CN108595946A - A kind of method and terminal of protection privacy - Google Patents

A kind of method and terminal of protection privacy Download PDF

Info

Publication number
CN108595946A
CN108595946A CN201810269038.7A CN201810269038A CN108595946A CN 108595946 A CN108595946 A CN 108595946A CN 201810269038 A CN201810269038 A CN 201810269038A CN 108595946 A CN108595946 A CN 108595946A
Authority
CN
China
Prior art keywords
interface
terminal
target
password information
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810269038.7A
Other languages
Chinese (zh)
Other versions
CN108595946B (en
Inventor
史振杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810269038.7A priority Critical patent/CN108595946B/en
Publication of CN108595946A publication Critical patent/CN108595946A/en
Application granted granted Critical
Publication of CN108595946B publication Critical patent/CN108595946B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the present invention provides a kind of method and terminal of protection privacy, is applied to field of terminal technology, can solve the problems, such as the privacy leakage of user when terminal unlocking screen.The program includes:In the case where terminal is in screen lock state, which receives target password information input;If target password information meets preset password information; then terminal unlocking screen and display target interface; the target interface is the interface in the interface of terminal in addition to interface to be protected; or the target interface is the interface carried out to interface to be protected after Fuzzy Processing, interface to be protected is the interface that finally shows before terminal locking screen.To in the processing procedure at the interface finally shown before the terminal locking screen when the program is applied particularly to terminal unlocking screen.

Description

A kind of method and terminal of protection privacy
Technical field
The present embodiments relate to field of terminal technology more particularly to a kind of methods and terminal of protection privacy.
Background technology
With the development of the communication technology, the intelligence degree of the terminals such as mobile phone, tablet computer is continuously improved, to meet user Various demands.For example, in some application programs (such as payment application) that user shows terminal in have secret protection Demand.
Wherein, when user's public situation control terminal carries out unlocking screen operation, work(is applied in the operation of terminal display foreground The page of energy program, and the privacy content of user may be included in the page.In this way, the privacy content that terminal is shown may be by it Other people see, are revealed so as to cause the privacy content of user.
Invention content
The embodiment of the present invention provides a kind of method and terminal of protection privacy, and user's is hidden when solving terminal unlocking screen The problem of private leakage.
In order to solve the above-mentioned technical problem, the embodiment of the present invention is realized in:
In a first aspect, the embodiment of the present invention provides a kind of method of protection privacy, this method includes:It is in screen locking in terminal In the case of state, which receives target password information input;If target password information meets preset password information, terminal Lock screen and display target interface are solved, which is the interface in the interface of terminal in addition to interface to be protected, or should Target interface be to interface to be protected carry out Fuzzy Processing after interface, interface to be protected be terminal locking screen before finally show Interface.
Second aspect, the embodiment of the present invention additionally provide a kind of terminal, which includes:Receiving module and display module; Receiving module, in the case where terminal is in screen lock state, receiving target password information input;Display module, if for The target password information that receiving module receives meets preset password information, then solves lock screen and display target interface, target interface For in the interface of terminal in addition to interface to be protected interface or target interface be to interface to be protected carry out Fuzzy Processing after Interface, interface to be protected is the interface that finally shows before terminal locking screen.
The third aspect an embodiment of the present invention provides a kind of terminal, including processor, memory and is stored in the memory Computer program that is upper and can running on the processor, realizes such as first aspect when which is executed by the processor The step of method of the protection privacy.
Fourth aspect, an embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, and the side of the protection privacy as described in second aspect is realized when which is executed by processor The step of method.
It in embodiments of the present invention, can be to finally showing before the terminal locking screen when solving lock screen due to terminal Interface (interface i.e. to be protected) is handled so that waits protecting to remove in the interface of the terminal in the interface shown after terminal unlocking screen The interface except interface is protected, or carries out the interface after Fuzzy Processing to interface to be protected;Therefore, aobvious first after terminal unlocking screen The privacy information of user is not included in the interface shown.It is thus possible to solve the problems, such as that privacy of user leaks when terminal unlocking screen.
Description of the drawings
Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of the method for protection privacy provided in an embodiment of the present invention;
Fig. 3 is a kind of schematic diagram at the interface that terminal is shown provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of hardware architecture diagram of terminal provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
It should be noted that "/" herein indicate or the meaning, for example, A/B can indicate A or B;Herein "and/or" is only a kind of incidence relation of description affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, it can To indicate:Individualism A exists simultaneously A and B, these three situations of individualism B." multiple " refer to two or more.
It should be noted that in the embodiment of the present invention, " illustrative " or " such as " etc. words make example, example for indicating Card or explanation.Be described as in the embodiment of the present invention " illustrative " or " such as " any embodiment or design scheme do not answer It is interpreted than other embodiments or design scheme more preferably or more advantage.Specifically, " illustrative " or " example are used Such as " word is intended to that related notion is presented in specific ways.
The method of protection privacy provided in an embodiment of the present invention, finally shows before user demand is to terminal locking screen Content in interface (being denoted as interface to be protected) carries out in the scene of secret protection, this can not be shown after terminal unlocking screen It protects the privacy content in interface or does not show the full content in the interface to be protected, in the interface to be protected Hold and carries out secret protection.
Terminal in the embodiment of the present invention can be the terminal with operating system.The operating system can be Android (Android) operating system can be ios operating systems, can also be other possible operating systems, the embodiment of the present invention is not Make specific limit.
Below by taking Android operation system as an example, the method for introducing protection privacy provided in an embodiment of the present invention is applied Software environment.
As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming In 1, the framework of Android operation system includes 4 layers, respectively:Application layer, application framework layer, system operation library layer and Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation of the frame in accordance with application program In the case of principle, some application programs are developed based on application framework layer.For example, system setting application, system chat are answered With with system camera application etc. application programs.Third party is arranged application, third party's camera applications and third party's chat application etc. and answers Use program.
System operation library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour All kinds of resources needed for it are provided as system.Android operation system running environment is used to provide software loop for Android operation system Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1 The system architecture of operating system, the software program of the method for protection privacy provided in an embodiment of the present invention is realized in exploitation, to make The method for obtaining the protection privacy can be run based on Android operation system as shown in Figure 1.That is processor or terminal device can In the method for realizing protection privacy provided in an embodiment of the present invention by running the software program in Android operation system.
With reference to protection privacy shown in Fig. 2 method flow chart to protection privacy provided in an embodiment of the present invention Method is described in detail.Wherein, although showing the side of protection privacy provided in an embodiment of the present invention in method flow diagram The logical order of method, but in some cases, it can be with the steps shown or described are performed in an order that is different from the one herein.Example Such as, the method for protection privacy shown in Figure 2 may include S201 and S202:
S201, in the case where terminal is in screen lock state, terminal receive target password information input.
Specifically, above-mentioned input can be the unlock operation of user's solution lock screen, above-mentioned target password information is logical for user Cross the unlock operation input.
Optionally, terminal provided herein of the embodiment of the present invention is in screen lock state, can be that terminal is in display screen locking The state at interface.Wherein, which can prompt the user with the mode of the solution lock screen of terminal, as biological information, The unlocking manners such as character password information, image password information or key passwords information.The biological information can be user Finger print information, face characteristic information or human eye iris feature information etc., the embodiment of the present invention is not construed as limiting this.
Optionally, terminal provided herein of the embodiment of the present invention is in screen lock state, can be that the screen of terminal is in breath Screen state.At this point, the mode of the solution lock screen of terminal can be biological information or key passwords information etc..
It should be noted that in the first application scenarios of the embodiment of the present invention, above-mentioned preset password information can wrap Default unlocking pin information is included, which is used to indicate terminal unlocking screen.
Wherein, it in above-mentioned target password information may include biological information input by user, character password information, figure As encrypted message or key passwords information etc..
Similarly, above-mentioned preset password information may include default biological information, pre- (such as default unlocking pin information) If information such as character password information, pre-set image encrypted message or key passwords information.
Certainly, in above-mentioned default unlocking pin information can also include indicate it is preset unlock operation initial position and/ Or the information of movement locus.
Similarly, it in target password information can also include initial position and/or the fortune for indicating unlock operation input by user The information of dynamic rail mark.
The embodiment of the present invention by taking default unlocking pin information includes default face characteristic information as an example hereinafter, illustrate the present invention The method for the protection privacy that embodiment provides.
Wherein, user unlock operation can in order to control terminal camera movement operation so that terminal can pass through Camera collects the face characteristic information of user, and target password information includes the face characteristic information.
At this point, target password information meets preset password information, i.e. target password information meets default unlocking pin information. The face characteristic information that specially target password information includes meets the letter of the face biological characteristic in default unlocking pin information Breath.
It should be noted that a face characteristic information meets another face characteristic information, the two faces are referred to Similitude between characteristic information is identical or the two face characteristic informations is higher than certain threshold value.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, believes the default unlocking pin of others The description of breath is referred to the above-mentioned associated description to the default unlocking pin information including presetting face characteristic information, this hair It is repeated no more in bright embodiment.
In addition, terminal provided in an embodiment of the present invention can have touch screen and Fingerprint Identification Unit.Above-mentioned user is to terminal The operation (i.e. unlock operation) for inputting target password information can be contact action or fingerprinting operation.Above-mentioned contact action can be with For user, to the pressing operation of the touch screen of terminal, long press operation, slide, clicking operation, suspension procedure, (user is in touch-control Screen near operation) etc. touch control operations;Above-mentioned fingerprinting operation can be sliding fingerprint of the user to the Fingerprint Identification Unit of terminal, length By fingerprint, clicks fingerprint and double-click the fingerprinting operations such as fingerprint.Specifically, not making to the mode of unlock operation in the embodiment of the present invention It limits, can be any achievable mode.
If S202, target password information meet preset password information, terminal unlocking screen and display target interface.
Specifically, above-mentioned target interface can be the interface or above-mentioned in the interface of terminal in addition to interface to be protected Target interface be to interface to be protected carry out Fuzzy Processing after interface, the interface to be protected be terminal locking screen before finally show The interface shown.For example, interface to be protected be terminal locking screen when desktop or front stage operation application program interface.
Wherein, above-mentioned target password information meets preset password information, illustrates the use that operation is currently unlocked to terminal Family has the permission of unlock terminal.
It is understood that the privacy information of user may be included in the interface finally shown before terminal locking screen, i.e., The privacy information of user may be included in interface to be protected.Wherein, the privacy information of user may include that privacy picture, privacy regard Frequently, the application program etc. of privacy text or privacy.Such as, privacy text is the amount of money etc. that can be user account.
Specifically, when full content includes the privacy information of user in interface to be protected, above-mentioned target interface can be with For the interface in the interface of terminal in addition to the interface to be protected;Partial content includes that the privacy of user is believed in interface to be protected When breath, above-mentioned target interface is the interface carried out to interface to be protected after Fuzzy Processing.
Optionally, terminal Fuzzy Processing interface to be protected, can be treat it is interior comprising privacy information in protection interface Hold and carries out the Fuzzy Processings such as mess code processing or setting mosaic.
Illustratively, as shown in figure 3, being a kind of schematic diagram at the interface that terminal is shown provided in an embodiment of the present invention.Fig. 3 Median surface 301 shows that interface is the interface that finally shows before 30 lock-screen of terminal, which is the interface of application program 1. Interface 302 in Fig. 3 is that terminal 30 solves the interface shown first after lock screen, which is the desktop of terminal 30.Obviously, The interface 302 that terminal 30 is shown after solving lock screen is not the interface of application program 1, i.e., does not include in interface 301 in interface 302 Content.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, since terminal can when solving lock screen To handle the interface finally shown before the terminal locking screen (interface i.e. to be protected) so that shown after terminal unlocking screen The interface shown be the terminal interface in interface in addition to interface to be protected, or after carrying out Fuzzy Processing to interface to be protected Interface;Therefore, the privacy information of user is not included in the interface shown first after terminal unlocking screen.It is thus possible to solve end The problem of privacy of user leaks when the solution lock screen of end.
In one possible implementation, second of applied field of the method for protection privacy provided in an embodiment of the present invention Jing Zhong, above-mentioned preset password information may include default unlocking pin information and default additional encrypted message.Additional encrypted message It is used to indicate terminal display target interface after solving lock screen.
It is understood that above-mentioned additional encrypted message can also include default biological information, preset characters password The information such as information, pre-set image encrypted message or key passwords information.It certainly, can be in above-mentioned default additional encrypted message Initial position and/or the movement locus of the operation (be denoted as open privacy operations) of encrypted message are added including instruction user's input Information.
It is emphasized that above-mentioned default unlocking pin information is different with default additional encrypted message.
Illustratively, default additional password information provided in an embodiment of the present invention includes instruction user to volume increasing key The information of double click operation.Similarly, target password information can also include letter of the instruction user to the double click operation of volume increasing key Breath.
It is understood that the unlock operation of the user indicated in above-mentioned target password information and the operation of unlatching privacy can Inputted simultaneously with user or user interval was less than in the period of certain time threshold value to be inputted respectively.
Wherein, in second of application scenarios provided in an embodiment of the present invention, terminal can be in the input for receiving user Target password information when meeting preset password information, the just display target interface first after subsequently solution lock screen.
It should be noted that in second of application scenarios provided in an embodiment of the present invention, the unlock that terminal receives is close Code information meets default unlocking pin information and when the additional encrypted message that receives meets default additional encrypted message, and terminal can With display does not include the target interface of the privacy information of user first after subsequently solution lock screen.And the unlock that terminal receives is close Code information meets default unlocking pin information, and when not receiving additional encrypted message input by user, terminal is subsequently unlocking The interface finally shown before the terminal locking screen is shown after screen first, without handling the interface.Thus can Unnecessary operations when to avoid terminal unlocking screen, and while improving terminal unlocking screen protect the flexibility of privacy of user.
In one possible implementation, above-mentioned interface to be protected is the interface in destination application, at this point, target The application program of front stage operation when application program is terminal locking screen.Specifically, the S202 that above-described embodiment provides can be replaced It is changed to S202a:
If S202a, target password information meet preset password information, and destination application meets default application program, Then terminal unlocking screen and display target interface.
It should be noted that the type of above-mentioned default application program can be chat-type, type of payment or type of play Deng.In addition, the mark of above-mentioned default application program is in default white list.
Wherein, above-mentioned default white list can be that user is arranged by the system setting application in terminal, alternatively, passing through Application setting is arranged in third party in terminal.Wherein, the mark of a default application program can uniquely indicate that this default is answered Use program.
Optionally, above-mentioned default white list can be what terminal from network side obtained, as obtained from server.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, terminal may determine that terminal screen locking screen Curtain when front stage operation application program whether be user demand secret protection application program.So so that terminal is subsequently solving The application program to not needing secret protection is avoided to handle when lock screen, it is inessential when can be to avoid terminal unlocking screen The flexibility of privacy of user is protected when operating, and further increasing terminal unlocking screen.
In one possible implementation, above-mentioned target interface can be the desktop of terminal.Specifically, the present invention is implemented The method for the protection privacy that example provides, can also be including S203 or S203a, alternatively, above-mentioned after above-mentioned S201, before S202 After S201, before S202a can also include S203 or S203a:
S203, terminal close destination application.
Destination application is switched to running background by S203a, terminal.
It is understood that after terminal closes destination application or destination application is switched to running background, Target interface is desktop, do not include in desktop destination application interface in full content.
In addition, above-mentioned target interface can be interface of the interface to be protected after Fuzzy Processing.Specifically, the present invention is real The method that the protection privacy of example offer is provided, after above-mentioned S201, before S202 can also including S203b, alternatively, above-mentioned S201 it Afterwards, can also include S203b before S202a:
S203b terminal Fuzzy Processings interface to be protected.
It is understood that S203, S203a and S203b provided in an embodiment of the present invention can be respectively a kind of processing rule Then.For example, " terminal closing destination application " is denoted as, processing rule 1, " destination application is switched to backstage and transported by terminal Row " is denoted as processing rule 2, and " terminal Fuzzy Processing interface to be protected " is denoted as processing rule 3.
Optionally, terminal can preset the same of application program according to the mark setting of the type and application program of application program When, can also be that each preset processing rule is arranged in default application program.
Optionally, the identical default application program of type corresponds to same processing rule;Alternatively, a default application program A kind of corresponding processing rule.
For example, the default application program of chat-type corresponds to above-mentioned processing rule 2, the default application program pair of type of payment Answer above-mentioned processing rule 3.The default application program for being identified as " A banks " corresponds to above-mentioned processing rule 1.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, since terminal can support user's needle Different application programs is arranged different processing rules, so that can be advance according to user when SS later solution lock screen The processing rule process of the setting program, and the boundary finally shown before the terminal locking screen is being shown after solving lock screen first Face.It is thus possible to protect the flexibility of privacy of user when further increasing terminal unlocking screen.
In one possible implementation, it is provided in an embodiment of the present invention protection privacy method, above-mentioned S201 it After can also include S204:
If S204, target password information meet preset password information, and destination application does not meet default application program, Then terminal unlocking screen and show interface to be protected.
It is understood that above-mentioned destination application does not meet default application program, illustrate the destination application not It is the program of user demand secret protection.
In this way, the method for protection privacy provided in an embodiment of the present invention, the application of front stage operation in terminal locking screen When program is not the program of user demand secret protection, terminal need not be handled the application program, and can unlocked The interface finally shown before the terminal locking screen is shown after screen first.It is thus possible to further increase terminal unlocking screen When protect privacy of user flexibility.
As shown in figure 4, being a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.Terminal 40 shown in Fig. 4 is wrapped It includes:Receiving module 401 and display module 402;Receiving module 401, in the case where terminal 40 is in screen lock state, receiving Target password information input;Display module 402, if the target password information for receiving module 401 to receive meets preset password Information then solves lock screen and display target interface, and target interface is the interface in the interface of terminal 40 in addition to interface to be protected, Or target interface be to interface to be protected carry out Fuzzy Processing after interface, interface to be protected be 40 lock-screen of terminal before most The interface shown afterwards.
Optionally, preset password information includes default unlocking pin information and default additional encrypted message;Wherein, solution is preset Lock cipher information is used to indicate terminal 40 and solves lock screen, and additional encrypted message is used to indicate terminal 40 and shows mesh after solving lock screen It demarcates face.
Optionally, interface to be protected is the interface in destination application;Display module 402, if specifically for receiving mould The target password information that block 401 receives meets preset password information, and destination application meets default application program, then unlocks Screen and display target interface.
Optionally, target interface is the desktop of terminal 40;Terminal 40 further includes:Processing module 403;Processing module 403 is used Before display module 402 solves lock screen and display target interface, destination application is closed, alternatively, by destination application It is switched to running background.
Optionally, display module 402 are additionally operable to after the input that receiving module 401 receives target password information, if target Encrypted message meets preset password information, and destination application does not meet default application program, then terminal 40 solves lock screen simultaneously Show interface to be protected.
Terminal provided in an embodiment of the present invention, due to the terminal when solving lock screen can to before the terminal locking screen most The interface (interface i.e. to be protected) shown afterwards is handled so that the interface shown after terminal unlocking screen is the interface of the terminal In interface in addition to interface to be protected, or the interface after Fuzzy Processing is carried out to interface to be protected;Therefore, terminal unlocking screen The privacy information of user is not included in the interface shown first afterwards.It is thus possible to which privacy of user is let out when solving terminal unlocking screen The problem of leakage.Terminal 30 and terminal 40 provided in an embodiment of the present invention can realize that terminal is realized each in above method embodiment A process, to avoid repeating, which is not described herein again.
Fig. 5 is a kind of hardware architecture diagram of terminal provided in an embodiment of the present invention, which includes but unlimited In:Radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, The components such as user input unit 107, interface unit 108, memory 109, processor 110 and power supply 111.Art technology Personnel are appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 5, terminal may include than illustrate it is more or Less component either combines certain components or different components arrangement.In embodiments of the present invention, terminal includes but not It is limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, user input unit 107, in the case where terminal 100 is in screen lock state, receiving target password letter Breath input;Display unit 106, if the target password information for user input unit 107 to receive meets preset password information, Solve lock screen and display target interface, target interface be terminal 100 interface in interface in addition to interface to be protected or mesh Demarcate face be to interface to be protected carry out Fuzzy Processing after interface, interface to be protected be 100 lock-screen of terminal before finally show The interface shown.
Terminal provided in an embodiment of the present invention, due to the terminal when solving lock screen can to before the terminal locking screen most The interface (interface i.e. to be protected) shown afterwards is handled so that the interface shown after terminal unlocking screen is the interface of the terminal In interface in addition to interface to be protected, or the interface after Fuzzy Processing is carried out to interface to be protected;Therefore, terminal unlocking screen The privacy information of user is not included in the interface shown first afterwards.It is thus possible to which privacy of user is let out when solving terminal unlocking screen The problem of leakage.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 101 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by radio communication system and network and other set Standby communication.
Terminal has provided wireless broadband internet to the user by network module 102 and has accessed, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 103 can receive radio frequency unit 101 or network module 102 or in memory 109 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 100 executes.Sound Frequency output unit 103 includes loud speaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output of mobile communication base station can be sent to via radio frequency unit 101 by being converted in the case of telephone calling model.
Terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjusts the brightness of display panel 1061, and proximity sensor can close display panel when terminal 100 is moved in one's ear 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 105 can be with Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer, Infrared sensor etc., details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 107 include touch panel 1071 and other Input equipment 1072.Touch panel 1071, also referred to as touch screen, collect user on it or neighbouring touch operation (such as User is using any suitable objects or attachment such as finger, stylus on touch panel 1071 or near touch panel 1071 Operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receives processor 110 The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072. Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, switch Button etc.), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touch The type for touching event provides corresponding visual output on display panel 1061.Although in Figure 5, touch panel 1071 and display Panel 1061 is to realize the function that outputs and inputs of terminal as two independent components, but in certain embodiments, can The function that outputs and inputs of terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not limited herein specifically It is fixed.
Interface unit 108 is the interface that external device (ED) is connect with terminal 100.For example, external device (ED) may include it is wired or Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port, For connecting the port of device with identification module, the port audio input/output (I/O), video i/o port, ear port Etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will One or more elements that the input received is transferred in terminal 100 or can be used for terminal 100 and external device (ED) it Between transmission data.
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the software program and/or module being stored in memory 109, and call and be stored in memory 109 Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 110 may include one Or multiple processing units;Preferably, processor 110 can integrate application processor and modem processor, wherein application processing The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage Solution, above-mentioned modem processor can not also be integrated into processor 110.
Terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 can be with It is logically contiguous by power-supply management system and processor 110, to by power-supply management system realize management charging, electric discharge, with And the functions such as power managed.
In addition, terminal 100 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 110, and memory 109 is stored in storage It is real when which is executed by processor 110 on device 109 and the computer program that can be run on the processor 110 Each process of existing above method embodiment, and identical technique effect can be reached, to avoid repeating, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, realizes each process of above method embodiment when which is executed by processor, and can reach identical Technique effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD Deng.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within the protection of the present invention.

Claims (11)

1. a kind of method of protection privacy, which is characterized in that including:
In the case where terminal is in screen lock state, the terminal receives the input of target password information;
If the target password information meets preset password information, the terminal unlocking screen and display target interface, described Target interface be the terminal interface in interface in addition to interface to be protected or the target interface be to wait protecting to described It protects interface and carries out the interface after Fuzzy Processing, the interface to be protected is the interface that finally shows before the terminal locking screen.
2. according to the method described in claim 1, it is characterized in that,
The preset password information includes default unlocking pin information and default additional encrypted message;
Wherein, the default unlocking pin information is used to indicate the terminal unlocking screen, and the default additional encrypted message is used In the instruction terminal target interface is shown after solving lock screen.
3. method according to claim 1 or 2, which is characterized in that the interface to be protected is in destination application Interface;
If the target password information meets preset password information, the terminal unlocking screen and display target interface, including:
If the target password information meets the preset password information, and the destination application meets and default applies journey Sequence, then the terminal show the target interface.
4. according to the method described in claim 3, it is characterized in that, the target interface is the desktop of the terminal;
Before the terminal unlocking screen and display target interface, further include:
The terminal closes the destination application, is transported alternatively, the destination application is switched to backstage by the terminal Row.
5. according to the method described in claim 4, it is characterized in that, the terminal receive target password information input after, Further include:
If the target password information meets the preset password information, and the destination application does not meet described preset and answers With program, then the terminal unlocking screen and the interface to be protected is shown.
6. a kind of terminal, which is characterized in that including:Receiving module and display module;
The receiving module, in the case where terminal is in screen lock state, receiving target password information input;
The display module, if the target password information for the receiving module to receive meets preset password information, Lock screen and display target interface are solved, the target interface is the interface in the interface of the terminal in addition to interface to be protected, Or the target interface is the interface carried out to the interface to be protected after Fuzzy Processing, the interface to be protected is the end The interface finally shown before the lock-screen of end.
7. terminal according to claim 6, which is characterized in that
The preset password information includes default unlocking pin information and default additional encrypted message;
Wherein, the default unlocking pin information is used to indicate the terminal unlocking screen, and the default additional encrypted message is used In the instruction terminal target interface is shown after solving lock screen.
8. the terminal described according to claim 6 or 7, which is characterized in that the interface to be protected is in destination application Interface;
The display module, if the target password information received specifically for the receiving module meets the preset password Information, and the destination application meets default application program, then shows the target interface.
9. terminal according to claim 8, which is characterized in that the target interface is the desktop of the terminal;
The terminal further includes:Processing module;
The processing module closes the intended application before the display module solution lock screen and display target interface Program, alternatively, the destination application is switched to running background.
10. terminal according to claim 9, which is characterized in that
The display module is additionally operable to after the input that the receiving module receives the target password information, if the target Encrypted message meets the preset password information, and the destination application does not meet the default application program, then described Terminal unlocking screen simultaneously shows the interface to be protected.
11. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be at the place The computer program run on reason device is realized when the computer program is executed by the processor as appointed in claim 1 to 5 The step of method of protection privacy described in one.
CN201810269038.7A 2018-03-29 2018-03-29 Privacy protection method and terminal Active CN108595946B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810269038.7A CN108595946B (en) 2018-03-29 2018-03-29 Privacy protection method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810269038.7A CN108595946B (en) 2018-03-29 2018-03-29 Privacy protection method and terminal

Publications (2)

Publication Number Publication Date
CN108595946A true CN108595946A (en) 2018-09-28
CN108595946B CN108595946B (en) 2021-07-06

Family

ID=63624935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810269038.7A Active CN108595946B (en) 2018-03-29 2018-03-29 Privacy protection method and terminal

Country Status (1)

Country Link
CN (1) CN108595946B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109828732A (en) * 2018-12-26 2019-05-31 维沃移动通信有限公司 A kind of display control method and terminal device
CN110781513A (en) * 2019-09-17 2020-02-11 上海掌门科技有限公司 Information display method and equipment
CN111857464A (en) * 2020-06-30 2020-10-30 维沃移动通信有限公司 Information display method and device, electronic equipment and readable storage medium
CN112989292A (en) * 2019-12-17 2021-06-18 中移(成都)信息通信科技有限公司 Interface display method, device and medium
CN113515254A (en) * 2021-07-29 2021-10-19 上海传英信息技术有限公司 Interface display method, terminal and storage medium
CN114218318A (en) * 2022-02-21 2022-03-22 国网山东省电力公司乳山市供电公司 Data processing system and method for electric power big data
CN115022446A (en) * 2021-10-09 2022-09-06 荣耀终端有限公司 User interface management method and terminal equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021350A (en) * 2014-05-13 2014-09-03 小米科技有限责任公司 Privacy-information hiding method and device
CN106529339A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Picture display method, device and terminal
CN106687969A (en) * 2015-10-08 2017-05-17 华为技术有限公司 Method and terminal device for protecting privacy information
CN107563168A (en) * 2017-09-05 2018-01-09 广东欧珀移动通信有限公司 Unlocking method, device and the mobile terminal of mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021350A (en) * 2014-05-13 2014-09-03 小米科技有限责任公司 Privacy-information hiding method and device
CN106687969A (en) * 2015-10-08 2017-05-17 华为技术有限公司 Method and terminal device for protecting privacy information
CN106529339A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Picture display method, device and terminal
CN107563168A (en) * 2017-09-05 2018-01-09 广东欧珀移动通信有限公司 Unlocking method, device and the mobile terminal of mobile terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109828732A (en) * 2018-12-26 2019-05-31 维沃移动通信有限公司 A kind of display control method and terminal device
CN110781513A (en) * 2019-09-17 2020-02-11 上海掌门科技有限公司 Information display method and equipment
CN110781513B (en) * 2019-09-17 2024-05-03 上海掌门科技有限公司 Information display method and equipment
CN112989292A (en) * 2019-12-17 2021-06-18 中移(成都)信息通信科技有限公司 Interface display method, device and medium
CN111857464A (en) * 2020-06-30 2020-10-30 维沃移动通信有限公司 Information display method and device, electronic equipment and readable storage medium
CN113515254A (en) * 2021-07-29 2021-10-19 上海传英信息技术有限公司 Interface display method, terminal and storage medium
CN115022446A (en) * 2021-10-09 2022-09-06 荣耀终端有限公司 User interface management method and terminal equipment
CN114218318A (en) * 2022-02-21 2022-03-22 国网山东省电力公司乳山市供电公司 Data processing system and method for electric power big data

Also Published As

Publication number Publication date
CN108595946B (en) 2021-07-06

Similar Documents

Publication Publication Date Title
CN108595946A (en) A kind of method and terminal of protection privacy
CN110062105A (en) A kind of interface display method and terminal device
CN109857495A (en) A kind of display control method and terminal device
CN108920226A (en) screen recording method and device
CN108573307A (en) A kind of method and terminal of processing neural network model file
CN108391123A (en) A kind of method and terminal generating video
CN110457879A (en) Object displaying method and terminal device
CN110457935A (en) A kind of authority configuring method and terminal device
CN110046013A (en) A kind of interface display method and terminal device
CN108171034A (en) A kind of method and terminal for protecting privacy
CN110007822A (en) A kind of interface display method and terminal device
CN108446338A (en) A kind of method and terminal preserving browsing record
CN110049187A (en) A kind of display methods and terminal device
CN109117054A (en) A kind of display control method and terminal
CN108153460A (en) A kind of icon hiding method and terminal
CN108733993A (en) A kind of method for information display and terminal
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN110232266A (en) A kind of unlocking screen method and terminal device
CN110012151A (en) A kind of information display method and terminal device
CN108600492A (en) A kind of unlocking screen method and terminal
CN109246693A (en) A kind of control method and terminal of application program
CN109815678A (en) A kind of authority configuring method and mobile terminal
CN108848240A (en) A kind of protecting information safety method and terminal
CN109086599A (en) A kind of application program locking method, unlocking method and terminal device
CN109062477A (en) A kind of input method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant