CN110417996A - Method and terminal for protecting privacy information - Google Patents

Method and terminal for protecting privacy information Download PDF

Info

Publication number
CN110417996A
CN110417996A CN201910656543.1A CN201910656543A CN110417996A CN 110417996 A CN110417996 A CN 110417996A CN 201910656543 A CN201910656543 A CN 201910656543A CN 110417996 A CN110417996 A CN 110417996A
Authority
CN
China
Prior art keywords
access mode
terminal
information
folding
angle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910656543.1A
Other languages
Chinese (zh)
Other versions
CN110417996B (en
Inventor
喻芳
田浩雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910656543.1A priority Critical patent/CN110417996B/en
Publication of CN110417996A publication Critical patent/CN110417996A/en
Application granted granted Critical
Publication of CN110417996B publication Critical patent/CN110417996B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/12Details of telephonic subscriber devices including a sensor for measuring a physical value, e.g. temperature or motion

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Environmental & Geological Engineering (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a method and a terminal for protecting privacy information, wherein the method comprises the following steps: the terminal detects the folding angle of the folding screen; receiving unlocking information, wherein the unlocking information is used for unlocking the terminal; determining whether the folding angle is within a preset angle range; when the folding angle is determined to be within a preset angle range, entering a first access mode without hiding the encrypted information; the encryption information is privacy information encrypted in advance; and when the folding angle is determined to be out of the preset angle range, entering a second access mode and hiding the encrypted information. In this way, the terminal can determine which access mode to enter according to the folding angle of the folding screen to determine whether to hide the encrypted information, so that privacy information of a user can be protected from being leaked in the process of using the terminal.

Description

Method and terminal for protecting privacy information
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and a terminal for protecting private information.
Background
With the wide use of smart phones in life, users can work, study, entertain, shop, etc. through smart phones. Therefore, the user keeps a large amount of privacy information in the smart phone, such as work material information, learning material information, bank account transaction information and the like.
Generally, a user pays attention to the security of the smart phone in the process of using the smart phone, for example, whether the smart phone can protect the privacy information of the user from being leaked or not, for example, how to prevent other people from peeping the privacy information of the user when the user uses the smart phone, or how to prevent other people from seeing the privacy information when the smart phone is lent to other people for use, how to prevent other people from seeing the privacy information, and the like. At present, with the development of science and technology, the display screen of the smart phone is developed from a full screen to a folding screen. In order to meet the personalized requirements of users, how to protect the privacy information in the smart phone from being revealed by utilizing the folding characteristics of the folding screen becomes a problem to be solved by people.
Disclosure of Invention
The embodiment of the invention provides a method and a terminal for protecting privacy information, which are used for protecting the privacy information from being leaked in the process of using the terminal by a user.
In a first aspect, an embodiment of the present invention provides a method for protecting private information, where the method is applied to a terminal, where the terminal includes a folding screen, and the method includes:
detecting the folding angle of the folding screen;
receiving unlocking information, wherein the unlocking information is used for unlocking the terminal;
determining whether the folding angle is within a preset angle range;
when the folding angle is determined to be within the preset angle range, entering a first access mode without hiding encrypted information; the encryption information is privacy information encrypted in advance;
and when the folding angle is determined to be out of the preset angle range, entering a second access mode and hiding the encrypted information.
Optionally, when it is determined that the folding angle is within the preset angle range, the method enters a first access mode, and after the encryption information is not hidden, the method further includes:
detecting that the current folding angle of the folding screen is changed into a first folding angle; wherein the first fold angle is outside the preset angle range;
and changing the current access mode into a second access mode, and hiding the encrypted information.
Optionally, when it is determined that the folding angle is outside the preset angle range, a second access mode is entered, and after the encryption information is hidden, the method further includes:
detecting that the current folding angle of the folding screen is changed into a second folding angle; wherein the second fold angle is within the preset angle range;
and keeping the current access mode as the second access mode, and hiding the encrypted information.
Optionally, when it is determined that the folding angle is within the preset angle range, the method enters a first access mode, and after the encryption information is not hidden, the method further includes:
detecting a first control instruction generated when a first control is triggered;
and changing the current access mode into a second access mode in response to the first control instruction, and hiding the encrypted information.
Optionally, when it is determined that the folding angle is outside the preset angle range, a second access mode is entered, and after the encryption information is hidden, the method further includes:
detecting a second control instruction generated when a second control is triggered; the second control instruction is used for controlling the encryption information not to be hidden;
and not responding to the second control instruction, keeping the current access mode as the second access mode, and hiding the encrypted information.
Optionally, before receiving an unlocking message, the method further includes:
displaying first prompt information, wherein the first prompt information is used for prompting a user to select a target access mode;
receiving operation information;
determining a target access mode according to the operation information;
after receiving an unlocking message, the method further comprises:
when the folding angle is determined to be in the angle range corresponding to the target access mode, the terminal is successfully unlocked;
and when the folding angle is determined to be out of the angle range corresponding to the target access mode, prohibiting the terminal from being unlocked.
In a second aspect, an embodiment of the present invention provides a terminal, including:
the detection unit is used for detecting the folding angle of the folding screen of the terminal;
the receiving unit is used for receiving unlocking information, and the unlocking information is used for unlocking the terminal;
the processing unit is used for determining whether the folding angle is in a preset angle range; when the folding angle is determined to be within the preset angle range, entering a first access mode without hiding encrypted information; the encryption information is privacy information encrypted in advance; and when the folding angle is determined to be out of the preset angle range, entering a second access mode and hiding the encrypted information.
Optionally, when the processing unit is configured to determine that the folding angle is within the preset angle range, enter a first access mode, and after the encryption information is not hidden, the detecting unit is configured to:
detecting that the current folding angle of the folding screen is changed into a first folding angle; wherein the first fold angle is outside the preset angle range;
the processing unit is configured to:
and changing the current access mode into a second access mode, and hiding the encrypted information.
Optionally, when the processing unit is configured to determine that the folding angle is outside the preset angle range, enter a second access mode, and after hiding the encrypted information, the detecting unit is configured to:
detecting that the current folding angle of the folding screen is changed into a second folding angle; wherein the second fold angle is within the preset angle range;
the processing unit is configured to:
and keeping the current access mode as the second access mode, and hiding the encrypted information.
Optionally, when the processing unit is configured to determine that the folding angle is within the preset angle range, enter a first access mode, and after the encryption information is not hidden, the detecting unit is configured to:
detecting a first control instruction generated when a first control is triggered;
the processing unit is configured to:
and changing the current access mode into a second access mode in response to the first control instruction, and hiding the encrypted information.
Optionally, when the processing unit is configured to determine that the folding angle is outside the preset angle range, enter a second access mode, and hide the encrypted information, the detecting unit is configured to:
detecting a second control instruction generated when a second control is triggered; the second control instruction is used for controlling the encryption information not to be hidden;
the processing unit is configured to:
and not responding to the second control instruction, keeping the current access mode as the second access mode, and hiding the encrypted information.
Optionally, the terminal further comprises a display unit; before the receiving unit is used for receiving unlocking information, the display unit is used for:
displaying first prompt information, wherein the first prompt information is used for prompting a user to select a target access mode;
the receiving unit is configured to:
receiving operation information;
the processing unit is configured to:
determining a target access mode according to the operation information;
after the receiving unit receives an unlocking message, the processing unit is configured to:
when the folding angle is determined to be in the angle range corresponding to the target access mode, successfully unlocking the terminal;
and when the folding angle is determined to be out of the angle range corresponding to the target access mode, prohibiting the terminal from being unlocked.
In a third aspect, an embodiment of the present invention provides a terminal, including a processor and a memory; wherein the memory is to store one or more computer programs; the memory stores one or more computer programs that, when executed by the processor, cause the terminal to implement the first aspect or any of the possible designs of the first aspect described above.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, which stores computer instructions that, when executed by a terminal, cause the terminal to perform the first aspect or any one of the possible design methods of the first aspect.
In a fifth aspect, an embodiment of the present invention provides a computer program product, where the computer program product includes computer instructions, and when the computer instructions are executed by a terminal, the terminal executes the first aspect or any one of the possible design methods of the first aspect.
The invention has the following beneficial effects:
in the technical scheme of the embodiment of the invention, the terminal detects the folding angle of the folding screen; receiving unlocking information, wherein the unlocking information is used for unlocking the terminal; determining whether the folding angle is within a preset angle range; when the folding angle is determined to be within a preset angle range, entering a first access mode without hiding the encrypted information; the encryption information is privacy information encrypted in advance; and when the folding angle is determined to be out of the preset angle range, entering a second access mode and hiding the encrypted information. In this way, the terminal can determine which access mode to enter according to the folding angle of the folding screen to determine whether to hide the encrypted information, so that privacy information of a user can be protected from being leaked in the process of using the terminal.
Drawings
Fig. 1 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a method for protecting private information according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The shapes and sizes of the various elements in the drawings are not to scale and are merely intended to illustrate the invention.
The terms "first" and "second" in the description and claims of the present invention and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. In addition, in the embodiment of the present invention, "a plurality" may mean at least two, for example, two, three, or more, and the embodiment of the present invention is not limited.
In the following, some terms related to the embodiments of the present invention are explained so as to be easily understood by those skilled in the art.
(1) The terminal related to the embodiment of the invention is an electronic device comprising a folding screen, such as a terminal comprising a folding screen, such as a smart phone, a tablet computer, a notebook computer and the like.
(2) Various Applications (APP) may be installed in the terminal in (1) above. Such as a gallery application, a text message application, a phone application, a WeChat application, a Payment application, etc. Some privacy information of the user is stored in the applications, for example, privacy information such as a bank card number, bank transaction information, chat records and the like of the user is stored in the WeChat application.
(3) The encryption information related to the embodiment of the present invention is privacy information that is encrypted in advance by a user, for example, some pictures stored in the graph library application can be encrypted in advance by the user, and the terminal defaults to the encrypted pictures as the encryption information in the subsequent operation process. The encrypted information may include encrypted data, an encrypted application, an encrypted picture, and the like, that is, the embodiment of the present invention does not limit the specific form of the encrypted information.
In order to facilitate those skilled in the art to easily understand the technical solution of the present invention, an application scenario provided by the embodiment of the present invention is described below. Exemplarily, referring to fig. 1, a schematic structural diagram of a terminal provided in an embodiment of the present invention is shown.
As shown in fig. 1, the terminal includes a foldable screen, wherein the foldable screen may include a first body and a second body, and an included angle between the first body and the second body, that is, a folding angle of the foldable screen, may be changed. For example, when the folding angle of the folding screen is any angle, the user may unlock the terminal, and enter the main interface of the terminal to use a corresponding function provided by the terminal, for example, a call function using a telephone application.
In some embodiments, in order to protect the privacy of the user from being compromised, multiple access modes may be set in the terminal for defining the right to access the private information held in the terminal. For example, each access mode corresponds to an access right, and when the terminal is in a certain access mode, if the access right corresponding to the access mode is to limit that the user can only access the non-encrypted information stored in the terminal, in the access mode, the user cannot access the encrypted information stored in the terminal.
In some embodiments, in order to meet the personalized requirements of the user, different access modes can be entered according to different folding angles of the folding screen. For example, a user may customize an angle range of a folding screen and an access right corresponding to the angle range, for example, when the folding angle of the folding screen is within the angle range, the user may enter a first access mode, and in the first access mode, the user may have access to all information stored in the terminal, such as encrypted information and unencrypted information; when the folding angle of the folding screen is out of the angle range, a second access mode can be entered, in the second access mode, the user can have access to some information stored in the terminal, such as non-encrypted information, and the encrypted information cannot be accessed.
In the embodiment of the invention, the terminal can determine which access mode to enter according to the folding angle of the folding screen so as to determine the access authority of the user, thereby protecting the privacy information of the user from being leaked in the process of using the terminal. In addition, the user can customize the angle range of the folding screen and the access authority corresponding to the angle range according to the requirement of the user, and the user experience is facilitated to be improved.
It should be noted that, in the embodiment of the present invention, the foldable screen of the terminal includes one display screen, that is, the first body and the second body share one display screen. Certainly, the foldable screen of the terminal may further include a plurality of display screens, for example, when the foldable screen of the terminal includes two display screens, one display screen corresponding to the first body and the other display screen corresponding to the second body. The number of the display screens in the folding screen of the terminal is not limited in the embodiment of the invention, as long as the folding screen can be folded.
It should be noted that, in the embodiment of the present invention, one angle range and two access modes are set in the terminal as an example, of course, multiple angle ranges and multiple access modes may also be set in the terminal, for example, each angle range in the multiple angle ranges corresponds to one access mode, and the embodiment of the present invention is not limited.
The following describes a process of entering different access modes by the terminal according to the folding angle of the folding screen.
Fig. 2 is a schematic flowchart illustrating a method for protecting privacy information according to an embodiment of the present invention. The method may be applied to the above terminal or similar terminals. As shown in fig. 2, the method flow includes:
s201, detecting the folding angle of the folding screen.
For example, as shown in fig. 1, some parties may be disposed in the first ontology and the second ontologyA direction sensor for detecting the current direction values (x) of the first body in the x, y and z axes1,y1,z1) And the current direction values (x) of the second ontology in the x, y and z axes2,y2,z2) Then through the direction value (x) of the first body1,y1,z1) And a direction value (x) of the second body2,y2,z2) And calculating the folding angle of the folding screen of the terminal. For example, the value of the folding angle of the folding screen of the terminal may be equal to | x2-x1Is equal to (360- | x)2-x1|). The direction sensor may comprise a gravity sensor and/or an acceleration sensor, among others.
S202, receiving unlocking information, wherein the unlocking information is used for unlocking the terminal.
In some embodiments, the unlocking information received by the terminal may be fingerprint information, password information, iris information, voice information, gesture information, or face information, etc. In the embodiment of the invention, the user can customize the unlocking information according to the actual requirement, which is beneficial to improving the experience of the user.
It should be noted that the embodiment of the present invention does not limit the execution sequence of S201 and S202, for example, the terminal may execute S201 first and then S202, or execute S202 first and then S201, or execute S201 and S202 simultaneously.
S203, determining whether the folding angle is within a preset angle range, and entering a first access mode without hiding encrypted information when the folding angle is determined to be within the preset angle range; and when the folding angle is determined to be out of the preset angle range, entering a second access mode and hiding the encrypted information.
Optionally, after receiving the unlocking information, the terminal determines whether the folding angle of the folding screen is detected to be within a preset angle range, so as to determine which access mode to enter. Illustratively, the first access mode is entered when the terminal determines that the folding angle is within a preset angle range. When the terminal enters the first access mode, the terminal does not hide the encrypted information, and the user can access the encrypted information. And when the terminal determines that the folding angle is out of the preset angle range, entering a second access mode. When the terminal enters the second access mode, the terminal hides the encrypted information, and the user can only access the non-encrypted information but cannot access the encrypted information.
In the embodiment of the invention, the terminal can determine which access mode to enter according to the folding angle of the folding screen so as to determine whether to hide the encrypted information, so that privacy information of a user can be protected from being leaked in the process of using the terminal.
In some embodiments, when the terminal operates in the unlocked state, if the current access mode of the terminal is the first access mode, the terminal may switch the current access mode to the second access mode in a plurality of ways. Such as:
in the mode 1, when the terminal detects that the current folding angle of the folding screen is changed to the first folding angle (where the first folding angle is out of the preset angle range), the terminal changes the current access mode to the second access mode. For example, when the user borrows the terminal for use by others, the user can fold the folding screen to the first folding angle, so that the terminal enters the second access mode to hide the encrypted information. For example, when the wechat application is set as the encrypted information and the terminal is in the second access mode, the icon of the wechat application is hidden and not displayed, so that other people cannot use the wechat application.
In the embodiment of the invention, when the terminal runs in the unlocked state, the terminal can automatically switch the first access mode to the second access mode according to the folding angle of the folding screen, on one hand, user operation is not needed, which is beneficial to improving user experience, and on the other hand, the current access mode of the terminal can be covertly switched to the second access mode, so that other people cannot perceive the operation of switching the current access mode of the terminal by the user, and the concealing effect is good.
In mode 2, when the terminal detects a first control instruction (where the first control instruction is used to control the encryption information to be hidden) generated when the first control is triggered, the terminal changes the current access mode to the second access mode in response to the first control instruction. For example, when the user finds that the user is peeped by others, the user may trigger the first control to enable the terminal to enter the second access mode, so as to hide the encrypted information. For example, when the working material information is set as the encrypted information and the terminal is in the second access mode, the working material information is hidden and not displayed, so that other people cannot peep the working material information.
In the embodiment of the invention, when the terminal runs in the unlocked state, the terminal can automatically switch the first access mode to the second access mode according to the received operation (for example, the user triggers the first control), so that the requirements of the user can be met, and the user experience can be improved.
In some embodiments, when the terminal operates in the unlocked state, if the current access mode of the terminal is the second access mode, the terminal prohibits switching the current access mode to the first access mode. Such as:
example 1, when the terminal detects that the current folding angle of the folding screen is changed to a second folding angle (where the second folding angle is within a preset angle range), the current access mode is maintained as the second access mode. For example, in the unlocked state, no matter whether the current folding angle of the folding screen is within the preset angle range or outside the preset angle range, the terminal cannot switch the current access mode to the first access mode. In this example, when the user borrows the terminal for other people to use, the phenomenon that other people can access the encrypted information due to the fact that the terminal does not hide the encrypted data when other people carelessly fold the folding angle of the folding screen into the preset angle range can be avoided, and the user experience can be improved.
Example 2, when the terminal detects a second control instruction generated when the second control is triggered (where the second control instruction is used to control the encrypted information not to be hidden), the terminal does not respond to the second control instruction, keeps the current access mode unchanged as the second access mode, and hides the encrypted information. In this example, when the user borrows the terminal for others to use, the phenomenon that others can access the encrypted information due to the fact that the terminal does not hide the encrypted data when others make the terminal in the first access mode by triggering the second control can be avoided, and the user experience can be improved.
In the embodiment of the invention, when the terminal runs in the unlocking state, the terminal forbids the second access mode to be switched to the first access mode, so that the phenomenon that other people can access the encrypted information because the terminal does not hide the encrypted data under the condition that the user does not actively open the authority of accessing the encrypted information can be avoided, and the experience of the user is improved.
It should be noted that the first control and the second control may be the same control or different controls, and the embodiment of the present invention is not limited.
In some embodiments, in order to avoid the phenomenon that the user enters the wrong access mode due to the error of the folding angle of the folding screen caused by the visual error, the terminal may display corresponding information for prompting the user of the current folding angle. Such as:
mode 1, the folding screen can show current folding angle, for example, when the folding screen was lighted, the folding angle of folding screen can show in the optional display position of folding screen (the display position of folding angle can set up according to actual demand). In the mode, the user can accurately know the current folding angle of the folding screen, the phenomenon that the user enters an incorrect access mode due to the fact that the folding angle of the folding screen has errors caused by visual errors can be avoided, and the user experience is favorably improved.
In the mode 2, the terminal can compare the access mode corresponding to the current folding angle of the folding screen with the target access mode to determine whether the terminal correctly enters the target access mode. For example, when the folding screen is lighted, the folding screen displays a first prompt message "enter the first access mode or enter the second access mode", and displays a "enter the first access mode" control and a "enter the second access mode" control for prompting the user to select the target access mode. When the terminal detects that a user triggers and displays a control of 'entering a first access mode', the terminal determines that a target access mode is the first access mode. When the user unlocks the terminal at a certain angle out of the preset angle range, the terminal determines that the access mode corresponding to the angle is the second access mode and is not the target access mode, the terminal prohibits unlocking and displays second prompt information for prompting the user that the current angle cannot enter the first access mode, so that the user can readjust the folding angle of the folding screen. Correspondingly, when the user unlocks the terminal at a certain angle within the preset angle range, the terminal determines that the access mode corresponding to the angle is the first access mode and is the target access mode, and the terminal is successfully unlocked. In the mode, only when the user correctly enters the target access mode, the terminal is unlocked successfully, the effect of double guarantee is achieved, the phenomenon that the user enters the wrong access mode due to the fact that the folding angle of the folding screen has errors due to visual errors can be avoided, and the user experience is improved.
As can be seen from the foregoing description, in the technical solution of the embodiment of the present invention, the terminal detects the folding angle of the folding screen; receiving unlocking information, wherein the unlocking information is used for unlocking the terminal; determining whether the folding angle is within a preset angle range; when the folding angle is determined to be within a preset angle range, entering a first access mode without hiding the encrypted information; the encryption information is privacy information encrypted in advance; and when the folding angle is determined to be out of the preset angle range, entering a second access mode and hiding the encrypted information. In this way, the terminal can determine which access mode to enter according to the folding angle of the folding screen to determine whether to hide the encrypted information, so that privacy information of a user can be protected from being leaked in the process of using the terminal.
Based on the same inventive concept, the embodiment of the invention provides a terminal. Fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
As shown in fig. 3, the terminal 300 includes:
a detecting unit 301 for detecting a folding angle of a folding screen of the terminal 300;
a receiving unit 302, configured to receive unlocking information, where the unlocking information is used to unlock the terminal 300;
a processing unit 303, configured to determine whether the folding angle is within a preset angle range; when the folding angle is determined to be within a preset angle range, entering a first access mode without hiding the encrypted information; the encryption information is privacy information encrypted in advance; and when the folding angle is determined to be out of the preset angle range, entering a second access mode and hiding the encrypted information.
Optionally, when the processing unit 303 is configured to determine that the folding angle is within a preset angle range, enter the first access mode, and after the encrypted information is not hidden, the detecting unit 301 is configured to:
detecting that the current folding angle of the folding screen is changed into a first folding angle; wherein the first folding angle is outside a preset angle range;
the processing unit 303 is configured to:
and changing the current access mode into a second access mode, and hiding the encrypted information.
Optionally, when the processing unit 303 is configured to determine that the folding angle is outside the preset angle range, enter the second access mode, and after hiding the encrypted information, the detecting unit 301 is configured to:
detecting that the current folding angle of the folding screen is changed into a second folding angle; wherein the second folding angle is within a preset angle range;
the processing unit 303 is configured to:
and keeping the current access mode as the second access mode, and hiding the encrypted information.
Optionally, when the processing unit 303 is configured to determine that the folding angle is within a preset angle range, enter the first access mode, and after the encrypted information is not hidden, the detecting unit 301 is configured to:
detecting a first control instruction generated when a first control is triggered;
the processing unit 303 is configured to:
and changing the current access mode into a second access mode in response to the first control instruction, and hiding the encrypted information.
Optionally, when the processing unit 303 is configured to determine that the folding angle is outside the preset angle range, enter the second access mode, and after hiding the encrypted information, the detecting unit 301 is configured to:
detecting a second control instruction generated when a second control is triggered; the second control instruction is used for controlling the encryption information not to be hidden;
the processing unit 303 is configured to:
and not responding to the second control instruction, keeping the current access mode as the second access mode, and hiding the encrypted information.
Optionally, the terminal 300 further comprises a display unit (not shown in fig. 3); before the receiving unit 302 is configured to receive an unlocking message, the display unit is configured to:
displaying first prompt information, wherein the first prompt information is used for prompting a user to select a target access mode;
a receiving unit 302, configured to:
receiving operation information;
the processing unit 303 is configured to:
determining a target access mode according to the operation information;
after the receiving unit 302 receives an unlocking message, the processing unit 303 is configured to:
when the folding angle is determined to be within the angle range corresponding to the target access mode, the terminal 300 is successfully unlocked;
and when the folding angle is determined to be out of the angle range corresponding to the target access mode, the terminal 300 is prohibited from unlocking.
The terminal 300 in this embodiment and the method for protecting privacy information shown in fig. 2 are based on the same idea, and through the foregoing detailed description of the method for protecting privacy information, a person skilled in the art can clearly understand the implementation process of the terminal 300 in this embodiment, so for brevity of the description, details are not repeated here.
Based on the same inventive concept, the embodiment of the invention provides a terminal. Fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention. As shown in fig. 4, the terminal 400 includes a processor 401 and a memory 402. Alternatively, the processor 401 may be a general-purpose Central Processing Unit (CPU) or an Application Specific Integrated Circuit (ASIC), or a Field Programmable Gate Array (FPGA), which may be one or more Integrated circuits for controlling program execution.
Optionally, the memory 402 may include a high-speed random access memory, and may further include a nonvolatile memory, such as a magnetic disk storage device, a flash memory device, or other nonvolatile solid state storage devices, and the like, which is not limited in the embodiments of the present invention.
Optionally, the memory 402 is used to store one or more computer programs; the one or more computer programs stored in the memory 402, when executed by the processor 401, enable the terminal 400 to implement all or part of the steps in the embodiment shown in fig. 2.
The terminal 400 in the embodiment of the present invention and the method for protecting privacy information shown in fig. 2 are based on the same concept, and through the foregoing detailed description of the method for protecting privacy information, a person skilled in the art can clearly understand the implementation process of the terminal 400 in the embodiment, so for brevity of the description, details are not repeated here.
Based on the same inventive concept, embodiments of the present invention provide a computer-readable storage medium, where computer instructions are stored, and when the computer instructions are executed by a terminal, the terminal is caused to perform the steps of the above method for protecting privacy information. Since the computer-readable storage medium in the embodiment of the present invention and the method for protecting privacy information shown in fig. 2 are based on the invention under the same concept, and through the foregoing detailed description of the method for protecting privacy information, a person skilled in the art can clearly understand the implementation process of the computer-readable storage medium in the embodiment, so that no further description is provided herein for brevity of the description.
Based on the same inventive concept, embodiments of the present invention provide a computer program product, where the computer program product includes computer instructions, and when the computer instructions are executed by a terminal, the terminal executes the steps of the method for protecting privacy information. Since the computer program product in the embodiment of the present invention and the method for protecting privacy information shown in fig. 2 are based on the invention under the same concept, and through the foregoing detailed description of the method for protecting privacy information, a person skilled in the art can clearly understand the implementation process of the computer program product in the embodiment, so that no further description is provided herein for brevity of the description.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A method for protecting privacy information is applied to a terminal, the terminal comprises a folding screen, and the method comprises the following steps:
detecting the folding angle of the folding screen;
receiving unlocking information, wherein the unlocking information is used for unlocking the terminal;
determining whether the folding angle is within a preset angle range;
when the folding angle is determined to be within the preset angle range, entering a first access mode without hiding encrypted information; the encryption information is privacy information encrypted in advance;
and when the folding angle is determined to be out of the preset angle range, entering a second access mode and hiding the encrypted information.
2. The method of claim 1, wherein when it is determined that the folding angle is within the preset angle range, entering a first access mode, after not hiding encryption information, the method further comprises:
detecting that the current folding angle of the folding screen is changed into a first folding angle; wherein the first fold angle is outside the preset angle range;
and changing the current access mode into a second access mode, and hiding the encrypted information.
3. The method of claim 1, wherein when it is determined that the folding angle is outside the preset angle range, entering a second access mode, after hiding the encryption information, the method further comprises:
detecting that the current folding angle of the folding screen is changed into a second folding angle; wherein the second fold angle is within the preset angle range;
and keeping the current access mode as the second access mode, and hiding the encrypted information.
4. The method of claim 1, wherein when it is determined that the folding angle is within the preset angle range, entering a first access mode, after not hiding encryption information, the method further comprises:
detecting a first control instruction generated when a first control is triggered;
and changing the current access mode into a second access mode in response to the first control instruction, and hiding the encrypted information.
5. The method of claim 1, wherein when it is determined that the folding angle is outside the preset angle range, entering a second access mode, after hiding the encryption information, the method further comprises:
detecting a second control instruction generated when a second control is triggered; the second control instruction is used for controlling the encryption information not to be hidden;
and not responding to the second control instruction, keeping the current access mode as the second access mode, and hiding the encrypted information.
6. The method of any of claims 1-5, wherein prior to receiving an unlock message, the method further comprises:
displaying first prompt information, wherein the first prompt information is used for prompting a user to select a target access mode;
receiving operation information;
determining a target access mode according to the operation information;
after receiving an unlocking message, the method further comprises:
when the folding angle is determined to be in the angle range corresponding to the target access mode, the terminal is successfully unlocked;
and when the folding angle is determined to be out of the angle range corresponding to the target access mode, prohibiting the terminal from being unlocked.
7. A terminal, comprising:
the detection unit is used for detecting the folding angle of the folding screen of the terminal;
the receiving unit is used for receiving unlocking information, and the unlocking information is used for unlocking the terminal;
the processing unit is used for determining whether the folding angle is in a preset angle range; when the folding angle is determined to be within the preset angle range, entering a first access mode without hiding encrypted information; the encryption information is privacy information encrypted in advance; and when the folding angle is determined to be out of the preset angle range, entering a second access mode and hiding the encrypted information.
8. A terminal comprising a processor and a memory; wherein,
the memory for storing one or more computer programs; the one or more computer programs stored in the memory, when executed by the processor, cause the terminal to perform the method of any of claims 1-6.
9. A computer-readable storage medium storing computer instructions which, when executed by a terminal, cause the terminal to perform the method of any one of claims 1-6.
10. A computer program product, characterized in that the computer program product comprises computer instructions which, when executed by a terminal, cause the terminal to perform the method according to any of claims 1-6.
CN201910656543.1A 2019-07-19 2019-07-19 Method and terminal for protecting privacy information Active CN110417996B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910656543.1A CN110417996B (en) 2019-07-19 2019-07-19 Method and terminal for protecting privacy information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910656543.1A CN110417996B (en) 2019-07-19 2019-07-19 Method and terminal for protecting privacy information

Publications (2)

Publication Number Publication Date
CN110417996A true CN110417996A (en) 2019-11-05
CN110417996B CN110417996B (en) 2022-08-02

Family

ID=68362070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910656543.1A Active CN110417996B (en) 2019-07-19 2019-07-19 Method and terminal for protecting privacy information

Country Status (1)

Country Link
CN (1) CN110417996B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114546218A (en) * 2020-11-24 2022-05-27 中国联合网络通信集团有限公司 Flexible screen terminal, multi-mode system fast switching method thereof and storage medium
WO2023045932A1 (en) * 2021-09-22 2023-03-30 华为技术有限公司 Device control method and related apparatus
WO2024027374A1 (en) * 2022-08-01 2024-02-08 华为技术有限公司 Method for displaying hidden information, and device, chip system, medium and program product

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102714670A (en) * 2010-01-07 2012-10-03 日本电气株式会社 Portable information terminal and image display control method
CN103023649A (en) * 2012-11-29 2013-04-03 北京小米科技有限责任公司 Method, device and equipment for protecting privacy information
CN104598810A (en) * 2015-01-09 2015-05-06 天津三星通信技术研究有限公司 Method and equipment for realizing safe use of intelligent terminal
CN107038357A (en) * 2017-03-15 2017-08-11 北京珠穆朗玛移动通信有限公司 User authority control method and mobile terminal
CN109032406A (en) * 2018-07-10 2018-12-18 维沃移动通信有限公司 A kind of control method and mobile terminal
CN109241775A (en) * 2018-11-09 2019-01-18 维沃移动通信有限公司 A kind of method for secret protection and terminal
CN109388363A (en) * 2018-10-11 2019-02-26 Oppo(重庆)智能科技有限公司 Electronic equipment
CN109542313A (en) * 2018-11-21 2019-03-29 维沃移动通信有限公司 A kind of switching method and mobile terminal of system account

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102714670A (en) * 2010-01-07 2012-10-03 日本电气株式会社 Portable information terminal and image display control method
US20120326971A1 (en) * 2010-01-07 2012-12-27 Nec Corporation Portable information terminal and screen display control method
CN103023649A (en) * 2012-11-29 2013-04-03 北京小米科技有限责任公司 Method, device and equipment for protecting privacy information
CN104598810A (en) * 2015-01-09 2015-05-06 天津三星通信技术研究有限公司 Method and equipment for realizing safe use of intelligent terminal
CN107038357A (en) * 2017-03-15 2017-08-11 北京珠穆朗玛移动通信有限公司 User authority control method and mobile terminal
CN109032406A (en) * 2018-07-10 2018-12-18 维沃移动通信有限公司 A kind of control method and mobile terminal
CN109388363A (en) * 2018-10-11 2019-02-26 Oppo(重庆)智能科技有限公司 Electronic equipment
CN109241775A (en) * 2018-11-09 2019-01-18 维沃移动通信有限公司 A kind of method for secret protection and terminal
CN109542313A (en) * 2018-11-21 2019-03-29 维沃移动通信有限公司 A kind of switching method and mobile terminal of system account

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114546218A (en) * 2020-11-24 2022-05-27 中国联合网络通信集团有限公司 Flexible screen terminal, multi-mode system fast switching method thereof and storage medium
WO2023045932A1 (en) * 2021-09-22 2023-03-30 华为技术有限公司 Device control method and related apparatus
WO2024027374A1 (en) * 2022-08-01 2024-02-08 华为技术有限公司 Method for displaying hidden information, and device, chip system, medium and program product

Also Published As

Publication number Publication date
CN110417996B (en) 2022-08-02

Similar Documents

Publication Publication Date Title
US9754095B2 (en) Unlocking electronic devices using touchscreen input gestures
CN110417996B (en) Method and terminal for protecting privacy information
CA2766019C (en) Computing device with graphical authentication interface
US9313321B2 (en) Screen unlocking method and device for mobile terminal
US8909297B2 (en) Access management
CN106921799A (en) A kind of mobile terminal safety means of defence and mobile terminal
US10909234B2 (en) Method and apparatus for unlocking user interface
US9357391B1 (en) Unlocking electronic devices with touchscreen input gestures
CN102224487A (en) Tiltable user interface
CN105760737A (en) Control method for applications and terminal
CN110581921B (en) Control method and device for folding screen equipment
JP5517201B2 (en) Portable terminal device and program
US9280656B2 (en) Device and method for providing security channel interface
KR101359874B1 (en) The user authentication device based on one time password generation which is using the virtual input and the method
CN103019553B (en) Method and device for unlocking screen
CN106462696A (en) Authority controlling method and device
US9613201B1 (en) Access control by a mobile device using an image
US9904783B2 (en) Information processing method and electronic device
CN109118551A (en) A kind of image processing method, terminal and storage medium
KR101574243B1 (en) Method unsecured state with the mobile terminal device and the symbol
CN109800548B (en) Method and device for preventing personal information from being leaked
CN111279339B (en) Application locking method, terminal equipment and computer readable medium
KR101430199B1 (en) Device and method for providing security channel interface
CN115729498A (en) Control method and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant