CN107992730A - A kind of screen message guard method and device - Google Patents

A kind of screen message guard method and device Download PDF

Info

Publication number
CN107992730A
CN107992730A CN201711216959.9A CN201711216959A CN107992730A CN 107992730 A CN107992730 A CN 107992730A CN 201711216959 A CN201711216959 A CN 201711216959A CN 107992730 A CN107992730 A CN 107992730A
Authority
CN
China
Prior art keywords
screen message
targeted customer
information
pupil information
pupil
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711216959.9A
Other languages
Chinese (zh)
Inventor
张国庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201711216959.9A priority Critical patent/CN107992730A/en
Publication of CN107992730A publication Critical patent/CN107992730A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • G06V40/19Sensors therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • G06V40/197Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Ophthalmology & Optometry (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

This application discloses a kind of screen message guard method and device, the described method includes:Obtain the pupil information in default angular field of view;By iris recognition, judge whether the corresponding user of pupil information is targeted customer, wherein, targeted customer is to possess the user for checking authority to screen message;If it is determined that the corresponding user of pupil information is not targeted customer, then carrying out secret protection to screen message shows.The application, which can avoid not possessing the user for checking authority, peeps screen message, effectively prevents the leakage of screen message, improves the security of screen message.

Description

A kind of screen message guard method and device
Technical field
This application involves field of terminal technology, more particularly to a kind of screen message guard method and device.
Background technology
With the development of intelligent terminal technology, intelligent terminal has become article indispensable in people's daily life. The function of existing intelligent terminal is increasingly abundanter, can check relevant information, etc. with chat communication, receiving and dispatching mail, online.When User shows when the larger place of flow of the people (for example, market, subway station when) browses information by intelligent terminal on screen Information can inevitably be peeped by other people to, if the information shown on screen be user privacy information (for example, financial information), It is likely to result in the leakage of user information.
The content of the invention
The embodiment of the present application provides a kind of screen message guard method and device, is stolen to solve existing screen message Caused by peeping the problem of user information leakage.
The embodiment of the present application provides a kind of screen message guard method, including:
Obtain the pupil information in default angular field of view;
By iris recognition, judge whether the corresponding user of the pupil information is targeted customer, wherein, the target is used Family is to possess the user for checking authority to screen message;
If it is determined that the corresponding user of the pupil information is not the targeted customer, then privacy is carried out to the screen message Protection display.
Alternatively, the method further includes:
If it is determined that the corresponding user of the pupil information is the targeted customer, then by carrying out eye to the pupil information Dynamic tracking, judges whether the targeted customer watches the screen message attentively;
If it is determined that the targeted customer does not watch the screen message attentively, then carrying out secret protection to the screen message shows Show.
Alternatively, secret protection is carried out to the screen message to show, including:
The screen message is shown with default display mode;Or,
Determine the privacy information in the screen message, and the privacy information shown with the default display mode, The default display mode make it that the privacy information in the screen message is protected.
Alternatively, the default display mode includes:Fuzzy display, mess code are shown.
Alternatively, the pupil information in default angular field of view is obtained, including:
The application program for needing to carry out screen message protection is determined as destination application;
When detecting that the destination application starts, the pupil information in the default angular field of view is obtained.
The embodiment of the present application also provides a kind of screen message protective device, including:Acquisition module, processing module and display mould Block, wherein:
The acquisition module, for obtaining the pupil information in default angular field of view;
The processing module, for by iris recognition, judging whether the corresponding user of the pupil information is that target is used Family, wherein, the targeted customer is to possess the user for checking authority to screen message;
The display module, for when it is not the targeted customer to determine the corresponding user of the pupil information, to institute Screen message progress secret protection is stated to show.
Alternatively, the processing unit, is additionally operable to determining that the corresponding user of the pupil information is the targeted customer When, tracking is moved by carrying out eye to the pupil information, judges whether the targeted customer watches the screen message attentively;
The display unit, is additionally operable to when the definite targeted customer does not watch the screen message attentively, to the screen Information carries out secret protection and shows.
Alternatively, the display unit is specifically used for:
The screen message is shown with default display mode;Or,
Determine the privacy information in the screen message, and the privacy information shown with the default display mode, The default display mode make it that the privacy information in the screen message is protected.
Alternatively, the default display mode includes:Fuzzy display, mess code are shown.
Alternatively, described device further includes:Determination unit, wherein:
The determination unit, for the application program for needing to carry out screen message protection to be determined as destination application;
