CN110874489A - Control method and electronic equipment - Google Patents
Control method and electronic equipment Download PDFInfo
- Publication number
- CN110874489A CN110874489A CN201911127168.8A CN201911127168A CN110874489A CN 110874489 A CN110874489 A CN 110874489A CN 201911127168 A CN201911127168 A CN 201911127168A CN 110874489 A CN110874489 A CN 110874489A
- Authority
- CN
- China
- Prior art keywords
- target file
- operation mode
- determining
- user
- protecting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/14—Digital output to display device ; Cooperation and interconnection of the display device with other functional units
- G06F3/1454—Digital output to display device ; Cooperation and interconnection of the display device with other functional units involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays, e.g. teledisplay
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
- Controls And Circuits For Display Device (AREA)
Abstract
The embodiment of the invention provides a control method and electronic equipment, wherein the method comprises the following steps: determining that the address of the target file meets the protection condition; determining the operation mode of the system; and if the operation mode is the first operation mode, protecting the target file according to a preset protection scheme so as to prohibit the target file from normally responding to an enabling instruction input by a user. The control method of the embodiment of the invention can improve the security of the private files of the user and effectively avoid the leakage of the private files of the user.
Description
Technical Field
The embodiment of the invention relates to the field of intelligent equipment, in particular to a control method and electronic equipment.
Background
At present, companies or general users all have documents which want to be protected, but documents are often displayed on a screen in a list without loss when opened, and particularly when the electronic device is currently in a projection state, such as when an external screen displays or projects, and when the user clicks the documents for displaying, the documents are projected, and privacy is leaked. And if the system end of the electronic device records that the last display position of the file is on the external screen, when the user inserts the external screen again and clicks the file, the file can be directly displayed on the external screen, which causes great trouble for the user.
Disclosure of Invention
The embodiment of the invention provides a control method capable of improving the security of a private file of a user and avoiding the leakage of the private file and electronic equipment applying the control method.
In order to solve the above technical problem, an embodiment of the present invention provides a control method, including:
determining that the address of the target file meets the protection condition;
determining the operation mode of the system;
and if the operation mode is the first operation mode, protecting the target file according to a preset protection scheme so as to prohibit the target file from normally responding to an enabling instruction input by a user.
Preferably, the determining that the address of the target file meets the protection condition includes:
and determining that the address of the target file meets the protection condition at least in the OS stage.
Preferably, if the operation mode is the first operation mode, the method includes:
if the operation mode is the projection mode.
Preferably, the method further comprises the following steps:
determining the format of the target file;
the protecting the target file according to the preset protection scheme comprises the following steps:
if the target file is in a document format, protecting the target file according to a first protection scheme; or
And if the target file format is a video format, protecting the target file according to a second protection scheme.
Preferably, the protecting the target file according to the first protection scheme includes:
executing messy code operation on the target file to ensure that the target file cannot normally respond to the enabling instruction to display text content;
and entering a password verification state for enabling the target file to normally respond to the enabling instruction.
Preferably, the protecting the target file according to the second protection scheme includes:
at least controlling the target file to be prohibited from being processed by a display card driver so that the target file cannot normally respond to the enabling instruction to play the picture;
and entering a password verification state for enabling the target file to normally respond to the enabling instruction.
Preferably, the method further comprises the following steps:
reducing and locking a display window of the target file into a working column;
and displaying prompt information for prompting the user that the current system operation mode is the projection mode.
Preferably, the method further comprises the following steps:
determining that password authentication failed;
carrying out segmentation processing on the document content of the target file;
and temporarily defining the target file after the segmentation processing as a damaged file until the password verification is passed and the target file is restored to a normal state.
Preferably, the method further comprises the following steps:
if the password authentication is determined to fail;
keeping the target file in a state that the target file cannot normally respond to the starting instruction, or continuing to reduce and lock the display window of the target file in the working column and continuing to display the prompt message;
if the password verification is confirmed to pass;
and restoring the target file to a normal enabling state and releasing the operation control right of the equipment screen.
