CN108595946A - A kind of method and terminal of protection privacy - Google Patents
A kind of method and terminal of protection privacy Download PDFInfo
- Publication number
- CN108595946A CN108595946A CN201810269038.7A CN201810269038A CN108595946A CN 108595946 A CN108595946 A CN 108595946A CN 201810269038 A CN201810269038 A CN 201810269038A CN 108595946 A CN108595946 A CN 108595946A
- Authority
- CN
- China
- Prior art keywords
- interface
- terminal
- target
- password information
- screen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the present invention provides a kind of method and terminal of protection privacy, is applied to field of terminal technology, can solve the problems, such as the privacy leakage of user when terminal unlocking screen.The program includes:In the case where terminal is in screen lock state, which receives target password information input;If target password information meets preset password information; then terminal unlocking screen and display target interface; the target interface is the interface in the interface of terminal in addition to interface to be protected; or the target interface is the interface carried out to interface to be protected after Fuzzy Processing, interface to be protected is the interface that finally shows before terminal locking screen.To in the processing procedure at the interface finally shown before the terminal locking screen when the program is applied particularly to terminal unlocking screen.
Description
Technical field
The present embodiments relate to field of terminal technology more particularly to a kind of methods and terminal of protection privacy.
Background technology
With the development of the communication technology, the intelligence degree of the terminals such as mobile phone, tablet computer is continuously improved, to meet user
Various demands.For example, in some application programs (such as payment application) that user shows terminal in have secret protection
Demand.
Wherein, when user's public situation control terminal carries out unlocking screen operation, work(is applied in the operation of terminal display foreground
The page of energy program, and the privacy content of user may be included in the page.In this way, the privacy content that terminal is shown may be by it
Other people see, are revealed so as to cause the privacy content of user.
Invention content
The embodiment of the present invention provides a kind of method and terminal of protection privacy, and user's is hidden when solving terminal unlocking screen
The problem of private leakage.
In order to solve the above-mentioned technical problem, the embodiment of the present invention is realized in:
In a first aspect, the embodiment of the present invention provides a kind of method of protection privacy, this method includes:It is in screen locking in terminal
In the case of state, which receives target password information input;If target password information meets preset password information, terminal
Lock screen and display target interface are solved, which is the interface in the interface of terminal in addition to interface to be protected, or should
Target interface be to interface to be protected carry out Fuzzy Processing after interface, interface to be protected be terminal locking screen before finally show
Interface.
Second aspect, the embodiment of the present invention additionally provide a kind of terminal, which includes:Receiving module and display module;
Receiving module, in the case where terminal is in screen lock state, receiving target password information input;Display module, if for
The target password information that receiving module receives meets preset password information, then solves lock screen and display target interface, target interface
For in the interface of terminal in addition to interface to be protected interface or target interface be to interface to be protected carry out Fuzzy Processing after
Interface, interface to be protected is the interface that finally shows before terminal locking screen.
The third aspect an embodiment of the present invention provides a kind of terminal, including processor, memory and is stored in the memory
Computer program that is upper and can running on the processor, realizes such as first aspect when which is executed by the processor
The step of method of the protection privacy.
Fourth aspect, an embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage mediums
Computer program is stored in matter, and the side of the protection privacy as described in second aspect is realized when which is executed by processor
The step of method.
It in embodiments of the present invention, can be to finally showing before the terminal locking screen when solving lock screen due to terminal
Interface (interface i.e. to be protected) is handled so that waits protecting to remove in the interface of the terminal in the interface shown after terminal unlocking screen
The interface except interface is protected, or carries out the interface after Fuzzy Processing to interface to be protected;Therefore, aobvious first after terminal unlocking screen
The privacy information of user is not included in the interface shown.It is thus possible to solve the problems, such as that privacy of user leaks when terminal unlocking screen.
Description of the drawings
Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of the method for protection privacy provided in an embodiment of the present invention;
Fig. 3 is a kind of schematic diagram at the interface that terminal is shown provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of hardware architecture diagram of terminal provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
It should be noted that "/" herein indicate or the meaning, for example, A/B can indicate A or B;Herein
"and/or" is only a kind of incidence relation of description affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, it can
To indicate:Individualism A exists simultaneously A and B, these three situations of individualism B." multiple " refer to two or more.
It should be noted that in the embodiment of the present invention, " illustrative " or " such as " etc. words make example, example for indicating
Card or explanation.Be described as in the embodiment of the present invention " illustrative " or " such as " any embodiment or design scheme do not answer
It is interpreted than other embodiments or design scheme more preferably or more advantage.Specifically, " illustrative " or " example are used
Such as " word is intended to that related notion is presented in specific ways.
The method of protection privacy provided in an embodiment of the present invention, finally shows before user demand is to terminal locking screen
Content in interface (being denoted as interface to be protected) carries out in the scene of secret protection, this can not be shown after terminal unlocking screen
It protects the privacy content in interface or does not show the full content in the interface to be protected, in the interface to be protected
Hold and carries out secret protection.
Terminal in the embodiment of the present invention can be the terminal with operating system.The operating system can be Android
(Android) operating system can be ios operating systems, can also be other possible operating systems, the embodiment of the present invention is not
Make specific limit.
Below by taking Android operation system as an example, the method for introducing protection privacy provided in an embodiment of the present invention is applied
Software environment.
As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming
In 1, the framework of Android operation system includes 4 layers, respectively:Application layer, application framework layer, system operation library layer and
Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system
Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation of the frame in accordance with application program
In the case of principle, some application programs are developed based on application framework layer.For example, system setting application, system chat are answered
With with system camera application etc. application programs.Third party is arranged application, third party's camera applications and third party's chat application etc. and answers
Use program.
System operation library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour
All kinds of resources needed for it are provided as system.Android operation system running environment is used to provide software loop for Android operation system
Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior
Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1
The system architecture of operating system, the software program of the method for protection privacy provided in an embodiment of the present invention is realized in exploitation, to make
The method for obtaining the protection privacy can be run based on Android operation system as shown in Figure 1.That is processor or terminal device can
In the method for realizing protection privacy provided in an embodiment of the present invention by running the software program in Android operation system.
With reference to protection privacy shown in Fig. 2 method flow chart to protection privacy provided in an embodiment of the present invention
Method is described in detail.Wherein, although showing the side of protection privacy provided in an embodiment of the present invention in method flow diagram
The logical order of method, but in some cases, it can be with the steps shown or described are performed in an order that is different from the one herein.Example
Such as, the method for protection privacy shown in Figure 2 may include S201 and S202:
S201, in the case where terminal is in screen lock state, terminal receive target password information input.
Specifically, above-mentioned input can be the unlock operation of user's solution lock screen, above-mentioned target password information is logical for user
Cross the unlock operation input.
Optionally, terminal provided herein of the embodiment of the present invention is in screen lock state, can be that terminal is in display screen locking
The state at interface.Wherein, which can prompt the user with the mode of the solution lock screen of terminal, as biological information,
The unlocking manners such as character password information, image password information or key passwords information.The biological information can be user
Finger print information, face characteristic information or human eye iris feature information etc., the embodiment of the present invention is not construed as limiting this.
Optionally, terminal provided herein of the embodiment of the present invention is in screen lock state, can be that the screen of terminal is in breath
Screen state.At this point, the mode of the solution lock screen of terminal can be biological information or key passwords information etc..
It should be noted that in the first application scenarios of the embodiment of the present invention, above-mentioned preset password information can wrap
Default unlocking pin information is included, which is used to indicate terminal unlocking screen.
Wherein, it in above-mentioned target password information may include biological information input by user, character password information, figure
As encrypted message or key passwords information etc..
Similarly, above-mentioned preset password information may include default biological information, pre- (such as default unlocking pin information)
If information such as character password information, pre-set image encrypted message or key passwords information.
Certainly, in above-mentioned default unlocking pin information can also include indicate it is preset unlock operation initial position and/
Or the information of movement locus.
Similarly, it in target password information can also include initial position and/or the fortune for indicating unlock operation input by user
The information of dynamic rail mark.
The embodiment of the present invention by taking default unlocking pin information includes default face characteristic information as an example hereinafter, illustrate the present invention
The method for the protection privacy that embodiment provides.
Wherein, user unlock operation can in order to control terminal camera movement operation so that terminal can pass through
Camera collects the face characteristic information of user, and target password information includes the face characteristic information.
At this point, target password information meets preset password information, i.e. target password information meets default unlocking pin information.
The face characteristic information that specially target password information includes meets the letter of the face biological characteristic in default unlocking pin information
Breath.
It should be noted that a face characteristic information meets another face characteristic information, the two faces are referred to
Similitude between characteristic information is identical or the two face characteristic informations is higher than certain threshold value.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, believes the default unlocking pin of others
The description of breath is referred to the above-mentioned associated description to the default unlocking pin information including presetting face characteristic information, this hair
It is repeated no more in bright embodiment.
In addition, terminal provided in an embodiment of the present invention can have touch screen and Fingerprint Identification Unit.Above-mentioned user is to terminal
The operation (i.e. unlock operation) for inputting target password information can be contact action or fingerprinting operation.Above-mentioned contact action can be with
For user, to the pressing operation of the touch screen of terminal, long press operation, slide, clicking operation, suspension procedure, (user is in touch-control
Screen near operation) etc. touch control operations;Above-mentioned fingerprinting operation can be sliding fingerprint of the user to the Fingerprint Identification Unit of terminal, length
By fingerprint, clicks fingerprint and double-click the fingerprinting operations such as fingerprint.Specifically, not making to the mode of unlock operation in the embodiment of the present invention
It limits, can be any achievable mode.
If S202, target password information meet preset password information, terminal unlocking screen and display target interface.
Specifically, above-mentioned target interface can be the interface or above-mentioned in the interface of terminal in addition to interface to be protected
Target interface be to interface to be protected carry out Fuzzy Processing after interface, the interface to be protected be terminal locking screen before finally show
The interface shown.For example, interface to be protected be terminal locking screen when desktop or front stage operation application program interface.
Wherein, above-mentioned target password information meets preset password information, illustrates the use that operation is currently unlocked to terminal
Family has the permission of unlock terminal.
It is understood that the privacy information of user may be included in the interface finally shown before terminal locking screen, i.e.,
The privacy information of user may be included in interface to be protected.Wherein, the privacy information of user may include that privacy picture, privacy regard
Frequently, the application program etc. of privacy text or privacy.Such as, privacy text is the amount of money etc. that can be user account.
Specifically, when full content includes the privacy information of user in interface to be protected, above-mentioned target interface can be with
For the interface in the interface of terminal in addition to the interface to be protected;Partial content includes that the privacy of user is believed in interface to be protected
When breath, above-mentioned target interface is the interface carried out to interface to be protected after Fuzzy Processing.
Optionally, terminal Fuzzy Processing interface to be protected, can be treat it is interior comprising privacy information in protection interface
Hold and carries out the Fuzzy Processings such as mess code processing or setting mosaic.
Illustratively, as shown in figure 3, being a kind of schematic diagram at the interface that terminal is shown provided in an embodiment of the present invention.Fig. 3
Median surface 301 shows that interface is the interface that finally shows before 30 lock-screen of terminal, which is the interface of application program 1.
Interface 302 in Fig. 3 is that terminal 30 solves the interface shown first after lock screen, which is the desktop of terminal 30.Obviously,
The interface 302 that terminal 30 is shown after solving lock screen is not the interface of application program 1, i.e., does not include in interface 301 in interface 302
Content.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, since terminal can when solving lock screen
To handle the interface finally shown before the terminal locking screen (interface i.e. to be protected) so that shown after terminal unlocking screen
The interface shown be the terminal interface in interface in addition to interface to be protected, or after carrying out Fuzzy Processing to interface to be protected
Interface;Therefore, the privacy information of user is not included in the interface shown first after terminal unlocking screen.It is thus possible to solve end
The problem of privacy of user leaks when the solution lock screen of end.
In one possible implementation, second of applied field of the method for protection privacy provided in an embodiment of the present invention
Jing Zhong, above-mentioned preset password information may include default unlocking pin information and default additional encrypted message.Additional encrypted message
It is used to indicate terminal display target interface after solving lock screen.