The acquiring unit is specifically used for:When detecting that the destination application starts, the default visual angle is obtained In the range of pupil information.
The embodiment of the present application also provides a kind of screen message protective device, including:Memory, processor and it is stored in described It is real when the computer program is performed by the processor on memory and the computer program that can run on the processor Now the step of method as described above.
The embodiment of the present application also provides a kind of computer-readable recording medium, is stored on the computer-readable recording medium There is the step of computer program, the computer program realizes method as described above when being executed by processor.
Above-mentioned at least one technical solution that the embodiment of the present application uses can reach following beneficial effect:
By obtaining the pupil information in default angular field of view, and then the corresponding use of pupil information is judged by iris recognition Whether family is to possess the targeted customer for checking authority to screen message, however, it is determined that the corresponding user of pupil information is not that target is used Family, then carry out secret protection to screen message and show, screen message is peeped so as to avoid not possessing the user for checking authority, Effectively prevent the leakage of screen message, improve the security of screen message.
Brief description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen Schematic description and description please is used to explain the application, does not form the improper restriction to the application.In the accompanying drawings:
Fig. 1 is a kind of flow diagram of screen message guard method provided by the embodiments of the present application;
Fig. 2 is a kind of schematic diagram of screen message guard method provided by the embodiments of the present application;
Fig. 3 is the schematic configuration diagram of a kind of electronic equipment provided by the embodiments of the present application;
Fig. 4 is a kind of structure diagram of screen message protective device provided by the embodiments of the present application.
Embodiment
In order to realize the purpose of the application, the embodiment of the present application provides a kind of screen message guard method, device and terminal Equipment, the described method includes:Judge that pupil is believed by obtaining the pupil information in default angular field of view, and then by iris recognition Cease whether corresponding user is to possess the targeted customer for checking authority to screen message, however, it is determined that the corresponding user of pupil information is not It is targeted customer, then carrying out secret protection to screen message shows, is peeped so as to avoid not possessing the user for checking authority Screen message, effectively prevents the leakage of screen message, improves the security of screen message.
Technical scheme is clearly and completely retouched with reference to the application specific embodiment and corresponding attached drawing State.Obviously, the described embodiments are only a part but not all of the embodiments of the present application.Based in the application Embodiment, those of ordinary skill in the art's all other embodiments obtained without making creative work, It shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical solution that each embodiment of the application provides is described in detail.
Embodiment 1
Fig. 1 is a kind of flow diagram of screen message guard method provided by the embodiments of the present application.The method can be with It is as follows.
Step 102:Obtain the pupil information in default angular field of view.
When user browses information by terminal device, if desired the screen message of terminal device screen display is protected Shield, can start the safe display pattern of terminal device.
It should be noted that user can be by showing the safety in terminal device screen control performs default triggering behaviour Make, to start the safe display pattern of terminal device, to show come the safety started in terminal device by other predetermined registration operations Show pattern.
After terminal device detects that safe display pattern starts, start camera, obtain the pupil in default angular field of view Hole information.
It should be noted that default angular field of view can be the maximum angular field of view of camera or pre-set Angular field of view, be not specifically limited here.
In the embodiment of the present application, the pupil information in default angular field of view is obtained, including:
The application program for needing to carry out screen message protection is determined as destination application;
When detecting that destination application starts, the pupil information in default angular field of view is obtained.
In practical application, the privacy information of user is included in some application programs in terminal device, for example, Alipay, Bank app etc., it is destination application that user, which can pre-set the application program for needing to carry out screen message protection,.
When terminal device detects that destination application starts, the safe display pattern of automatic start, opens camera, obtains Pupil information in default angular field of view.
In order to more neatly meet the demands of individuals of user, terminal device is detecting that destination application starts it Afterwards, prompted dialog frame is ejected in screen, asks the user whether to start safe display pattern.
If the surrounding environment that user is presently in is safer, for example, in the family of user oneself, user can select not open Move safe display pattern;
If the surrounding environment that user is presently in is dangerous, for example, when in the larger market of flow of the people, user can select Select and start safe display pattern, open camera, obtain the pupil information in default angular field of view.
Step 104:By iris recognition, judge whether the corresponding user of pupil information is targeted customer.
Wherein, targeted customer is to possess the user for checking authority to screen message.
After terminal device gets pupil information in default angular field of view, pupil can be judged by iris recognition Whether the corresponding user of information is to possess the user for checking authority to screen message.
