ease of representing, only represented in Fig. 3 with a four-headed arrow, it is not intended that an only bus or a type of
Bus.
Memory, for storing program.Specifically, program can include program code, and said program code includes calculating
Machine operational order.Memory can include memory and nonvolatile memory, and provide instruction and data to processor.
Processor reads corresponding computer program into memory and then runs from nonvolatile memory, in logical layer
Screen message protective device is formed on face.Processor, performs the program that memory is stored, and specifically for performing following behaviour
Make:
Obtain the pupil information in default angular field of view;
By iris recognition, judge whether the corresponding user of pupil information is targeted customer, wherein, targeted customer is to screen
Curtain information possesses the user for checking authority;
If it is determined that the corresponding user of pupil information is not targeted customer, then carrying out secret protection to screen message shows.
The above-mentioned method performed such as the embodiment of the present application 1 and/or embodiment 2 can be applied in processor, or by
Device is managed to realize.Processor is probably a kind of IC chip, has the disposal ability of signal.During realization, above-mentioned side
Each step of method can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.Above-mentioned place
Reason device can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit
(Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor,
DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate
Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance
Body pipe logical device, discrete hardware components.Can realize or perform disclosed each method in the embodiment of the present application, step and
Logic diagram.General processor can be microprocessor or the processor can also be any conventional processor etc..With reference to
The step of method disclosed in the embodiment of the present application, can be embodied directly in hardware decoding processor and perform completion, or with decoding
Hardware and software module combination in processor perform completion.Software module can be located at random access memory, flash memory, read-only storage
In the storage medium of this area such as device, programmable read only memory or electrically erasable programmable memory, register maturation.Should
The step of storage medium is located at memory, and processor reads the information in memory, the above method is completed with reference to its hardware.
The electronic equipment can also carry out the method for Fig. 1 execution, and realize the function of above-described embodiment 1, the embodiment of the present application
Details are not described herein.
The embodiment of the present application also proposed a kind of computer-readable recording medium, the computer-readable recording medium storage one
A or multiple programs, the one or more program include instruction, which works as is held by the electronic equipment including multiple application programs
During row, the electronic equipment can be made to perform the screen message guard method in embodiment illustrated in fig. 1, and specifically for performing:
Obtain the pupil information in default angular field of view;
By iris recognition, judge whether the corresponding user of pupil information is targeted customer, wherein, targeted customer is to screen
Curtain information possesses the user for checking authority;
If it is determined that the corresponding user of pupil information is not targeted customer, then carrying out secret protection to screen message shows.
Fig. 4 is a kind of structure diagram of screen message protective device provided by the embodiments of the present application.Device 400 includes:
Acquisition module 401, processing module 402 and display module 403, wherein:
Acquisition module 401, for obtaining the pupil information in default angular field of view;
Processing module 402, for by iris recognition, judging whether the corresponding user of pupil information is targeted customer, its
In, targeted customer is to possess the user for checking authority to screen message;
Display module 403, for when the corresponding user of definite pupil information is not targeted customer, being carried out to screen message
Secret protection is shown.
Alternatively, processing unit 402, are additionally operable to when the corresponding user of definite pupil information is targeted customer, by right
Pupil information carries out eye and moves tracking, judges whether targeted customer watches screen message attentively;
Display unit 403, is additionally operable to when definite targeted customer does not watch screen message attentively, and privacy guarantor is carried out to screen message
Shield display.
Alternatively, display unit 403 is specifically used for:
To preset display mode display screen information;Or,
Determine the privacy information in screen message, and privacy information is shown with default display mode, preset display mode
So that the privacy information in screen message is protected.
Alternatively, default display mode includes:Fuzzy display, mess code are shown.
Alternatively, device 400 further includes:Determination unit, wherein:
Determination unit, for the application program for needing to carry out screen message protection to be determined as destination application;
Acquiring unit 401 is specifically used for:When detecting that destination application starts, the pupil in default angular field of view is obtained
Hole information.
According to screen message protective device, acquisition module obtains the pupil information in default angular field of view;Processing module is led to
Iris recognition is crossed, judges whether the corresponding user of pupil information is targeted customer, wherein, targeted customer is to possess to screen message
Check the user of authority;Display module carries out screen message when the corresponding user of definite pupil information is not targeted customer
Secret protection is shown, is peeped screen message so as to avoid not possessing the user for checking authority, is effectively prevented screen message
Leakage, improves the security of screen message.
In the 1990s, the improvement for a technology can clearly distinguish be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And as the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow is programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, its logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without asking chip maker to design and make
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " patrols
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should
This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method flow can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be performed by (micro-) processor can
Read medium, logic gate, switch, application-specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller include but not limited to following microcontroller
Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited
Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with
Pure computer readable program code mode is realized beyond controller, can be made completely by the way that method and step is carried out programming in logic
Controller is obtained in the form of logic gate, switch, application-specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. to come in fact
Existing identical function.Therefore this controller is considered a kind of hardware component, and various to being used for realization for including in it
The device of function can also be considered as the structure in hardware component.Or even, the device for being used for realization various functions can be regarded
For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates, can specifically be realized by computer chip or entity,
Or realized by having the function of certain product.One kind typically realizes that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet PC, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented
The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program
Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or square frame in journey and/or square frame and flowchart and/or the block diagram.These computer programs can be provided
The processors of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices, which produces, to be used in fact
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided and is used for realization in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment it is intrinsic will
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Also there are other identical element in the process of element, method, commodity or equipment.
The application can be described in the general context of computer executable instructions, such as program
Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type
Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environment, by
Task is performed and connected remote processing devices by communication network.In a distributed computing environment, program module can be with
In the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Divide mutually referring to what each embodiment stressed is the difference with other embodiment.It is real especially for system
For applying example, since it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method
Part explanation.
The foregoing is merely embodiments herein, is not limited to the application.For those skilled in the art
For, the application can have various modifications and variations.All any modifications made within spirit herein and principle, be equal
Replace, improve etc., it should be included within the scope of claims hereof.
Claims (12)
- A kind of 1. screen message guard method, it is characterised in that including:Obtain the pupil information in default angular field of view;By iris recognition, judge whether the corresponding user of the pupil information is targeted customer, wherein, the targeted customer is Possesses the user for checking authority to screen message;If it is determined that the corresponding user of the pupil information is not the targeted customer, then secret protection is carried out to the screen message Display.
- 2. the method as described in claim 1, it is characterised in that further include:If it is determined that the corresponding user of the pupil information is the targeted customer, is then moved by carrying out eye to the pupil information and chased after Track, judges whether the targeted customer watches the screen message attentively;If it is determined that the targeted customer does not watch the screen message attentively, then carrying out secret protection to the screen message shows.
- 3. method as claimed in claim 1 or 2, it is characterised in that secret protection is carried out to the screen message and is shown, is wrapped Include:The screen message is shown with default display mode;Or,Determine the privacy information in the screen message, and the privacy information is shown with the default display mode, it is described Default display mode make it that the privacy information in the screen message is protected.
- 4. method as claimed in claim 3, it is characterised in that the default display mode includes:Fuzzy display, mess code are shown Show.
- 5. the method as described in claim 1, it is characterised in that the pupil information in default angular field of view is obtained, including:The application program for needing to carry out screen message protection is determined as destination application;When detecting that the destination application starts, the pupil information in the default angular field of view is obtained.
- A kind of 6. screen message protective device, it is characterised in that including:Acquisition module, processing module and display module, wherein:The acquisition module, for obtaining the pupil information in default angular field of view;The processing module, for by iris recognition, judging whether the corresponding user of the pupil information is targeted customer, its In, the targeted customer is to possess the user for checking authority to screen message;The display module, for when it is not the targeted customer to determine the corresponding user of the pupil information, to the screen Curtain information carries out secret protection and shows.
- 7. device as claimed in claim 6, it is characterised in that the processing unit, is additionally operable in the definite pupil information When corresponding user is the targeted customer, tracking is moved by carrying out eye to the pupil information, judges that the targeted customer is It is no to watch the screen message attentively;The display unit, is additionally operable to when the definite targeted customer does not watch the screen message attentively, to the screen message Secret protection is carried out to show.
- 8. device as claimed in claims 6 or 7, it is characterised in that the display unit is specifically used for:The screen message is shown with default display mode;Or,Determine the privacy information in the screen message, and the privacy information is shown with the default display mode, it is described Default display mode make it that the privacy information in the screen message is protected.
- 9. device as claimed in claim 8, it is characterised in that the default display mode includes:Fuzzy display, mess code are shown Show.
- 10. device as claimed in claim 6, it is characterised in that further include:Determination unit, wherein:The determination unit, for the application program for needing to carry out screen message protection to be determined as destination application;The acquiring unit is specifically used for:When detecting that the destination application starts, the default angular field of view is obtained Interior pupil information.
- A kind of 11. screen message protective device, it is characterised in that including:Memory, processor and it is stored on the memory And the computer program that can be run on the processor, such as right is realized when the computer program is performed by the processor It is required that the step of method any one of 1 to 5.
- 12. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, the step of method as any one of claim 1 to 5 is realized when the computer program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711216959.9A CN107992730A (en) | 2017-11-28 | 2017-11-28 | A kind of screen message guard method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711216959.9A CN107992730A (en) | 2017-11-28 | 2017-11-28 | A kind of screen message guard method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107992730A true CN107992730A (en) | 2018-05-04 |
Family
ID=62033952
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711216959.9A Pending CN107992730A (en) | 2017-11-28 | 2017-11-28 | A kind of screen message guard method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107992730A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109388532A (en) * | 2018-09-26 | 2019-02-26 | Oppo广东移动通信有限公司 | Test method, device, electronic equipment and computer-readable storage medium |
CN109583225A (en) * | 2018-10-25 | 2019-04-05 | 同济大学 | A kind of real-time method for secret protection of the end PC screen and system based on context aware |
CN109858274A (en) * | 2018-12-04 | 2019-06-07 | 上海碳蓝网络科技有限公司 | The method and apparatus that message is shown |
CN110781513A (en) * | 2019-09-17 | 2020-02-11 | 上海掌门科技有限公司 | Information display method and equipment |
CN110866292A (en) * | 2018-08-27 | 2020-03-06 | 阿里巴巴集团控股有限公司 | Interface display method and device, terminal equipment and server |
CN111177770A (en) * | 2018-11-13 | 2020-05-19 | 奇酷互联网络科技(深圳)有限公司 | Protection method of sensitive information, mobile equipment and storage device |
CN111737775A (en) * | 2020-06-23 | 2020-10-02 | 广东小天才科技有限公司 | Privacy peep-proof method and intelligent equipment based on user eyeball tracking |
CN111801700A (en) * | 2019-08-28 | 2020-10-20 | 深圳海付移通科技有限公司 | Method for preventing peeping in payment process and electronic equipment |
CN112069556A (en) * | 2020-09-03 | 2020-12-11 | 西安万像电子科技有限公司 | Screen control method, device and system |
CN112202963A (en) * | 2020-09-29 | 2021-01-08 | 中国银行股份有限公司 | Mobile banking peep-proof screen method and device, storage medium and electronic equipment |
CN112818418A (en) * | 2021-01-20 | 2021-05-18 | 深圳市商汤科技有限公司 | Information security management method and device |
CN113348457A (en) * | 2019-01-22 | 2021-09-03 | 摩根大通国家银行 | Method for protecting privacy on mobile communication device |
CN113821782A (en) * | 2021-11-19 | 2021-12-21 | 深圳市明源云科技有限公司 | Data authority control method and device and computer readable storage medium |
CN116628743A (en) * | 2023-05-22 | 2023-08-22 | 深圳市视景达科技有限公司 | Privacy protection control method and related device thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104123161A (en) * | 2014-07-25 | 2014-10-29 | 西安交通大学 | Screen unlocking and application starting method through human eye watching point |
CN105320871A (en) * | 2015-10-28 | 2016-02-10 | 广东欧珀移动通信有限公司 | Screen unlocking method and screen unlocking apparatus |
CN105550554A (en) * | 2015-07-28 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Anti-peep method and mobile terminal |
-
2017
- 2017-11-28 CN CN201711216959.9A patent/CN107992730A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104123161A (en) * | 2014-07-25 | 2014-10-29 | 西安交通大学 | Screen unlocking and application starting method through human eye watching point |
CN105550554A (en) * | 2015-07-28 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Anti-peep method and mobile terminal |
CN105320871A (en) * | 2015-10-28 | 2016-02-10 | 广东欧珀移动通信有限公司 | Screen unlocking method and screen unlocking apparatus |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110866292A (en) * | 2018-08-27 | 2020-03-06 | 阿里巴巴集团控股有限公司 | Interface display method and device, terminal equipment and server |
CN109388532B (en) * | 2018-09-26 | 2022-10-28 | Oppo广东移动通信有限公司 | Test method, test device, electronic equipment and computer readable storage medium |
CN109388532A (en) * | 2018-09-26 | 2019-02-26 | Oppo广东移动通信有限公司 | Test method, device, electronic equipment and computer-readable storage medium |
CN109583225A (en) * | 2018-10-25 | 2019-04-05 | 同济大学 | A kind of real-time method for secret protection of the end PC screen and system based on context aware |
CN111177770A (en) * | 2018-11-13 | 2020-05-19 | 奇酷互联网络科技(深圳)有限公司 | Protection method of sensitive information, mobile equipment and storage device |
CN111177770B (en) * | 2018-11-13 | 2023-09-01 | 奇酷互联网络科技(深圳)有限公司 | Sensitive information protection method, mobile equipment and storage device |
CN109858274A (en) * | 2018-12-04 | 2019-06-07 | 上海碳蓝网络科技有限公司 | The method and apparatus that message is shown |
CN113348457A (en) * | 2019-01-22 | 2021-09-03 | 摩根大通国家银行 | Method for protecting privacy on mobile communication device |
CN111801700A (en) * | 2019-08-28 | 2020-10-20 | 深圳海付移通科技有限公司 | Method for preventing peeping in payment process and electronic equipment |
CN110781513A (en) * | 2019-09-17 | 2020-02-11 | 上海掌门科技有限公司 | Information display method and equipment |
CN110781513B (en) * | 2019-09-17 | 2024-05-03 | 上海掌门科技有限公司 | Information display method and equipment |
CN111737775A (en) * | 2020-06-23 | 2020-10-02 | 广东小天才科技有限公司 | Privacy peep-proof method and intelligent equipment based on user eyeball tracking |
CN112069556A (en) * | 2020-09-03 | 2020-12-11 | 西安万像电子科技有限公司 | Screen control method, device and system |
CN112202963A (en) * | 2020-09-29 | 2021-01-08 | 中国银行股份有限公司 | Mobile banking peep-proof screen method and device, storage medium and electronic equipment |
CN112818418A (en) * | 2021-01-20 | 2021-05-18 | 深圳市商汤科技有限公司 | Information security management method and device |
CN113821782A (en) * | 2021-11-19 | 2021-12-21 | 深圳市明源云科技有限公司 | Data authority control method and device and computer readable storage medium |
CN116628743A (en) * | 2023-05-22 | 2023-08-22 | 深圳市视景达科技有限公司 | Privacy protection control method and related device thereof |
CN116628743B (en) * | 2023-05-22 | 2024-04-09 | 深圳市视景达科技有限公司 | Privacy protection control method and related device thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107992730A (en) | A kind of screen message guard method and device | |
CN107278313B (en) | Payment means operation support method and electronic device for supporting the same | |
US20200202364A1 (en) | Product anti-counterfeiting verification method, apparatus, and device | |
RU2635224C2 (en) | Method and device for secure sensory input | |
US10331871B2 (en) | Password input interface | |
KR102125159B1 (en) | Security verification method and device for smart card application | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
CN108055132A (en) | The method, apparatus and equipment of a kind of service authorization | |
CN106155720A (en) | A kind of method and system starting function of application | |
EP3239841B1 (en) | Method and device for managing application program | |
CN107632853A (en) | A kind of method for information display and device | |
US10437978B2 (en) | Enhancing security of a mobile device based on location or proximity to another device | |
CN106022077A (en) | Screen unlocking method and terminal | |
CN107479886A (en) | A kind of method for information display and mobile terminal | |
CN107070871A (en) | A kind of method and device of authentication | |
CN107506721A (en) | A kind of more method for collecting iris and system | |
US20180225457A1 (en) | Enhancing security of a mobile device based on location or proximity to another device | |
CN107678834A (en) | A kind of Android simulator detection method and device based on hardware configuration | |
CN115398377A (en) | Gaze-based control | |
CN116156050A (en) | Display method and device | |
CN112435029B (en) | Service processing method and device based on block chain and electronic equipment | |
CN106406632B (en) | A kind of approaches to IM and mobile terminal | |
CN107483534A (en) | A kind of method and device of business processing | |
WO2019196297A1 (en) | User information control method and apparatus, and terminal device and storage medium | |
CN110866292A (en) | Interface display method and device, terminal equipment and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180504 |