The embodiment of the invention also provides electronic equipment, which comprises a display device;
the controller is used for determining that the address of the target file meets the protection condition, at least determining the operation mode of the system when receiving the starting instruction of the target file, and protecting the target file according to a preset protection scheme to prohibit the target file from normally operating if the operation mode is the first operation mode.
Based on the disclosure of the embodiment, the embodiment of the invention has the advantages that the private file of the user can be effectively prevented from being leaked due to misoperation or malicious operation of others, and the safety degree of the private file of the user is improved.
Drawings
Fig. 1 is a flowchart of a control method in an embodiment of the present invention.
Fig. 2 is a flowchart of a control method according to another embodiment of the invention.
Fig. 3 is a block diagram of an electronic device in an embodiment of the present invention.
Detailed Description
The following detailed description of specific embodiments of the present invention is provided in connection with the accompanying drawings, which are not intended to limit the invention.
It will be understood that various modifications may be made to the embodiments disclosed herein. The following description is, therefore, not to be taken in a limiting sense, but is made merely as an exemplification of embodiments. Other modifications will occur to those skilled in the art within the scope and spirit of the disclosure.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the disclosure and, together with a general description of the disclosure given above, and the detailed description of the embodiments given below, serve to explain the principles of the disclosure.
These and other characteristics of the invention will become apparent from the following description of a preferred form of embodiment, given as a non-limiting example, with reference to the accompanying drawings.
It should also be understood that, although the invention has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of the invention, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present disclosure will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present disclosure are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely examples of the disclosure that may be embodied in various forms. Well-known and/or repeated functions and structures have not been described in detail so as not to obscure the present disclosure with unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the disclosure.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
As shown in fig. 1, an embodiment of the present invention provides a control method, including:
determining that the address of the target file meets the protection condition;
determining the operation mode of the system;
and if the operation mode is the first operation mode, protecting the target file according to a preset protection scheme so as to prohibit the target file from normally responding to a starting instruction input by a user.
For example, after a system of the electronic device receives an enabling instruction input by a user, a target file is determined according to the instruction, then a current storage address of the target file is determined, then an operation mode of the current system is determined, and if the storage address of the target file meets a protection condition and a current operation model of the system is a first operation mode, the target file is protected according to a preset protection scheme. Or, the system of the electronic device may also automatically check and record the files stored in the folder with the specified address in the process of starting up, for example, at the stage of power-on self-test, and when the user wants to call the files in the folder, the operation mode of the system is directly determined, and if the operation mode is the first operation mode, the protection scheme is started to prohibit the files from normally responding to the enabling instruction input by the user.
Therefore, the control method has the advantages that leakage of private files of users (namely target-to-file files, such as the files stored in the specified address folder) due to misoperation or malicious operation of others can be effectively prevented based on the control method, privacy of the users is protected, and safety degree of the private files of the users is improved.
Further, as shown in fig. 2, in the embodiment of the present application, when determining that the address where the target file is located satisfies the protection condition, the method includes:
and determining that the address of the target file meets the protection condition at least in the OS stage.
For example, in the process of booting the electronic device, after the power-on self-test enters the OS stage, the system may automatically check files in a folder with a specified address, and of course, the process may also be executed in the power-on self-test stage, where the target file is any one or more files in the folder, the files located in the folder have addresses that all satisfy the protection condition.
Further, in this embodiment of the present application, when determining that the operation mode is the first operation mode, the method includes:
if the operation mode is the projection mode.
For example, a display is currently connected to the electronic device, or another device is currently wirelessly connected to the electronic device, so that the content displayed on the current screen of the electronic device is projected onto the other display or device. The specific projection mode may include any one or more of a copy mode, an extension mode, an external screen display mode, and the like, for example. If the display mode of the current electronic equipment is that only the local screen is displayed, the system can normally run the target file after receiving the enabling instruction of the user without any operation. In this embodiment, by determining whether the operation mode of the system is the projection mode, it can be effectively avoided that the target file is mistakenly opened by the user because the user forgets the current operation mode, or the target file is mistakenly opened by other users operating the device, or the target file is opened by other users trying to maliciously peep the privacy of the user, and the system can protect the target file and prevent the target file from being easily opened and causing privacy leakage.
Further, with continuing reference to fig. 2, the method in this embodiment further includes:
determining the format of a target file;
when the system protects the target file according to the preset protection scheme, the method comprises the following steps:
if the target file is in a document format, protecting the target file according to a first protection scheme; or
And if the target file format is a video format, protecting the target file according to a second protection scheme.
That is, when determining the protection scheme for the target file, the format of the target file needs to be determined in advance, and what protection scheme is used for protection is determined according to different file formats.
Specifically, in this embodiment, when protecting the target file according to the first protection scheme, the method includes:
executing messy code operation on the target file to ensure that the target file cannot normally respond to the starting instruction to display text content;
entering a password authentication state for enabling the target file to normally respond to the enable instruction.
For example, the target file is scrambled according to a preset algorithm, so that the target file is in a scrambled state, and the enabling instruction cannot be responded normally, namely the document content is displayed normally. Then, the system automatically enters a password verification state, which can be continued until the target file is closed by the manual operation of the user, or the verification state is maintained only within a preset time period, and then the target file is automatically closed and restored to the running state of the system before the target file is not opened. In the password authentication step, the user can directly input the password previously stored in the system into the device, or send the password to the device for authentication through the mobile device, such as a mobile phone. The actual form of the password is not unique, and the password can be a common digital password, such as a digital password formed by combination of odd and even numbers customized by a user, a password formed by combination of letters and punctuations, a password formed by physiological characteristic information of the user, or a password formed by any combination of the above, and is not unique in particular. Wherein, when the password relates to the physiological characteristic information of the user, the user can input through the biological identification sensor on the electronic device and can also input through the mobile device. In addition, the electronic device can also automatically send the verification code to the mobile phone of the user, and the user can only pass the verification if inputting the verification code, and the like.
Further, in this embodiment, when protecting the target file according to the second protection scheme, the method includes:
at least controlling the target file to be prohibited from being processed by the display card drive so that the target file cannot normally respond to the enabling instruction to play the picture;
entering a password authentication state for enabling the target file to normally respond to the enable instruction.
For example, the system controls the target file to perform only the decoding operation of HEVC, but does not involve the graphics card driver to perform the decoding operation on the target file, that is, the decoding operation of the target file is performed only for the first part, so that the target file is in a buffer state in the display window and extends to a black screen state. Then, the system automatically enters a password verification state, and the specific content of the link is the same as that of the password verification state, so that the detailed description is omitted.
Further, with continuing reference to fig. 2, the method in this embodiment further includes:
reducing and locking a display window of the target file into a working column;
and displaying prompt information for prompting the user that the current system operation mode is the projection mode.
For example, when a user wants to open a target file, the system forcibly reduces and locks the display window of the target file in the work column, so that the user cannot normally open the file, and simultaneously displays a prompt message on the device screen to prompt the user that the current system operation mode is the projection mode, and if the target file is started, information leakage is caused. At this time, the system may enter the password verification state or a state of receiving a user instruction, such as popping up a dialog box to inquire whether the user continues to open the target file and be in a state of receiving the user instruction, and finally determining whether to close the target file or continue to open the target file based on the user instruction. While or before this step is performed, the system may also perform the above-mentioned processing on the target file, for example, performing scrambling processing on the target file in the text format, and performing partial decoding processing on the target file in the video format.
Further, when the user fails to verify the password, taking the format of the target file as a text format as an example, the method in this embodiment further includes:
determining that password authentication failed;
carrying out segmentation processing on the document content of the target file;
and temporarily defining the target file after the segmentation processing as a damaged file until the password verification is passed and the target file is restored to a normal state.
For example, the target file is divided according to a preset algorithm, for example, if the target file contains characters and pictures, the character part and the picture part can be separated according to the dividing operation, or if the target file is an image, the image can be divided, and a specific dividing standard can be customized by a user in advance and stored in the system, so that the system can divide according to the standard defined by the user. After the division of the file is completed, the definition of the target file is rewritten, so that the target file is temporarily defined to be a damaged file, namely, a damaged file, the system cannot normally process the file, and the file cannot respond to the enabling instruction input by the user before. If and only if the password is verified, the system processes the divided file to restore the file to the original normal state, and changes the definition and controls the file to be displayed on the screen. If the password passes the verification in the initial stage, the system can repair the target file with the messy codes, so that the codes of the target file are recovered to be normal and can be normally displayed.
Further, when the password authentication fails, the target file may also be protected by using another scheme, and specifically, the method in this embodiment further includes:
if the password authentication is determined to fail;
keeping the target file in a state that the starting instruction cannot be responded normally, or continuing to reduce and lock the display window of the target file in the working column and continuing to display the prompt message;
if the password verification is confirmed to pass;
and restoring the target file to a normal enabling state and releasing the operation control right of the equipment screen.
For example, when the format of the target file is a video format, if the password authentication fails, the target file can be continuously maintained in a partially decoded state, and the video card driver cannot decode the target file all the time, so that the target file is always in a state that the target file cannot be normally played. If the protection scheme adopted by the system involves reducing and locking the display window of the target file in the work bar, then the display window of the target file needs to be continuously locked in the work bar, and the aforementioned prompt information needs to be continuously displayed, and at this time, the control right of the screen of the electronic device is controlled by the system of the electronic device. And if the password passes the verification, the target file can be restored to an enabling state capable of normally responding to the enabling instruction of the user, for example, a video is normally played, text content is normally displayed, meanwhile, the control right of the screen of the electronic equipment is given to the user, and the user controls the display content of the screen.
As shown in fig. 3, the present embodiment also provides an electronic device, including;
and the controller is used for determining that the address of the target file meets the protection condition, at least determining the operation mode of the system when receiving a starting instruction of the target file, and protecting the target file according to a preset protection scheme to prohibit the target file from normally operating if the operation mode is the first operation mode.
For example, after a controller of the electronic device receives an enabling instruction input by a user, a target file is determined according to the instruction, then a current storage address of the target file is determined, then an operation mode of the current controller is determined, and if the storage address of the target file meets a protection condition and a current cloud model of the controller is a first operation mode, the target file is protected according to a preset protection scheme. Or, the controller of the electronic device may also automatically check and record the files stored in the folder with the specified address during the booting process, for example, at the stage of power-on self-test, and when the user wants to call the files in the folder, the controller may directly determine the operation mode of the controller, and if the operation mode is the first operation mode, the controller may start the protection scheme to prohibit the files from normally responding to the enabling instruction input by the user.
Therefore, the control method has the advantages that leakage of private files of users (namely target-to-file files, such as the files stored in the specified address folder) due to misoperation or malicious operation of others can be effectively prevented based on the control method, privacy of the users is protected, and safety degree of the private files of the users is improved.
Further, the controller in this embodiment of the application, when determining that the address of the target file meets the protection condition, includes:
and determining that the address of the target file meets the protection condition at least in the OS stage.
For example, in the power-on process of the electronic device, after the power-on self-test enters the OS stage, the controller may automatically check files in a folder with a specified address, and of course, the process may also be executed in the power-on self-test stage, where the target file is any one or more files in the folder, and the addresses of the files in the folder all satisfy the protection condition.
Further, the controller in the embodiment of the present application, when determining that the operation mode is the first operation mode, includes:
if the operation mode is the projection mode.
For example, a display is currently connected to the electronic device, or another device is currently wirelessly connected to the electronic device, so that the content displayed on the current screen of the electronic device is projected onto the other display or device. The specific projection mode may include any one or more of a copy mode, an extension mode, an external screen display mode, and the like, for example. If the display mode of the current electronic equipment is that only the local screen is displayed, the controller can normally operate the target file after receiving the enabling instruction of the user without any operation. In this embodiment, whether the operation mode of the controller is the projection mode or not is determined, so that the target file can be effectively prevented from being opened by mistake due to the fact that a user forgets the current operation mode, or the target file is opened by mistake when other users operate the device, or the target file is opened by the fact that other users want to maliciously peep the privacy of the user, and the controller can protect the target file and prevent the target file from being opened easily to cause privacy leakage.
Further, the controller in this embodiment is further configured to:
determining the format of a target file;
when the controller protects the target file according to the preset protection scheme, the method comprises the following steps:
if the target file is in a document format, protecting the target file according to a first protection scheme; or
And if the target file format is a video format, protecting the target file according to a second protection scheme.
That is, when determining the protection scheme for the target file, the format of the target file needs to be determined in advance, and what protection scheme is used for protection is determined according to different file formats.
Specifically, when the controller in this embodiment protects the target file according to the first protection scheme, the controller includes:
executing messy code operation on the target file to ensure that the target file cannot normally respond to the starting instruction to display text content;
entering a password authentication state for enabling the target file to normally respond to the enable instruction.
For example, the target file is scrambled according to a preset algorithm, so that the target file is in a scrambled state, and the enabling instruction cannot be responded normally, namely the document content is displayed normally. Then, the controller automatically enters a password verification state, which can be continued until the target file is closed by the manual operation of the user, or the verification state is maintained only within a preset time period, and then the target file is automatically closed and restored to the running state of the controller before the target file is not opened. In the password authentication step, the user can directly input the password which is previously stored in the controller into the device, and the password can also be sent to the device for authentication through mobile equipment, such as a mobile phone. The actual form of the password is not unique, and the password can be a common digital password, such as a digital password formed by combination of odd and even numbers customized by a user, a password formed by combination of letters and punctuations, a password formed by physiological characteristic information of the user, or a password formed by any combination of the above, and is not unique in particular. Wherein, when the password relates to the physiological characteristic information of the user, the user can input through the biological identification sensor on the electronic device and can also input through the mobile device. In addition, the electronic device can also automatically send the verification code to the mobile phone of the user, and the user can only pass the verification if inputting the verification code, and the like.
Further, when the controller in this embodiment protects the target file according to the second protection scheme, the method includes:
at least controlling the target file to be prohibited from being processed by the display card drive so that the target file cannot normally respond to the enabling instruction to play the picture;
entering a password authentication state for enabling the target file to normally respond to the enable instruction.
For example, the controller controls the target file to perform only the decoding operation of HEVC, but does not involve the graphics card driver to perform the decoding operation on the target file, that is, the decoding operation of the target file is performed only for the first part, so that the target file is in a buffer state in the display window and extends to a black screen state. Then, the controller automatically enters a password verification state, and the specific content of the link is the same as above and is not described again.
Further, the controller in this embodiment is further configured to:
reducing and locking a display window of the target file into a working column;
and displaying prompt information for prompting the user that the current controller operation mode is the projection mode.
For example, when a user wants to open a target file, the controller forcibly reduces and locks the display window of the target file in the work column, so that the user cannot normally open the file, and simultaneously displays a prompt message on the device screen to prompt the user that the current operation mode of the controller is a projection mode, and if the target file is started, information leakage is caused. At this time, the controller may enter the password verification state or a state of receiving a user instruction, such as popping up a dialog box to inquire whether the user continues to open the target file and be in a state of receiving the user instruction, and finally determining whether to close the target file or continue to open the target file based on the user instruction. The controller may also perform the aforementioned processing on the target file at the same time or before the step is performed, for example, scrambling the target file in the text format and partially decoding the target file in the video format.
Further, when the user fails to verify the password, taking the format of the target file as a text format as an example, the controller in this embodiment is further configured to:
determining that password authentication failed;
carrying out segmentation processing on the document content of the target file;
and temporarily defining the target file after the segmentation processing as a damaged file until the password verification is passed and the target file is restored to a normal state.
For example, the target file is divided according to a preset algorithm, for example, if the target file contains characters and pictures, the character part and the picture part can be separated according to the dividing operation, or if the target file is an image, the image can be divided, and a specific dividing standard can be customized by a user in advance and stored in the controller, so that the controller divides the target file according to the standard defined by the user. After the division of the file is completed, the definition of the target file is rewritten, so that the target file is temporarily defined to be a damaged file, namely, a damaged file, the controller cannot normally process the file, and the file cannot respond to an enabling instruction input by a user before. And if and only if the password passes the verification, the controller processes the divided file to restore the file to the original normal state, and simultaneously changes the definition and controls the file to be displayed in the screen. If the password passes the verification in the initial stage, the controller can repair the target file with the messy codes, so that the codes of the target file are recovered to be normal and can be normally displayed.
Further, when the password authentication fails, the target file may also be protected by using another scheme, and specifically, the controller in this embodiment is further configured to:
if the password authentication is determined to fail;
keeping the target file in a state that the starting instruction cannot be responded normally, or continuing to reduce and lock the display window of the target file in the working column and continuing to display the prompt message;
if the password verification is confirmed to pass;
and restoring the target file to a normal enabling state and releasing the operation control right of the equipment screen.
For example, when the format of the target file is a video format, if the password authentication fails, the target file can be continuously maintained in a partially decoded state, and the video card driver cannot decode the target file all the time, so that the target file is always in a state that the target file cannot be normally played. If the protection scheme adopted by the controller involves reducing and locking the display window of the target file in the work bar, then the display window of the target file needs to be continuously locked in the work bar, and the aforementioned prompt message needs to be continuously displayed, and at this time, the control right of the screen of the electronic device is controlled by the controller of the electronic device. And if the password passes the verification, the target file can be restored to an enabling state capable of normally responding to the enabling instruction of the user, for example, a video is normally played, text content is normally displayed, meanwhile, the control right of the screen of the electronic equipment is given to the user, and the user controls the display content of the screen.
The above embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and the scope of the present invention is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present invention, and such modifications and equivalents should also be considered as falling within the scope of the present invention.
Claims (10)
1. A control method, comprising:
determining that the address of the target file meets the protection condition;
determining the operation mode of the system;
and if the operation mode is the first operation mode, protecting the target file according to a preset protection scheme so as to prohibit the target file from normally responding to an enabling instruction input by a user.
2. The method of claim 1, wherein the determining that the address of the target file meets the protection condition comprises:
and automatically determining that the address of the target file meets the protection condition at least in the OS stage.
3. The method of claim 1, wherein said determining if the operating mode is the first operating mode comprises:
if the operation mode is the projection mode.
4. The method of claim 1, further comprising:
determining the format of the target file;
the protecting the target file according to the preset protection scheme comprises the following steps:
if the target file is in a document format, protecting the target file according to a first protection scheme; or
And if the target file format is a video format, protecting the target file according to a second protection scheme.
5. The method of claim 4, wherein the protecting the target file according to the first protection scheme comprises:
executing messy code operation on the target file to ensure that the target file cannot normally respond to the enabling instruction to display text content;
and entering a password verification state for enabling the target file to normally respond to the enabling instruction.
6. The method of claim 4, wherein the protecting the target file according to the second protection scheme comprises:
at least controlling the target file to be prohibited from being processed by a display card driver so that the target file cannot normally respond to the enabling instruction to play the picture;
and entering a password verification state for enabling the target file to normally respond to the enabling instruction.
7. The method of claim 5, further comprising:
determining that password authentication failed;
carrying out segmentation processing on the document content of the target file;
and temporarily defining the target file after the segmentation processing as a damaged file until the password verification is passed and the target file is restored to a normal state.
8. The method of claim 5 or 6, further comprising:
reducing and locking a display window of the target file into a working column;
and displaying prompt information for prompting the user that the current system operation mode is the projection mode.
9. The method of claim 7, further comprising:
if the password authentication is determined to fail;
keeping the target file in a state that the target file cannot normally respond to the starting instruction, or continuing to reduce and lock the display window of the target file in the working column and continuing to display the prompt message;
if the password verification is confirmed to pass;
and restoring the target file to a normal enabling state and releasing the operation control right of the equipment screen.
10. An electronic device, comprising;
the controller is used for determining that the address of the target file meets the protection condition and determining the operation mode of the system; and if the operation mode is the first operation mode, protecting the target file according to a preset protection scheme so as to prohibit the target file from normally responding to an enabling instruction input by a user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911127168.8A CN110874489A (en) | 2019-11-18 | 2019-11-18 | Control method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911127168.8A CN110874489A (en) | 2019-11-18 | 2019-11-18 | Control method and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110874489A true CN110874489A (en) | 2020-03-10 |
Family
ID=69718024
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911127168.8A Pending CN110874489A (en) | 2019-11-18 | 2019-11-18 | Control method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110874489A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070136466A1 (en) * | 2005-12-12 | 2007-06-14 | Nokia Corporation | Privacy protection on application sharing and data projector connectivity |
CN107728973A (en) * | 2017-08-31 | 2018-02-23 | 努比亚技术有限公司 | Screen sharing method, system, initiating terminal and computer-readable recording medium |
CN108702414A (en) * | 2017-06-16 | 2018-10-23 | 华为技术有限公司 | A kind of screen locking method and device |
CN109725966A (en) * | 2018-12-14 | 2019-05-07 | 珠海格力电器股份有限公司 | Mode conversion method, device, terminal equipment and storage medium |
CN110134356A (en) * | 2019-04-29 | 2019-08-16 | 维沃移动通信有限公司 | A kind of throwing screen method and terminal |
CN110221798A (en) * | 2019-05-29 | 2019-09-10 | 华为技术有限公司 | A kind of throwing screen method, system and relevant apparatus |
-
2019
- 2019-11-18 CN CN201911127168.8A patent/CN110874489A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070136466A1 (en) * | 2005-12-12 | 2007-06-14 | Nokia Corporation | Privacy protection on application sharing and data projector connectivity |
CN108702414A (en) * | 2017-06-16 | 2018-10-23 | 华为技术有限公司 | A kind of screen locking method and device |
CN107728973A (en) * | 2017-08-31 | 2018-02-23 | 努比亚技术有限公司 | Screen sharing method, system, initiating terminal and computer-readable recording medium |
CN109725966A (en) * | 2018-12-14 | 2019-05-07 | 珠海格力电器股份有限公司 | Mode conversion method, device, terminal equipment and storage medium |
CN110134356A (en) * | 2019-04-29 | 2019-08-16 | 维沃移动通信有限公司 | A kind of throwing screen method and terminal |
CN110221798A (en) * | 2019-05-29 | 2019-09-10 | 华为技术有限公司 | A kind of throwing screen method, system and relevant apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7346781B2 (en) | Initiating execution of a computer program from an encrypted version of a computer program | |
US7716599B2 (en) | System and computer program for controlling screen focus for files and applications during presentations | |
US9917983B2 (en) | Image forming apparatus and control method of image forming apparatus for using history of settings | |
EP1586998A1 (en) | Copy prevention apparatus, copy prevention method, and program for causing computer to execute the method | |
US20170316194A1 (en) | Apparatus and Methods for Improving Terminal Security | |
US20010007130A1 (en) | Information transmission apparatus, information reception apparatus, method for controlling these apparatuses, storage medium, and system | |
US10509913B2 (en) | Image forming system and image forming method that execute masking process on concealment region, and recording medium therefor | |
US11681809B2 (en) | Information processing apparatus, control method, and storage medium | |
CN103440446A (en) | Protective unlocking operating method and device of private content of intelligent terminal | |
EP2924566A2 (en) | Constellation based device binding | |
US9319875B2 (en) | Authentication for deciphering ciphertext and displaying deciphered information | |
JP2005354550A (en) | Cellular phone, lock function release method, program, and information record medium | |
JP2006215923A (en) | Screen saver display method and information processing system | |
CN112966276B (en) | Method, device and medium for safely starting computer | |
CN113031885B (en) | File printing preview method and device and file printing system | |
CN110874489A (en) | Control method and electronic equipment | |
US20050160068A1 (en) | Method and apparatus for processing data | |
CN108650099B (en) | Method, device and storage medium for picture authorization authentication and opening lookup | |
US11100237B2 (en) | Identify and protect sensitive text in graphics data | |
CN111814137B (en) | Operation and maintenance method, operation and maintenance system and storage medium of terminal | |
US20180285579A1 (en) | Methods and systems for enforcing security settings for printing confidential documents | |
US11514169B2 (en) | Information processing apparatus, method of controlling information processing apparatus, and storage medium | |
CN110636493B (en) | Information backup method, device and equipment of virtual SIM card and storage medium | |
KR101763184B1 (en) | File recovery method using backup | |
CN111159765B (en) | Information processing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200310 |
|
RJ01 | Rejection of invention patent application after publication |