The mandate iris information for possessing the targeted customer for checking authority to screen message is previously stored with terminal device, is led to Cross iris information in the pupil information for judging to be got in default angular field of view and whether the mandate iris information is consistent, if one Cause, then the corresponding user of the pupil information is that possess the user for checking authority to screen message;If inconsistent, the pupil information Corresponding user is not to possess the user for checking authority to screen message.
Check that the targeted customer of authority can be one or multiple it should be noted that possessing to screen message.
Step 106:If it is determined that the corresponding user of pupil information is not targeted customer, then secret protection is carried out to screen message Display.
Terminal device determines the corresponding user of pupil information got in default angular field of view not by iris recognition When being targeted customer, expression, which there is currently, not to be possessed the disabled user for checking authority screen message is peeped, terminal device Secret protection is carried out to screen message to show.
In the embodiment of the present application, secret protection is carried out to screen message and is shown, including:
To preset display mode display screen information;Or,
Determine the privacy information in screen message, and privacy information is shown with default display mode, preset display mode So that the privacy information in screen message is protected.
In the embodiment of the present application, default display mode includes:Fuzzy display, mess code are shown.
Terminal device, which determines there is currently, not to be possessed when checking that the disabled user of authority peeps screen message, can be with Screen message is avoided to reveal by obscuring display to screen message or mess code showing;Alternatively,
Terminal device, which determines there is currently, not to be possessed when checking that the disabled user of authority peeps screen message, can be with Determine the privacy information (for example, data message etc.) in the financial page in screen message, and privacy information is obscured Display or mess code show so that check that the disabled user of authority is peeping screen message even if not possessing to screen message, also without Method peeps the privacy information of user.
In order to more neatly meet the demands of individuals of targeted customer, terminal device is checked determining there is currently not possess When the disabled user of authority peeps screen message, prompted dialog frame can be ejected in screen, prompts targeted customer to work as Preceding there are other people can view screen message, so that targeted customer checks the safety of surrounding environment in time.
In practical application, the pupil information that terminal device is got in default angular field of view can be one, can also It is multiple.
When terminal device gets multiple pupil informations, iris recognition is carried out to each pupil information, if the plurality of pupil , can be to screen message or screen when information corresponding multiple users in hole include not possessing the user for checking authority to screen message Privacy information in curtain information carries out fuzzy display or mess code is shown.
In order to more neatly meet the demands of individuals of targeted customer, terminal device is determining to obtain in default angular field of view To the corresponding multiple users of multiple pupil informations include not possessing the user for checking authority to screen message when, can shield Prompted dialog frame is ejected in curtain, screen message can be viewed by prompting targeted customer to there is currently other people, so that target is used The safety of surrounding environment is checked at family in time.
In practical application, there may be the demand for needing to share screen message with other people, at this time, targeted customer by targeted customer Can be by closing the safe display pattern in terminal device, alternatively, typing needs to share with screen message person in terminal device Iris information, i.e., the person that shares with screen message to the needs carries out screen message and checks mandate.
In the embodiment of the present application, further include:
If it is determined that the corresponding user of pupil information is targeted customer, then tracking is moved by carrying out eye to pupil information, judged Whether targeted customer watches screen message attentively;
If it is determined that targeted customer does not watch screen message attentively, then carrying out secret protection to screen message shows.
In practical application, targeted customer may have that sight frames out information, at this time, if screen message Normal display, is easily peeped by disabled user.
Terminal device after the corresponding user of pupil information for determining to get in default angular field of view is targeted customer, Also need further to move tracking by carrying out eye to the pupil information of targeted customer, judge whether targeted customer watches screen message attentively, And when definite targeted customer is to watch screen message attentively, fuzzy display is carried out to the privacy information in screen message or screen message Or mess code is shown, screen message is avoided to be peeped leakage.
In the embodiment of the present application, before screen display screen information is lighted, iris recognition technology and eye can also be moved Tracer technique is unlocked screen.Specifically, first, by iris recognition technology judge it is current attempt unlock user whether be Targeted customer;Secondly, if so, then by eye move tracer technique judge it is current attempt unlock user whether be targeted customer two dimension Image;Finally, if so, then refusing unlocking screen, and alarm, so that before screen display screen information is lighted, Effectively avoid the unlocking screen of disabled user from operating, prevent screen message from being peeped leakage.
The technical solution that the embodiment of the present application is recorded, by obtaining the pupil information in default angular field of view, and then passes through Iris recognition judges whether the corresponding user of pupil information is to possess the targeted customer for checking authority to screen message, however, it is determined that pupil Information corresponding user in hole is not targeted customer, then carrying out secret protection to screen message shows, so as to avoid not possessing Check that the user of authority peeps screen message, effectively prevent the leakage of screen message, improve the security of screen message.
Embodiment 2
Present invention design is described based on previous embodiment 1 in detail, for the ease of being better understood from the application's Technical characteristic, means and effect, the screen message guard method to the application below is described further, so as to form the application Another embodiment.
Screen message protection process protects process phase with screen message described in above-described embodiment 1 in the embodiment of the present invention 2 Seemingly, some other step not made referrals in embodiment 2 may refer to the associated description in embodiment 1, and details are not described herein again.
Fig. 2 is a kind of schematic diagram of screen message guard method provided by the embodiments of the present application.The method can be as follows It is shown.
Step 201:The iris information for possessing the targeted customer for checking authority to screen message is prestored, and will be needed The application program for carrying out screen message protection is determined as destination application.
Step 202:When detecting that destination application starts, prompted dialog frame is ejected, asks the user whether to open peace Full display pattern.
Step 203:After the instruction of the safe display pattern of user's unlatching is received, the pupil in default angular field of view is obtained Hole information.
Step 204:By iris recognition, judge whether the corresponding user of pupil information is targeted customer.Held if so, redirecting Row step 205;Step 206 is performed if it is not, redirecting.
Step 205:Tracking is moved by carrying out eye to pupil information, judges whether targeted customer watches screen message attentively, if it is not, Perform step 206.
Step 206:Fuzzy display is carried out to screen message;Or, the privacy information in definite screen message, and to privacy Information carries out fuzzy display.
The technical solution that the embodiment of the present application is recorded, by obtaining the pupil information in default angular field of view, and then passes through Iris recognition judges whether the corresponding user of pupil information is to possess the targeted customer for checking authority to screen message, however, it is determined that pupil Information corresponding user in hole is not targeted customer, then carrying out secret protection to screen message shows, so as to avoid not possessing Check that the user of authority peeps screen message, effectively prevent the leakage of screen message, improve the security of screen message.
Embodiment 3
Fig. 3 is the schematic configuration diagram of a kind of electronic equipment provided by the embodiments of the present application.As shown in figure 3, in hardware view, The electronic equipment includes processor, alternatively further includes internal bus, network interface, memory.Wherein, memory may include Memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile deposit Reservoir (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible that it The required hardware of his business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..For ease of representing, only represented in Fig. 3 with a four-headed arrow, it is not intended that an only bus or a type of Bus.
Memory, for storing program.Specifically, program can include program code, and said program code includes calculating Machine operational order.Memory can include memory and nonvolatile memory, and provide instruction and data to processor.
Processor reads corresponding computer program into memory and then runs from nonvolatile memory, in logical layer Screen message protective device is formed on face.Processor, performs the program that memory is stored, and specifically for performing following behaviour Make:
Obtain the pupil information in default angular field of view;
By iris recognition, judge whether the corresponding user of pupil information is targeted customer, wherein, targeted customer is to screen Curtain information possesses the user for checking authority;
If it is determined that the corresponding user of pupil information is not targeted customer, then carrying out secret protection to screen message shows.
The above-mentioned method performed such as the embodiment of the present application 1 and/or embodiment 2 can be applied in processor, or by Device is managed to realize.Processor is probably a kind of IC chip, has the disposal ability of signal.During realization, above-mentioned side Each step of method can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.Above-mentioned place Reason device can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance Body pipe logical device, discrete hardware components.Can realize or perform disclosed each method in the embodiment of the present application, step and Logic diagram.General processor can be microprocessor or the processor can also be any conventional processor etc..With reference to The step of method disclosed in the embodiment of the present application, can be embodied directly in hardware decoding processor and perform completion, or with decoding Hardware and software module combination in processor perform completion.Software module can be located at random access memory, flash memory, read-only storage In the storage medium of this area such as device, programmable read only memory or electrically erasable programmable memory, register maturation.Should The step of storage medium is located at memory, and processor reads the information in memory, the above method is completed with reference to its hardware.
The electronic equipment can also carry out the method for Fig. 1 execution, and realize the function of above-described embodiment 1, the embodiment of the present application Details are not described herein.
The embodiment of the present application also proposed a kind of computer-readable recording medium, the computer-readable recording medium storage one A or multiple programs, the one or more program include instruction, which works as is held by the electronic equipment including multiple application programs During row, the electronic equipment can be made to perform the screen message guard method in embodiment illustrated in fig. 1, and specifically for performing:
Obtain the pupil information in default angular field of view;
By iris recognition, judge whether the corresponding user of pupil information is targeted customer, wherein, targeted customer is to screen Curtain information possesses the user for checking authority;
If it is determined that the corresponding user of pupil information is not targeted customer, then carrying out secret protection to screen message shows.
Fig. 4 is a kind of structure diagram of screen message protective device provided by the embodiments of the present application.Device 400 includes: Acquisition module 401, processing module 402 and display module 403, wherein:
Acquisition module 401, for obtaining the pupil information in default angular field of view;
Processing module 402, for by iris recognition, judging whether the corresponding user of pupil information is targeted customer, its In, targeted customer is to possess the user for checking authority to screen message;
Display module 403, for when the corresponding user of definite pupil information is not targeted customer, being carried out to screen message Secret protection is shown.
Alternatively, processing unit 402, are additionally operable to when the corresponding user of definite pupil information is targeted customer, by right Pupil information carries out eye and moves tracking, judges whether targeted customer watches screen message attentively;
Display unit 403, is additionally operable to when definite targeted customer does not watch screen message attentively, and privacy guarantor is carried out to screen message Shield display.
Alternatively, display unit 403 is specifically used for:
To preset display mode display screen information;Or,
Determine the privacy information in screen message, and privacy information is shown with default display mode, preset display mode So that the privacy information in screen message is protected.
Alternatively, default display mode includes:Fuzzy display, mess code are shown.
Alternatively, device 400 further includes:Determination unit, wherein:
Determination unit, for the application program for needing to carry out screen message protection to be determined as destination application;
Acquiring unit 401 is specifically used for:When detecting that destination application starts, the pupil in default angular field of view is obtained Hole information.
According to screen message protective device, acquisition module obtains the pupil information in default angular field of view;Processing module is led to Iris recognition is crossed, judges whether the corresponding user of pupil information is targeted customer, wherein, targeted customer is to possess to screen message Check the user of authority;Display module carries out screen message when the corresponding user of definite pupil information is not targeted customer Secret protection is shown, is peeped screen message so as to avoid not possessing the user for checking authority, is effectively prevented screen message Leakage, improves the security of screen message.
In the 1990s, the improvement for a technology can clearly distinguish be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So And as the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow is programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, its logic function determines device programming by user.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without asking chip maker to design and make Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " patrols Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method flow can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing The computer for the computer readable program code (such as software or firmware) that device and storage can be performed by (micro-) processor can Read medium, logic gate, switch, application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller include but not limited to following microcontroller Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with Pure computer readable program code mode is realized beyond controller, can be made completely by the way that method and step is carried out programming in logic Controller is obtained in the form of logic gate, switch, application-specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. to come in fact Existing identical function.Therefore this controller is considered a kind of hardware component, and various to being used for realization for including in it The device of function can also be considered as the structure in hardware component.Or even, the device for being used for realization various functions can be regarded For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates, can specifically be realized by computer chip or entity, Or realized by having the function of certain product.One kind typically realizes that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet PC, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or square frame in journey and/or square frame and flowchart and/or the block diagram.These computer programs can be provided The processors of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices, which produces, to be used in fact The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided and is used for realization in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment it is intrinsic will Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Also there are other identical element in the process of element, method, commodity or equipment.
The application can be described in the general context of computer executable instructions, such as program Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environment, by Task is performed and connected remote processing devices by communication network.In a distributed computing environment, program module can be with In the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment stressed is the difference with other embodiment.It is real especially for system For applying example, since it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
The foregoing is merely embodiments herein, is not limited to the application.For those skilled in the art For, the application can have various modifications and variations.All any modifications made within spirit herein and principle, be equal Replace, improve etc., it should be included within the scope of claims hereof.

Claims (12)

  1. A kind of 1. screen message guard method, it is characterised in that including:
    Obtain the pupil information in default angular field of view;
    By iris recognition, judge whether the corresponding user of the pupil information is targeted customer, wherein, the targeted customer is Possesses the user for checking authority to screen message;
    If it is determined that the corresponding user of the pupil information is not the targeted customer, then secret protection is carried out to the screen message Display.
  2. 2. the method as described in claim 1, it is characterised in that further include:
    If it is determined that the corresponding user of the pupil information is the targeted customer, is then moved by carrying out eye to the pupil information and chased after Track, judges whether the targeted customer watches the screen message attentively;
    If it is determined that the targeted customer does not watch the screen message attentively, then carrying out secret protection to the screen message shows.
  3. 3. method as claimed in claim 1 or 2, it is characterised in that secret protection is carried out to the screen message and is shown, is wrapped Include:
    The screen message is shown with default display mode;Or,
    Determine the privacy information in the screen message, and the privacy information is shown with the default display mode, it is described Default display mode make it that the privacy information in the screen message is protected.
  4. 4. method as claimed in claim 3, it is characterised in that the default display mode includes:Fuzzy display, mess code are shown Show.
  5. 5. the method as described in claim 1, it is characterised in that the pupil information in default angular field of view is obtained, including:
    The application program for needing to carry out screen message protection is determined as destination application;
    When detecting that the destination application starts, the pupil information in the default angular field of view is obtained.
  6. A kind of 6. screen message protective device, it is characterised in that including:Acquisition module, processing module and display module, wherein:
    The acquisition module, for obtaining the pupil information in default angular field of view;
    The processing module, for by iris recognition, judging whether the corresponding user of the pupil information is targeted customer, its In, the targeted customer is to possess the user for checking authority to screen message;
    The display module, for when it is not the targeted customer to determine the corresponding user of the pupil information, to the screen Curtain information carries out secret protection and shows.
  7. 7. device as claimed in claim 6, it is characterised in that the processing unit, is additionally operable in the definite pupil information When corresponding user is the targeted customer, tracking is moved by carrying out eye to the pupil information, judges that the targeted customer is It is no to watch the screen message attentively;
    The display unit, is additionally operable to when the definite targeted customer does not watch the screen message attentively, to the screen message Secret protection is carried out to show.
  8. 8. device as claimed in claims 6 or 7, it is characterised in that the display unit is specifically used for:
    The screen message is shown with default display mode;Or,
    Determine the privacy information in the screen message, and the privacy information is shown with the default display mode, it is described Default display mode make it that the privacy information in the screen message is protected.
  9. 9. device as claimed in claim 8, it is characterised in that the default display mode includes:Fuzzy display, mess code are shown Show.
  10. 10. device as claimed in claim 6, it is characterised in that further include:Determination unit, wherein:
    The determination unit, for the application program for needing to carry out screen message protection to be determined as destination application;
    The acquiring unit is specifically used for:When detecting that the destination application starts, the default angular field of view is obtained Interior pupil information.
  11. A kind of 11. screen message protective device, it is characterised in that including:Memory, processor and it is stored on the memory And the computer program that can be run on the processor, such as right is realized when the computer program is performed by the processor It is required that the step of method any one of 1 to 5.
  12. 12. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, the step of method as any one of claim 1 to 5 is realized when the computer program is executed by processor.
CN201711216959.9A 2017-11-28 2017-11-28 A kind of screen message guard method and device Pending CN107992730A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711216959.9A CN107992730A (en) 2017-11-28 2017-11-28 A kind of screen message guard method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711216959.9A CN107992730A (en) 2017-11-28 2017-11-28 A kind of screen message guard method and device

Publications (1)

Publication Number Publication Date
CN107992730A true CN107992730A (en) 2018-05-04

Family

ID=62033952

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711216959.9A Pending CN107992730A (en) 2017-11-28 2017-11-28 A kind of screen message guard method and device

Country Status (1)

Country Link
CN (1) CN107992730A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109388532A (en) * 2018-09-26 2019-02-26 Oppo广东移动通信有限公司 Test method, device, electronic equipment and computer-readable storage medium
CN109583225A (en) * 2018-10-25 2019-04-05 同济大学 A kind of real-time method for secret protection of the end PC screen and system based on context aware
CN109858274A (en) * 2018-12-04 2019-06-07 上海碳蓝网络科技有限公司 The method and apparatus that message is shown
CN110781513A (en) * 2019-09-17 2020-02-11 上海掌门科技有限公司 Information display method and equipment
CN110866292A (en) * 2018-08-27 2020-03-06 阿里巴巴集团控股有限公司 Interface display method and device, terminal equipment and server
CN111177770A (en) * 2018-11-13 2020-05-19 奇酷互联网络科技(深圳)有限公司 Protection method of sensitive information, mobile equipment and storage device
CN111737775A (en) * 2020-06-23 2020-10-02 广东小天才科技有限公司 Privacy peep-proof method and intelligent equipment based on user eyeball tracking
CN111801700A (en) * 2019-08-28 2020-10-20 深圳海付移通科技有限公司 Method for preventing peeping in payment process and electronic equipment
CN112069556A (en) * 2020-09-03 2020-12-11 西安万像电子科技有限公司 Screen control method, device and system
CN112202963A (en) * 2020-09-29 2021-01-08 中国银行股份有限公司 Mobile banking peep-proof screen method and device, storage medium and electronic equipment
CN112818418A (en) * 2021-01-20 2021-05-18 深圳市商汤科技有限公司 Information security management method and device
CN113348457A (en) * 2019-01-22 2021-09-03 摩根大通国家银行 Method for protecting privacy on mobile communication device
CN113821782A (en) * 2021-11-19 2021-12-21 深圳市明源云科技有限公司 Data authority control method and device and computer readable storage medium
CN116628743A (en) * 2023-05-22 2023-08-22 深圳市视景达科技有限公司 Privacy protection control method and related device thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104123161A (en) * 2014-07-25 2014-10-29 西安交通大学 Screen unlocking and application starting method through human eye watching point
CN105320871A (en) * 2015-10-28 2016-02-10 广东欧珀移动通信有限公司 Screen unlocking method and screen unlocking apparatus
CN105550554A (en) * 2015-07-28 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Anti-peep method and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104123161A (en) * 2014-07-25 2014-10-29 西安交通大学 Screen unlocking and application starting method through human eye watching point
CN105550554A (en) * 2015-07-28 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Anti-peep method and mobile terminal
CN105320871A (en) * 2015-10-28 2016-02-10 广东欧珀移动通信有限公司 Screen unlocking method and screen unlocking apparatus

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866292A (en) * 2018-08-27 2020-03-06 阿里巴巴集团控股有限公司 Interface display method and device, terminal equipment and server
CN109388532B (en) * 2018-09-26 2022-10-28 Oppo广东移动通信有限公司 Test method, test device, electronic equipment and computer readable storage medium
CN109388532A (en) * 2018-09-26 2019-02-26 Oppo广东移动通信有限公司 Test method, device, electronic equipment and computer-readable storage medium
CN109583225A (en) * 2018-10-25 2019-04-05 同济大学 A kind of real-time method for secret protection of the end PC screen and system based on context aware
CN111177770A (en) * 2018-11-13 2020-05-19 奇酷互联网络科技(深圳)有限公司 Protection method of sensitive information, mobile equipment and storage device
CN111177770B (en) * 2018-11-13 2023-09-01 奇酷互联网络科技(深圳)有限公司 Sensitive information protection method, mobile equipment and storage device
CN109858274A (en) * 2018-12-04 2019-06-07 上海碳蓝网络科技有限公司 The method and apparatus that message is shown
CN113348457A (en) * 2019-01-22 2021-09-03 摩根大通国家银行 Method for protecting privacy on mobile communication device
CN111801700A (en) * 2019-08-28 2020-10-20 深圳海付移通科技有限公司 Method for preventing peeping in payment process and electronic equipment
CN110781513A (en) * 2019-09-17 2020-02-11 上海掌门科技有限公司 Information display method and equipment
CN110781513B (en) * 2019-09-17 2024-05-03 上海掌门科技有限公司 Information display method and equipment
CN111737775A (en) * 2020-06-23 2020-10-02 广东小天才科技有限公司 Privacy peep-proof method and intelligent equipment based on user eyeball tracking
CN112069556A (en) * 2020-09-03 2020-12-11 西安万像电子科技有限公司 Screen control method, device and system
CN112202963A (en) * 2020-09-29 2021-01-08 中国银行股份有限公司 Mobile banking peep-proof screen method and device, storage medium and electronic equipment
CN112818418A (en) * 2021-01-20 2021-05-18 深圳市商汤科技有限公司 Information security management method and device
CN113821782A (en) * 2021-11-19 2021-12-21 深圳市明源云科技有限公司 Data authority control method and device and computer readable storage medium
CN116628743A (en) * 2023-05-22 2023-08-22 深圳市视景达科技有限公司 Privacy protection control method and related device thereof
CN116628743B (en) * 2023-05-22 2024-04-09 深圳市视景达科技有限公司 Privacy protection control method and related device thereof

Similar Documents

Publication Publication Date Title
CN107992730A (en) A kind of screen message guard method and device
CN107278313B (en) Payment means operation support method and electronic device for supporting the same
US20200202364A1 (en) Product anti-counterfeiting verification method, apparatus, and device
RU2635224C2 (en) Method and device for secure sensory input
US10331871B2 (en) Password input interface
KR102125159B1 (en) Security verification method and device for smart card application
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN108055132A (en) The method, apparatus and equipment of a kind of service authorization
CN106155720A (en) A kind of method and system starting function of application
EP3239841B1 (en) Method and device for managing application program
CN107632853A (en) A kind of method for information display and device
US10437978B2 (en) Enhancing security of a mobile device based on location or proximity to another device
CN106022077A (en) Screen unlocking method and terminal
CN107479886A (en) A kind of method for information display and mobile terminal
CN107070871A (en) A kind of method and device of authentication
CN107506721A (en) A kind of more method for collecting iris and system
US20180225457A1 (en) Enhancing security of a mobile device based on location or proximity to another device
CN107678834A (en) A kind of Android simulator detection method and device based on hardware configuration
CN115398377A (en) Gaze-based control
CN116156050A (en) Display method and device
CN112435029B (en) Service processing method and device based on block chain and electronic equipment
CN106406632B (en) A kind of approaches to IM and mobile terminal
CN107483534A (en) A kind of method and device of business processing
WO2019196297A1 (en) User information control method and apparatus, and terminal device and storage medium
CN110866292A (en) Interface display method and device, terminal equipment and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180504