It is understood that above-mentioned additional encrypted message can also include default biological information, preset characters password
The information such as information, pre-set image encrypted message or key passwords information.It certainly, can be in above-mentioned default additional encrypted message
Initial position and/or the movement locus of the operation (be denoted as open privacy operations) of encrypted message are added including instruction user's input
Information.
It is emphasized that above-mentioned default unlocking pin information is different with default additional encrypted message.
Illustratively, default additional password information provided in an embodiment of the present invention includes instruction user to volume increasing key
The information of double click operation.Similarly, target password information can also include letter of the instruction user to the double click operation of volume increasing key
Breath.
It is understood that the unlock operation of the user indicated in above-mentioned target password information and the operation of unlatching privacy can
Inputted simultaneously with user or user interval was less than in the period of certain time threshold value to be inputted respectively.
Wherein, in second of application scenarios provided in an embodiment of the present invention, terminal can be in the input for receiving user
Target password information when meeting preset password information, the just display target interface first after subsequently solution lock screen.
It should be noted that in second of application scenarios provided in an embodiment of the present invention, the unlock that terminal receives is close
Code information meets default unlocking pin information and when the additional encrypted message that receives meets default additional encrypted message, and terminal can
With display does not include the target interface of the privacy information of user first after subsequently solution lock screen.And the unlock that terminal receives is close
Code information meets default unlocking pin information, and when not receiving additional encrypted message input by user, terminal is subsequently unlocking
The interface finally shown before the terminal locking screen is shown after screen first, without handling the interface.Thus can
Unnecessary operations when to avoid terminal unlocking screen, and while improving terminal unlocking screen protect the flexibility of privacy of user.
In one possible implementation, above-mentioned interface to be protected is the interface in destination application, at this point, target
The application program of front stage operation when application program is terminal locking screen.Specifically, the S202 that above-described embodiment provides can be replaced
It is changed to S202a:
If S202a, target password information meet preset password information, and destination application meets default application program,
Then terminal unlocking screen and display target interface.
It should be noted that the type of above-mentioned default application program can be chat-type, type of payment or type of play
Deng.In addition, the mark of above-mentioned default application program is in default white list.
Wherein, above-mentioned default white list can be that user is arranged by the system setting application in terminal, alternatively, passing through
Application setting is arranged in third party in terminal.Wherein, the mark of a default application program can uniquely indicate that this default is answered
Use program.
Optionally, above-mentioned default white list can be what terminal from network side obtained, as obtained from server.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, terminal may determine that terminal screen locking screen
Curtain when front stage operation application program whether be user demand secret protection application program.So so that terminal is subsequently solving
The application program to not needing secret protection is avoided to handle when lock screen, it is inessential when can be to avoid terminal unlocking screen
The flexibility of privacy of user is protected when operating, and further increasing terminal unlocking screen.
In one possible implementation, above-mentioned target interface can be the desktop of terminal.Specifically, the present invention is implemented
The method for the protection privacy that example provides, can also be including S203 or S203a, alternatively, above-mentioned after above-mentioned S201, before S202
After S201, before S202a can also include S203 or S203a:
S203, terminal close destination application.
Destination application is switched to running background by S203a, terminal.
It is understood that after terminal closes destination application or destination application is switched to running background,
Target interface is desktop, do not include in desktop destination application interface in full content.
In addition, above-mentioned target interface can be interface of the interface to be protected after Fuzzy Processing.Specifically, the present invention is real
The method that the protection privacy of example offer is provided, after above-mentioned S201, before S202 can also including S203b, alternatively, above-mentioned S201 it
Afterwards, can also include S203b before S202a:
S203b terminal Fuzzy Processings interface to be protected.
It is understood that S203, S203a and S203b provided in an embodiment of the present invention can be respectively a kind of processing rule
Then.For example, " terminal closing destination application " is denoted as, processing rule 1, " destination application is switched to backstage and transported by terminal
Row " is denoted as processing rule 2, and " terminal Fuzzy Processing interface to be protected " is denoted as processing rule 3.
Optionally, terminal can preset the same of application program according to the mark setting of the type and application program of application program
When, can also be that each preset processing rule is arranged in default application program.
Optionally, the identical default application program of type corresponds to same processing rule;Alternatively, a default application program
A kind of corresponding processing rule.
For example, the default application program of chat-type corresponds to above-mentioned processing rule 2, the default application program pair of type of payment
Answer above-mentioned processing rule 3.The default application program for being identified as " A banks " corresponds to above-mentioned processing rule 1.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, since terminal can support user's needle
Different application programs is arranged different processing rules, so that can be advance according to user when SS later solution lock screen
The processing rule process of the setting program, and the boundary finally shown before the terminal locking screen is being shown after solving lock screen first
Face.It is thus possible to protect the flexibility of privacy of user when further increasing terminal unlocking screen.
In one possible implementation, it is provided in an embodiment of the present invention protection privacy method, above-mentioned S201 it
After can also include S204:
If S204, target password information meet preset password information, and destination application does not meet default application program,
Then terminal unlocking screen and show interface to be protected.
It is understood that above-mentioned destination application does not meet default application program, illustrate the destination application not
It is the program of user demand secret protection.
In this way, the method for protection privacy provided in an embodiment of the present invention, the application of front stage operation in terminal locking screen
When program is not the program of user demand secret protection, terminal need not be handled the application program, and can unlocked
The interface finally shown before the terminal locking screen is shown after screen first.It is thus possible to further increase terminal unlocking screen
When protect privacy of user flexibility.
As shown in figure 4, being a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.Terminal 40 shown in Fig. 4 is wrapped
It includes:Receiving module 401 and display module 402;Receiving module 401, in the case where terminal 40 is in screen lock state, receiving
Target password information input;Display module 402, if the target password information for receiving module 401 to receive meets preset password
Information then solves lock screen and display target interface, and target interface is the interface in the interface of terminal 40 in addition to interface to be protected,
Or target interface be to interface to be protected carry out Fuzzy Processing after interface, interface to be protected be 40 lock-screen of terminal before most
The interface shown afterwards.
Optionally, preset password information includes default unlocking pin information and default additional encrypted message;Wherein, solution is preset
Lock cipher information is used to indicate terminal 40 and solves lock screen, and additional encrypted message is used to indicate terminal 40 and shows mesh after solving lock screen
It demarcates face.
Optionally, interface to be protected is the interface in destination application;Display module 402, if specifically for receiving mould
The target password information that block 401 receives meets preset password information, and destination application meets default application program, then unlocks
Screen and display target interface.
Optionally, target interface is the desktop of terminal 40;Terminal 40 further includes:Processing module 403;Processing module 403 is used
Before display module 402 solves lock screen and display target interface, destination application is closed, alternatively, by destination application
It is switched to running background.
Optionally, display module 402 are additionally operable to after the input that receiving module 401 receives target password information, if target
Encrypted message meets preset password information, and destination application does not meet default application program, then terminal 40 solves lock screen simultaneously
Show interface to be protected.
Terminal provided in an embodiment of the present invention, due to the terminal when solving lock screen can to before the terminal locking screen most
The interface (interface i.e. to be protected) shown afterwards is handled so that the interface shown after terminal unlocking screen is the interface of the terminal
In interface in addition to interface to be protected, or the interface after Fuzzy Processing is carried out to interface to be protected;Therefore, terminal unlocking screen
The privacy information of user is not included in the interface shown first afterwards.It is thus possible to which privacy of user is let out when solving terminal unlocking screen
The problem of leakage.Terminal 30 and terminal 40 provided in an embodiment of the present invention can realize that terminal is realized each in above method embodiment
A process, to avoid repeating, which is not described herein again.
Fig. 5 is a kind of hardware architecture diagram of terminal provided in an embodiment of the present invention, which includes but unlimited
In:Radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106,
The components such as user input unit 107, interface unit 108, memory 109, processor 110 and power supply 111.Art technology
Personnel are appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 5, terminal may include than illustrate it is more or
Less component either combines certain components or different components arrangement.In embodiments of the present invention, terminal includes but not
It is limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, user input unit 107, in the case where terminal 100 is in screen lock state, receiving target password letter
Breath input;Display unit 106, if the target password information for user input unit 107 to receive meets preset password information,
Solve lock screen and display target interface, target interface be terminal 100 interface in interface in addition to interface to be protected or mesh
Demarcate face be to interface to be protected carry out Fuzzy Processing after interface, interface to be protected be 100 lock-screen of terminal before finally show
The interface shown.
Terminal provided in an embodiment of the present invention, due to the terminal when solving lock screen can to before the terminal locking screen most
The interface (interface i.e. to be protected) shown afterwards is handled so that the interface shown after terminal unlocking screen is the interface of the terminal
In interface in addition to interface to be protected, or the interface after Fuzzy Processing is carried out to interface to be protected;Therefore, terminal unlocking screen
The privacy information of user is not included in the interface shown first afterwards.It is thus possible to which privacy of user is let out when solving terminal unlocking screen
The problem of leakage.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 101 includes but not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by radio communication system and network and other set
Standby communication.
Terminal has provided wireless broadband internet to the user by network module 102 and has accessed, and such as user is helped to receive and dispatch electricity
Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 103 can receive radio frequency unit 101 or network module 102 or in memory 109
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end
The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 100 executes.Sound
Frequency output unit 103 includes loud speaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike
Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output of mobile communication base station can be sent to via radio frequency unit 101 by being converted in the case of telephone calling model.
Terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjusts the brightness of display panel 1061, and proximity sensor can close display panel when terminal 100 is moved in one's ear
1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add
The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 105 can be with
Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer,
Infrared sensor etc., details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generates and set with the user of terminal
It sets and the related key signals of function control inputs.Specifically, user input unit 107 include touch panel 1071 and other
Input equipment 1072.Touch panel 1071, also referred to as touch screen, collect user on it or neighbouring touch operation (such as
User is using any suitable objects or attachment such as finger, stylus on touch panel 1071 or near touch panel 1071
Operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receives processor 110
The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.
Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, switch
Button etc.), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it
On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touch
The type for touching event provides corresponding visual output on display panel 1061.Although in Figure 5, touch panel 1071 and display
Panel 1061 is to realize the function that outputs and inputs of terminal as two independent components, but in certain embodiments, can
The function that outputs and inputs of terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not limited herein specifically
It is fixed.
Interface unit 108 is the interface that external device (ED) is connect with terminal 100.For example, external device (ED) may include it is wired or
Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port,
For connecting the port of device with identification module, the port audio input/output (I/O), video i/o port, ear port
Etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will
One or more elements that the input received is transferred in terminal 100 or can be used for terminal 100 and external device (ED) it
Between transmission data.
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area
And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the software program and/or module being stored in memory 109, and call and be stored in memory 109
Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 110 may include one
Or multiple processing units;Preferably, processor 110 can integrate application processor and modem processor, wherein application processing
The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage
Solution, above-mentioned modem processor can not also be integrated into processor 110.
Terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 can be with
It is logically contiguous by power-supply management system and processor 110, to by power-supply management system realize management charging, electric discharge, with
And the functions such as power managed.
In addition, terminal 100 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 110, and memory 109 is stored in storage
It is real when which is executed by processor 110 on device 109 and the computer program that can be run on the processor 110
Each process of existing above method embodiment, and identical technique effect can be reached, to avoid repeating, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, realizes each process of above method embodiment when which is executed by processor, and can reach identical
Technique effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as read-only memory
(Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD
Deng.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within the protection of the present invention.
Claims (11)
1. a kind of method of protection privacy, which is characterized in that including:
In the case where terminal is in screen lock state, the terminal receives the input of target password information;
If the target password information meets preset password information, the terminal unlocking screen and display target interface, described
Target interface be the terminal interface in interface in addition to interface to be protected or the target interface be to wait protecting to described
It protects interface and carries out the interface after Fuzzy Processing, the interface to be protected is the interface that finally shows before the terminal locking screen.
2. according to the method described in claim 1, it is characterized in that,
The preset password information includes default unlocking pin information and default additional encrypted message;
Wherein, the default unlocking pin information is used to indicate the terminal unlocking screen, and the default additional encrypted message is used
In the instruction terminal target interface is shown after solving lock screen.
3. method according to claim 1 or 2, which is characterized in that the interface to be protected is in destination application
Interface;
If the target password information meets preset password information, the terminal unlocking screen and display target interface, including:
If the target password information meets the preset password information, and the destination application meets and default applies journey
Sequence, then the terminal show the target interface.
4. according to the method described in claim 3, it is characterized in that, the target interface is the desktop of the terminal;
Before the terminal unlocking screen and display target interface, further include:
The terminal closes the destination application, is transported alternatively, the destination application is switched to backstage by the terminal
Row.
5. according to the method described in claim 4, it is characterized in that, the terminal receive target password information input after,
Further include:
If the target password information meets the preset password information, and the destination application does not meet described preset and answers
With program, then the terminal unlocking screen and the interface to be protected is shown.
6. a kind of terminal, which is characterized in that including:Receiving module and display module;
The receiving module, in the case where terminal is in screen lock state, receiving target password information input;
The display module, if the target password information for the receiving module to receive meets preset password information,
Lock screen and display target interface are solved, the target interface is the interface in the interface of the terminal in addition to interface to be protected,
Or the target interface is the interface carried out to the interface to be protected after Fuzzy Processing, the interface to be protected is the end
The interface finally shown before the lock-screen of end.
7. terminal according to claim 6, which is characterized in that
The preset password information includes default unlocking pin information and default additional encrypted message;
Wherein, the default unlocking pin information is used to indicate the terminal unlocking screen, and the default additional encrypted message is used
In the instruction terminal target interface is shown after solving lock screen.
8. the terminal described according to claim 6 or 7, which is characterized in that the interface to be protected is in destination application
Interface;
The display module, if the target password information received specifically for the receiving module meets the preset password
Information, and the destination application meets default application program, then shows the target interface.
9. terminal according to claim 8, which is characterized in that the target interface is the desktop of the terminal;
The terminal further includes:Processing module;
The processing module closes the intended application before the display module solution lock screen and display target interface
Program, alternatively, the destination application is switched to running background.
10. terminal according to claim 9, which is characterized in that
The display module is additionally operable to after the input that the receiving module receives the target password information, if the target
Encrypted message meets the preset password information, and the destination application does not meet the default application program, then described
Terminal unlocking screen simultaneously shows the interface to be protected.
11. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be at the place
The computer program run on reason device is realized when the computer program is executed by the processor as appointed in claim 1 to 5
The step of method of protection privacy described in one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810269038.7A CN108595946B (en) | 2018-03-29 | 2018-03-29 | Privacy protection method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810269038.7A CN108595946B (en) | 2018-03-29 | 2018-03-29 | Privacy protection method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108595946A true CN108595946A (en) | 2018-09-28 |
CN108595946B CN108595946B (en) | 2021-07-06 |
Family
ID=63624935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810269038.7A Active CN108595946B (en) | 2018-03-29 | 2018-03-29 | Privacy protection method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108595946B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109828732A (en) * | 2018-12-26 | 2019-05-31 | 维沃移动通信有限公司 | A kind of display control method and terminal device |
CN110781513A (en) * | 2019-09-17 | 2020-02-11 | 上海掌门科技有限公司 | Information display method and equipment |
CN111857464A (en) * | 2020-06-30 | 2020-10-30 | 维沃移动通信有限公司 | Information display method and device, electronic equipment and readable storage medium |
CN112989292A (en) * | 2019-12-17 | 2021-06-18 | 中移(成都)信息通信科技有限公司 | Interface display method, device and medium |
CN113515254A (en) * | 2021-07-29 | 2021-10-19 | 上海传英信息技术有限公司 | Interface display method, terminal and storage medium |
CN114218318A (en) * | 2022-02-21 | 2022-03-22 | 国网山东省电力公司乳山市供电公司 | Data processing system and method for electric power big data |
CN115022446A (en) * | 2021-10-09 | 2022-09-06 | 荣耀终端有限公司 | User interface management method and terminal equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104021350A (en) * | 2014-05-13 | 2014-09-03 | 小米科技有限责任公司 | Privacy-information hiding method and device |
CN106529339A (en) * | 2016-11-30 | 2017-03-22 | 广东欧珀移动通信有限公司 | Picture display method, device and terminal |
CN106687969A (en) * | 2015-10-08 | 2017-05-17 | 华为技术有限公司 | Method and terminal device for protecting privacy information |
CN107563168A (en) * | 2017-09-05 | 2018-01-09 | 广东欧珀移动通信有限公司 | Unlocking method, device and the mobile terminal of mobile terminal |
-
2018
- 2018-03-29 CN CN201810269038.7A patent/CN108595946B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104021350A (en) * | 2014-05-13 | 2014-09-03 | 小米科技有限责任公司 | Privacy-information hiding method and device |
CN106687969A (en) * | 2015-10-08 | 2017-05-17 | 华为技术有限公司 | Method and terminal device for protecting privacy information |
CN106529339A (en) * | 2016-11-30 | 2017-03-22 | 广东欧珀移动通信有限公司 | Picture display method, device and terminal |
CN107563168A (en) * | 2017-09-05 | 2018-01-09 | 广东欧珀移动通信有限公司 | Unlocking method, device and the mobile terminal of mobile terminal |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109828732A (en) * | 2018-12-26 | 2019-05-31 | 维沃移动通信有限公司 | A kind of display control method and terminal device |
CN110781513A (en) * | 2019-09-17 | 2020-02-11 | 上海掌门科技有限公司 | Information display method and equipment |
CN110781513B (en) * | 2019-09-17 | 2024-05-03 | 上海掌门科技有限公司 | Information display method and equipment |
CN112989292A (en) * | 2019-12-17 | 2021-06-18 | 中移(成都)信息通信科技有限公司 | Interface display method, device and medium |
CN111857464A (en) * | 2020-06-30 | 2020-10-30 | 维沃移动通信有限公司 | Information display method and device, electronic equipment and readable storage medium |
CN113515254A (en) * | 2021-07-29 | 2021-10-19 | 上海传英信息技术有限公司 | Interface display method, terminal and storage medium |
CN115022446A (en) * | 2021-10-09 | 2022-09-06 | 荣耀终端有限公司 | User interface management method and terminal equipment |
CN114218318A (en) * | 2022-02-21 | 2022-03-22 | 国网山东省电力公司乳山市供电公司 | Data processing system and method for electric power big data |
Also Published As
Publication number | Publication date |
---|---|
CN108595946B (en) | 2021-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108595946A (en) | A kind of method and terminal of protection privacy | |
CN110062105A (en) | A kind of interface display method and terminal device | |
CN109857495A (en) | A kind of display control method and terminal device | |
CN108920226A (en) | screen recording method and device | |
CN108573307A (en) | A kind of method and terminal of processing neural network model file | |
CN108391123A (en) | A kind of method and terminal generating video | |
CN110457879A (en) | Object displaying method and terminal device | |
CN110457935A (en) | A kind of authority configuring method and terminal device | |
CN110046013A (en) | A kind of interface display method and terminal device | |
CN108171034A (en) | A kind of method and terminal for protecting privacy | |
CN110007822A (en) | A kind of interface display method and terminal device | |
CN108446338A (en) | A kind of method and terminal preserving browsing record | |
CN110049187A (en) | A kind of display methods and terminal device | |
CN109117054A (en) | A kind of display control method and terminal | |
CN108153460A (en) | A kind of icon hiding method and terminal | |
CN108733993A (en) | A kind of method for information display and terminal | |
CN107707554A (en) | A kind of login method and mobile terminal of application program account | |
CN110232266A (en) | A kind of unlocking screen method and terminal device | |
CN110012151A (en) | A kind of information display method and terminal device | |
CN108600492A (en) | A kind of unlocking screen method and terminal | |
CN109246693A (en) | A kind of control method and terminal of application program | |
CN109815678A (en) | A kind of authority configuring method and mobile terminal | |
CN108848240A (en) | A kind of protecting information safety method and terminal | |
CN109086599A (en) | A kind of application program locking method, unlocking method and terminal device | |
CN109062477A (en) | A kind of input method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |