CN111046356B - Content access method and device and computer readable storage medium - Google Patents

Content access method and device and computer readable storage medium Download PDF

Info

Publication number
CN111046356B
CN111046356B CN201911232124.1A CN201911232124A CN111046356B CN 111046356 B CN111046356 B CN 111046356B CN 201911232124 A CN201911232124 A CN 201911232124A CN 111046356 B CN111046356 B CN 111046356B
Authority
CN
China
Prior art keywords
display screen
target
content
access
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911232124.1A
Other languages
Chinese (zh)
Other versions
CN111046356A (en
Inventor
张伟超
陈军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Huantai Technology Co ltd
Original Assignee
Guangdong Huantai Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Huantai Technology Co ltd filed Critical Guangdong Huantai Technology Co ltd
Priority to CN201911232124.1A priority Critical patent/CN111046356B/en
Publication of CN111046356A publication Critical patent/CN111046356A/en
Application granted granted Critical
Publication of CN111046356B publication Critical patent/CN111046356B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a content access method, a content access device and a computer readable storage medium, which are used for receiving unlocking verification information input by the outside aiming at target display screens on a double-screen terminal with different unlocking verification security levels corresponding to each display screen; when the unlocking verification information is verified, target accessible content corresponding to the target display screen is obtained; target accessible content that controls a respective privacy protection level enters an access-enabled state on a target display screen. Through the implementation of the scheme, the contents of different privacy protection levels are naturally isolated on the display screens of different unlocking verification security levels, all the contents under the corresponding display screens can be accessed only by verifying the contents through the interaction inlets of the display screens, the convenience and the continuity of content access are effectively improved, and the intelligence of terminal privacy protection is enhanced.

Description

Content access method and device and computer readable storage medium
Technical Field
The present application relates to the field of electronic technologies, and in particular, to a content access method and apparatus, and a computer-readable storage medium.
Background
With the continuous development of terminal technology, users use terminals more and more frequently in daily life, so that part of privacy information related to the personal privacy of the users is usually stored in the terminals, and the protection of the privacy information in the terminals from being leaked is of great significance to the personal and property safety of the users.
Currently, when a terminal performs privacy protection, it is common to perform security authentication on private content (e.g., applications, data, etc.) in the terminal on an interactive portal, and only when the authentication is passed, access to the private content is allowed. Because the mode is adopted to carry out verification when each privacy content is accessed, if a user continuously uses the terminal within a certain time, the user may have access requirements on a plurality of different privacy contents, and then the user can be repeatedly subjected to security verification, so that the operation convenience and the operation consistency are low, and the intelligence of privacy protection is poor.
Disclosure of Invention
The embodiment of the application provides a content access method, a content access device and a computer-readable storage medium, which can at least solve the problems of low content access convenience and continuity and poor privacy protection intelligence caused by the fact that the security verification of content access needs to be performed at each interaction entry of specific privacy content in the related art.
A first aspect of an embodiment of the present application provides a content access method, including:
receiving unlocking verification information input by the outside aiming at a target display screen of the double-screen terminal; the unlocking verification security levels corresponding to all display screens of the double-screen terminal are different;
when the unlocking verification information passes verification, target accessible content corresponding to the target display screen is obtained; wherein the required privacy protection level for accessible content of each display screen matches the unlock verification security level;
controlling the target accessible content to enter an access activated state on the target display screen; wherein the access activation state is used to characterize that the target accessible content is allowed to be externally accessed on the target display screen.
A second aspect of the embodiments of the present application provides a content access apparatus, which is applied to a dual-screen terminal, and includes:
the receiving module is used for receiving unlocking verification information which is externally input aiming at a target display screen of the double-screen terminal; the unlocking verification security levels corresponding to all display screens of the double-screen terminal are different;
the acquisition module is used for acquiring target accessible content corresponding to the target display screen when the unlocking verification information passes verification; wherein the required privacy protection level for accessible content of each display screen matches the unlock verification security level;
the control module is used for controlling the target accessible content to enter an access activation state on the target display screen; wherein the access activation state is used to characterize that the target accessible content is allowed to be externally accessed on the target display screen.
A third aspect of embodiments of the present application provides an electronic apparatus, including: the content access method includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the steps of the content access method provided in the first aspect of the embodiments of the present application.
A fourth aspect of the embodiments of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps in the content access method provided in the first aspect of the embodiments of the present application.
As can be seen from the above, according to the content access method, device and computer-readable storage medium provided by the present application, the unlocking verification information externally input for the target display screens on the dual-screen terminal with different unlocking verification security levels corresponding to each display screen is received; when the unlocking verification information is verified, target accessible content corresponding to the target display screen is obtained; target accessible content that controls a respective privacy protection level enters an access-enabled state on a target display screen. Through the implementation of the scheme, the contents of different privacy protection levels are naturally isolated on the display screens of different unlocking verification security levels, all the contents under the corresponding display screens can be accessed only by verifying the contents through the interaction inlets of the display screens, the convenience and the continuity of content access are effectively improved, and the intelligence of terminal privacy protection is enhanced.
Drawings
Fig. 1 is a schematic basic flow chart of a content access method according to a first embodiment of the present application;
fig. 2 is a schematic flowchart of a database updating method according to a first embodiment of the present application;
fig. 3 is a schematic flowchart of another database updating method according to the first embodiment of the present application;
fig. 4 is a schematic flowchart of a data transfer method according to a first embodiment of the present application;
fig. 5 is a detailed flowchart of a content access method according to a second embodiment of the present application;
fig. 6 is a schematic diagram of program modules of a content access device according to a third embodiment of the present application;
fig. 7 is a schematic diagram of program modules of another content access device according to a third embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present application.
Detailed Description
In order to make the objects, features and advantages of the present invention more apparent and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to solve the defects that the content access is required to be safely verified at each specific privacy content interaction entry in the related art, the content access convenience and continuity are low, and the privacy protection intelligence is poor, a first embodiment of the present application provides a content access method, which is applied to a dual-screen terminal. As shown in fig. 1, which is a basic flowchart of a content access method provided in this embodiment, the content access method includes the following steps:
step 101, receiving unlocking verification information input by the external aiming at a target display screen of the double-screen terminal.
Specifically, in this embodiment, the unlocking verification security levels corresponding to the display screens of the dual-screen terminal are different, the types of the unlocking verification information may be sliding unlocking verification information, voice unlocking verification information, fingerprint unlocking verification information, face unlocking verification information, and the like, and the security levels corresponding to different types of unlocking verification information are different, for example, the security level of the fingerprint unlocking verification is higher than the security level of the sliding unlocking verification.
And 102, when the unlocking verification information is verified, acquiring target accessible content corresponding to the target display screen.
Specifically, the privacy protection level required for accessible content of each display screen of the present embodiment matches the unlock verification security level. In this embodiment, different contents are accessed on different display screens of the terminal, and the accessible contents may be applications, files, data (such as picture data and text data), and the like, and the accessible contents refer to contents that allow effective operations (such as viewing, entering, copying, forwarding, and the like) to be performed on the corresponding display screens.
And 103, controlling the target accessible content to enter an access activation state on the target display screen.
Specifically, in this embodiment, the access activation state is used to represent that the target accessible content is allowed to be accessed externally on the target display screen, and when the external user passes the unlocking verification of the target display screen, the access of the corresponding content can be realized on the target display screen. It should be understood that, in this embodiment, the privacy contents of different privacy protection levels are naturally isolated on the display screens of different unlocking verification security levels, that is, different contents are respectively accessed on each display screen, and all the contents under the corresponding display screen can be accessed only by verifying at the interaction entry of the display screen, so that unified verification of a plurality of accessible contents is realized, and verification at the interaction entry of each content is not required, so that convenience and continuity of content access can be effectively improved, and intelligence of terminal privacy protection is enhanced.
The present embodiment is illustrated by taking content as an application, and there are five applications of the threshold in the dual-screen terminal, respectively A, B, C, D, E, wherein application a, application B and application C are applications with privacy levels above a certain level threshold, and application D and application E are applications with lower privacy levels, in addition, the front display screen of the terminal adopts a fingerprint verification unlocking mode with higher unlocking verification safety level, while the back display screen adopts a common sliding unlocking mode, so that application a, application B and application C are accessible applications corresponding to the front side display of the terminal, and the application D and the application E are accessible applications corresponding to the display screen on the back side of the terminal, and in practical applications, after the unlocking verification of the corresponding display screen is completed, the display screen analyzes and displays the application data information of the corresponding accessible application, so that a user can access all displayed applications on the display screen by one-time verification.
In addition, in an optional implementation manner of this embodiment, when the dual-screen terminal is a folding screen terminal, if the folding screen terminal is in an unfolded state and both the two display screens complete unlocking verification and are in an awake state, at this time, the two display screens are combined into one complete display screen, and then the accessible contents respectively corresponding to the two display screens are controlled to enter an access activation state on the combined display screen.
In an optional implementation manner of this embodiment, the obtaining the target accessible content corresponding to the target display screen includes: acquiring a display screen identifier of a target display screen; and inquiring target accessible content corresponding to the display screen identification according to a preset content index database.
Specifically, the content index database of this embodiment includes a corresponding relationship between a display screen identifier and accessible content, and the content index database may be pre-stored in the terminal or may be obtained from the background server in real time. When the content database is established, the user can manually establish the corresponding relation between the accessible content and the display screen identification according to own preference and requirement, or the terminal can count the user habits according to the historical use behaviors of the user and then automatically establish the corresponding relation between the accessible content and the display screen identification. It should be understood that the display identifier here may be a display ID, for example, the display identifier of the front display is set to the screen ID1 field, and the display identifier of the back display is set to the screen ID2 field.
In an optional implementation manner of this embodiment, after controlling the target accessible content to enter the access activated state on the target display screen, the method further includes: when new content is received on the target display screen, establishing a corresponding relation between the new content and a display screen identifier of the target display screen; and adding the established corresponding relation to a content index database.
Specifically, in practical applications, new content may be generated during the operation of the terminal on a specific display screen from the outside, for example, an application may be newly installed, new data or a new file may be acquired, and it should be understood that the acquired new data or new file may be acquired by an application on the terminal or may be received based on a bluetooth connection with the external terminal. Since the new content is obtained based on the operation performed on the current display screen, the privacy protection level required by the generated new content should be consistent with the accessible content of the display screen itself, so that the embodiment establishes the corresponding relationship between the new content and the display screen identifier of the display screen, so that when the display screen is subsequently unlocked again, only the new content is accessed and activated on the display screen, that is, the new content is subsequently only allowed to access the display screen operated when the content is generated.
As shown in fig. 2, a schematic flow chart of a database updating method provided in this embodiment is further shown, and in an optional implementation manner of this embodiment, the method further includes the following steps:
step 201, when the double-screen terminal receives new content, detecting the working state of a display screen with a high unlocking verification security level on the double-screen terminal;
step 202, when the display screen with the high unlocking verification security level is in an awakening state, establishing a corresponding relation between the new content and the display screen identification of the display screen with the high unlocking verification security level;
step 203, adding the established corresponding relation to the content index database.
In particular, in practical applications, the reception of new content by the dual-screen terminal is not necessarily associated with whether the display is unlocked, for example, the display is in a locked state but the application is still running in the background to receive new data. In this embodiment, when the terminal receives a new content, once a display screen with a relatively high unlocking verification security level in two display screens of the terminal is in an awakening state, regardless of whether a display screen with a low unlocking verification security level is in an extinguished state or both display screens are in an awakening state at the same time, a corresponding relationship between the new content and a display screen identifier of a display screen with a high unlocking verification security level is established, so that when the display screen is subsequently unlocked again, the new content is only accessed and activated on the display screen with the high unlocking verification security level, so as to further enhance the privacy protection of the terminal.
As shown in fig. 3, which is a schematic flow chart of another database updating method provided in this embodiment, further, in an optional implementation manner of this embodiment, after controlling the accessible content of the target to enter the access activated state on the target display screen, the method further includes the following steps:
step 301, when receiving an access switching instruction input aiming at target accessible content, determining another display screen except a target display screen on the dual-screen terminal as a display screen to be switched;
step 302, establishing a corresponding relation between target accessible content and a display screen identifier of a display screen to be switched;
step 303, updating the established corresponding relation to a content index database.
In particular, in practical applications, the privacy protection requirements of users for specific content may change, for example, the privacy protection requirements for content that has previously required a high privacy protection level are currently reduced, or the privacy protection requirements for content that has previously required a low privacy protection level are currently enhanced. Based on this, in order to dynamically adapt to diversified privacy protection requirements of users, in this embodiment, an access switching interface is provided to the outside, when an access switching instruction associated with specific accessible content on a target display screen, which is input from the outside, is received through the access switching interface, a content to be switched and accessed is established, and a corresponding relationship with a display screen identifier of another display screen other than the display screen where the content is located before access is performed, and the corresponding relationship is updated to a content index database, and an original corresponding relationship associated with the content to be switched and accessed is replaced through the re-established corresponding relationship, so that the content to be switched and accessed subsequently needs to be accessed on the switched display screen, and the access to the content is no longer supported on the display screen where the content is accessed originally.
In an optional implementation manner of this embodiment, the obtaining the target accessible content corresponding to the target display screen includes: acquiring an access authority level corresponding to the unlocking verification information; target accessible content is determined from all of the selectable accessible content corresponding to the target display screen based on the access permission level.
Specifically, in this embodiment, considering that one terminal may have a plurality of legitimate users, and different users usually have different usage rights, for example, the owner has the highest usage right and the parent has the next usage right, based on this, the embodiment further refines the content access behavior on each display screen, and determines the content that should be accessed from all the selectable accessible contents on the target display screen according to the access right level of the user, thereby providing more comprehensive and careful privacy protection.
As shown in fig. 4, which is a flowchart of a data transfer method provided in this embodiment, further, in an optional implementation manner of this embodiment, after receiving unlocking verification information input by an external device for a target display screen of a dual-screen terminal, the method further includes the following steps:
step 401, when the unlocking verification information is failed to be continuously verified, obtaining the number of times of continuous verification failure;
step 402, when the number of continuous verification failures exceeds a threshold number, sending a communication connection request to a target terminal;
and step 403, when the connection success response sent by the target terminal is received, transferring the data related to the target accessible content to the target terminal based on the communication connection with the target terminal.
Specifically, in practical applications, when a user fails to perform unlocking verification on a display screen, the unlocking verification is usually repeatedly attempted, and in order to avoid accidental unlocking by multiple unlocking attempts of an illegal user on the display screen of a terminal, so that accessible content corresponding to the display screen is accessed by the illegal user and privacy of the user is leaked. It should be understood that the target terminal of the present embodiment may be a standby terminal or a wearable device held by the end user, or may be a terminal held by an emergency contact set by the user.
Based on the technical scheme of the embodiment of the application, unlocking verification information input by the outside aiming at target display screens on the double-screen terminal with different unlocking verification security levels corresponding to the display screens is received; when the unlocking verification information is verified, target accessible content corresponding to the target display screen is obtained; target accessible content that controls a respective privacy protection level enters an access-enabled state on a target display screen. Through the implementation of the scheme, the contents of different privacy protection levels are naturally isolated on the display screens of different unlocking verification security levels, all the contents under the corresponding display screens can be accessed only by verifying the contents through the interaction inlets of the display screens, the convenience and the continuity of content access are effectively improved, and the intelligence of terminal privacy protection is enhanced.
The method in fig. 5 is a refined content access method provided in the second embodiment of the present application, where the content access method includes:
step 501, receiving unlocking verification information input by an external target display screen of the double-screen terminal, and judging whether the received unlocking verification information is legal; if yes, go to step 502, otherwise, go back to step 501.
Specifically, the unlocking verification security levels corresponding to the display screens of the dual-screen terminal of this embodiment are different, and the types of the unlocking verification information may be sliding unlocking verification information, voice unlocking verification information, fingerprint unlocking verification information, face unlocking verification information, and the like.
And 502, acquiring a display screen identifier of the target display screen.
Step 503, querying all target accessible applications corresponding to the display screen identifier according to a preset application index database.
In this embodiment, the privacy protection level required by the accessible application of each display screen is matched with the unlocking verification security level, that is, the accessible application on the display screen with the high unlocking verification security level is an application with the high privacy protection level, the content index database includes a correspondence between the display screen identifier and the accessible application, and the content index database may be pre-stored in the terminal or may be obtained from the background server in real time.
And step 504, controlling all target accessible applications to enter an access activation state on the target display screen.
In a practical application, the access-enabled state is used to characterize that the target-accessible application is allowed to be externally accessed on the target display screen. According to the embodiment, all target accessible applications are verified in a unified mode on the target display screen, unified privacy protection of multiple applications is achieved, all applications under the corresponding display screen can be accessed only through verification at the interaction entrance of the display screen, and convenience of application access can be effectively improved.
And 505, when an access switching instruction input aiming at the target accessible application is received, determining another display screen except the target display screen on the dual-screen terminal as a display screen to be switched.
Specifically, in order to dynamically adapt to diversified privacy protection requirements of a user, the present embodiment provides an access switching interface to the outside, so as to switch an application on a current display screen to another display screen to provide access when the privacy protection requirement of the user for a specific application changes.
Step 506, establishing a corresponding relation between the target accessible application and the display screen identifier of the display screen to be switched.
And step 507, updating the established corresponding relation to a content index database.
In this embodiment, when an access switching instruction associated with a specific application on a target display screen, which is input from the outside, is received through the access switching interface, an application requiring switching access is established, and a corresponding relationship with a display screen identifier of another display screen other than the display screen where the application is located before access is performed, and the corresponding relationship is updated to the content index database, and the original corresponding relationship associated with the application requiring switching access is replaced by the re-established corresponding relationship.
It should be understood that, the size of the serial number of each step in this embodiment does not mean the execution sequence of the step, and the execution sequence of each step should be determined by its function and inherent logic, and should not be limited uniquely to the implementation process of the embodiment of the present application.
The embodiment of the application discloses a content access method, which comprises the steps of receiving unlocking verification information input by the outside aiming at target display screens on double-screen terminals which correspond to all the display screens and have different unlocking verification security levels; when the unlocking verification information is verified, acquiring a target accessible application corresponding to a target display screen; the target accessible application controlling the respective privacy protection level enters an access-enabled state on the target display screen. Through the implementation of the scheme, the applications at different privacy protection levels are naturally isolated on the display screens at different unlocking verification security levels, all applications under the corresponding display screens can be accessed only by verifying the applications at the interaction inlets of the display screens, the convenience and the continuity of application access are effectively improved, and the intelligence of terminal privacy protection is enhanced.
Fig. 6 is a content access device according to a third embodiment of the present application. The content access apparatus may be used to implement the content access method in the foregoing embodiments. As shown in fig. 6, the content access apparatus mainly includes:
the receiving module 601 is configured to receive unlocking verification information externally input to a target display screen of the dual-screen terminal; the unlocking verification security levels corresponding to all display screens of the double-screen terminal are different;
an obtaining module 602, configured to obtain target accessible content corresponding to a target display screen when the unlocking verification information is verified; wherein the privacy protection level required by the accessible content of each display screen matches the unlock verification security level;
a control module 603 for controlling the target accessible content to enter an access activated state on the target display screen; wherein the access activation state is used to characterize the target accessible content as being externally accessible on the target display screen.
In an optional implementation manner of this embodiment, the obtaining module 602 is specifically configured to: when the unlocking verification information is verified, acquiring a display screen identifier of a target display screen; inquiring target accessible content corresponding to the display screen identification according to a preset content index database; wherein the content index database comprises a correspondence of display screen identifications and accessible content.
As shown in fig. 7, another content access apparatus provided in this embodiment is a content access apparatus, in an optional implementation manner of this embodiment, the content access apparatus further includes: an adding module 604, configured to, after controlling the target accessible content to enter an access activated state on the target display screen, if new content is received on the target display screen, establish a corresponding relationship between the new content and a display screen identifier of the target display screen; and adding the established corresponding relation to a content index database.
In an optional implementation manner of this embodiment, the adding module 604 is further configured to: when the double-screen terminal receives new content, detecting the working state of a display screen with a high unlocking verification security level on the double-screen terminal; when the display screen with the high unlocking verification security level is in an awakening state, establishing a corresponding relation between the new content and the display screen identification of the display screen with the high unlocking verification security level; and adding the established corresponding relation to a content index database.
Referring to fig. 7 again, in an alternative implementation manner of this embodiment, the content access apparatus further includes: an updating module 605, configured to, after controlling the target accessible content to enter an access activated state on the target display screen, determine, if an access switching instruction input for the target accessible content is received, another display screen other than the target display screen on the dual-screen terminal as a display screen to be switched; establishing a corresponding relation between the target accessible content and a display screen identifier of a display screen to be switched; and updating the established corresponding relation to a content index database.
In an optional implementation manner of this embodiment, the obtaining module 602 is specifically configured to: when the unlocking verification information is verified, obtaining an access authority level corresponding to the unlocking verification information; target accessible content is determined from all of the selectable accessible content corresponding to the target display screen based on the access permission level.
With reference to fig. 7, in a further alternative implementation manner of this embodiment, the content access apparatus further includes: the transfer module 606 is configured to, after receiving unlocking verification information input externally for a target display screen of the dual-screen terminal, obtain the number of continuous verification failures when the continuous verification of the unlocking verification information fails; when the continuous verification failure times exceed the time threshold, sending a communication connection request to a target terminal; upon receiving a connection success response sent by the target terminal, data associated with the target accessible content is transferred to the target terminal based on the communication connection with the target terminal.
It should be noted that, the content access methods in the first and second embodiments can be implemented based on the content access device provided in this embodiment, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the content access device described in this embodiment may refer to the corresponding process in the foregoing method embodiment, and details are not described here again.
According to the content access device provided by the embodiment, unlocking verification information input by the outside aiming at target display screens on the double-screen terminal with different unlocking verification security levels corresponding to each display screen is received; when the unlocking verification information is verified, target accessible content corresponding to the target display screen is obtained; target accessible content that controls a respective privacy protection level enters an access-enabled state on a target display screen. Through the implementation of the scheme, the contents of different privacy protection levels are naturally isolated on the display screens of different unlocking verification security levels, all the contents under the corresponding display screens can be accessed only by verifying the contents through the interaction inlets of the display screens, the convenience and the continuity of content access are effectively improved, and the intelligence of terminal privacy protection is enhanced.
Referring to fig. 8, fig. 8 is an electronic device according to a fourth embodiment of the present disclosure. The electronic device may be used to implement the content access method in the foregoing embodiments. As shown in fig. 8, the electronic device mainly includes:
a memory 801, a processor 802, a bus 803, and computer programs stored on the memory 801 and executable on the processor 802, the memory 801 and the processor 802 being connected by the bus 803. The processor 802, when executing the computer program, implements the content access method in the foregoing embodiments. Wherein the number of processors may be one or more.
The Memory 801 may be a high-speed Random Access Memory (RAM) Memory or a non-volatile Memory (non-volatile Memory), such as a disk Memory. The memory 801 is used to store executable program code, and the processor 802 is coupled to the memory 801.
Further, an embodiment of the present application also provides a computer-readable storage medium, where the computer-readable storage medium may be provided in an electronic device in the foregoing embodiments, and the computer-readable storage medium may be the memory in the foregoing embodiment shown in fig. 8.
The computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements the content access method in the foregoing embodiments. Further, the computer-readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a RAM, a magnetic disk, or an optical disk.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a readable storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned readable storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present application is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In view of the above description of the content access method, apparatus and computer-readable storage medium provided by the present application, those skilled in the art will recognize that the scope of the present application can be varied from the detailed description to the specific application.

Claims (9)

1. A content access method is applied to a double-screen terminal and is characterized by comprising the following steps:
receiving unlocking verification information input by the outside aiming at a target display screen of the double-screen terminal; the unlocking verification security levels corresponding to all display screens of the double-screen terminal are different;
when the unlocking verification information is verified, obtaining target accessible content corresponding to the target display screen, specifically including: acquiring a display screen identifier of the target display screen; inquiring target accessible content corresponding to the display screen identification according to a preset content index database; the target accessible content is content which allows effective operation on the target display screen, the privacy protection level required by the accessible content of each display screen is matched with the unlocking verification security level, and the content index database comprises a corresponding relation between display screen identification and the accessible content;
controlling the target accessible content to enter an access activated state on the target display screen; wherein the access activation state is used to characterize that the target accessible content is allowed to be externally accessed on the target display screen.
2. The content access method of claim 1, wherein after the controlling the target accessible content to enter an access-enabled state on the target display screen, further comprising:
when new content is received on the target display screen, establishing a corresponding relation between the new content and a display screen identifier of the target display screen;
and adding the established corresponding relation to the content index database.
3. The content access method according to claim 1, further comprising:
when the double-screen terminal receives new content, detecting the working state of a display screen with a high unlocking verification security level on the double-screen terminal;
when the display screen with the high unlocking verification security level is in an awakening state, establishing a corresponding relation between the new content and the display screen identification of the display screen with the high unlocking verification security level;
and adding the established corresponding relation to the content index database.
4. The content access method of claim 1, wherein after the controlling the target accessible content to enter an access-enabled state on the target display screen, further comprising:
when an access switching instruction input aiming at the target accessible content is received, determining another display screen except the target display screen on the dual-screen terminal as a display screen to be switched;
establishing a corresponding relation between the target accessible content and the display screen identifier of the display screen to be switched;
and updating the established corresponding relation to the content index database.
5. The content access method of claim 1, wherein the obtaining target-accessible content corresponding to the target display screen comprises:
acquiring an access authority level corresponding to the unlocking verification information;
target accessible content is determined from all of the selectable accessible content corresponding to the target display screen based on the access permission level.
6. The content access method according to any one of claims 1 to 5, wherein after receiving unlocking verification information externally input for a target display screen of the dual-screen terminal, the method further comprises:
when the unlocking verification information is failed to be continuously verified, acquiring the number of continuous verification failure times;
when the continuous verification failure times exceed a time threshold, sending a communication connection request to a target terminal;
and when the connection success response sent by the target terminal is received, transferring the data associated with the target accessible content to the target terminal based on the communication connection with the target terminal.
7. A content access device applied to a dual-screen terminal, comprising:
the receiving module is used for receiving unlocking verification information which is externally input aiming at a target display screen of the double-screen terminal; the unlocking verification security levels corresponding to all display screens of the double-screen terminal are different;
an obtaining module, configured to obtain target accessible content corresponding to the target display screen when the unlocking verification information is verified, where the obtaining module specifically includes: acquiring a display screen identifier of the target display screen; inquiring target accessible content corresponding to the display screen identification according to a preset content index database; the target accessible content is content which allows effective operation on the target display screen, the privacy protection level required by the accessible content of each display screen is matched with the unlocking verification security level, and the content index database comprises a corresponding relation between display screen identification and the accessible content;
the control module is used for controlling the target accessible content to enter an access activation state on the target display screen; wherein the access activation state is used to characterize that the target accessible content is allowed to be externally accessed on the target display screen.
8. An electronic device, comprising: the system comprises a memory, a processor and a bus, wherein the bus is used for realizing connection communication between the memory and the processor; the processor is configured to execute a computer program stored on the memory, and when the processor executes the computer program, the processor implements the steps of the method of any one of claims 1 to 6.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN201911232124.1A 2019-12-05 2019-12-05 Content access method and device and computer readable storage medium Active CN111046356B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911232124.1A CN111046356B (en) 2019-12-05 2019-12-05 Content access method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911232124.1A CN111046356B (en) 2019-12-05 2019-12-05 Content access method and device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111046356A CN111046356A (en) 2020-04-21
CN111046356B true CN111046356B (en) 2022-03-15

Family

ID=70234857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911232124.1A Active CN111046356B (en) 2019-12-05 2019-12-05 Content access method and device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111046356B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114047860A (en) * 2021-11-04 2022-02-15 珠海读书郎软件科技有限公司 Application display control system and method of intelligent equipment
CN114047858A (en) * 2021-11-15 2022-02-15 珠海读书郎软件科技有限公司 Double-screen telephone watch application management method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103995667A (en) * 2014-05-14 2014-08-20 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal screen unlocking method
EP2804126A1 (en) * 2013-05-14 2014-11-19 Samsung Electronics Co., Ltd Detection of loss and automatically locking of a mobile device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102902935A (en) * 2012-09-26 2013-01-30 广东欧珀移动通信有限公司 Mobile terminal privacy protection method and device
CN105989302A (en) * 2015-02-27 2016-10-05 赵绩琪 Multimode unlocking and multilevel privacy protection method based on intelligent terminal
KR102406099B1 (en) * 2017-07-13 2022-06-10 삼성전자주식회사 Electronic device and method for displaying information thereof
CN108052845A (en) * 2017-10-31 2018-05-18 努比亚技术有限公司 file display control method, terminal and computer readable storage medium
CN108121921A (en) * 2017-11-28 2018-06-05 北京珠穆朗玛移动通信有限公司 Method for information display, mobile terminal and storage medium based on double screen
CN109359453B (en) * 2018-09-04 2021-08-24 Oppo(重庆)智能科技有限公司 Unlocking method and related product

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2804126A1 (en) * 2013-05-14 2014-11-19 Samsung Electronics Co., Ltd Detection of loss and automatically locking of a mobile device
CN103995667A (en) * 2014-05-14 2014-08-20 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal screen unlocking method

Also Published As

Publication number Publication date
CN111046356A (en) 2020-04-21

Similar Documents

Publication Publication Date Title
US11216549B2 (en) Security verification method and device
CN105681328A (en) Electronic device controlling method and device as well as electronic device
US9378344B2 (en) Method and apparatus for protecting information based on data card
US9930705B2 (en) Mobile terminal control method, apparatus and system
CN103778381A (en) Application screen locking method and device based on Android
CN112073289B (en) Instant messaging control method and device
CN111046356B (en) Content access method and device and computer readable storage medium
CN104350723A (en) Login method and device
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN112016068A (en) Account control method, device, equipment and computer readable storage medium
CN103477329A (en) System and method for facilitating unlocking a device connected locally to a client
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN104469736A (en) Data processing method, server and terminal
WO2016072833A1 (en) System and method to disable factory reset
CN102156826A (en) Provider management method and system
CN102411692B (en) Method, system and equipment for running terminal
KR101553482B1 (en) Authentication System For Password And Method
WO2016187966A1 (en) Terminal and method for protecting data security of terminal
CN104995635B (en) Picture sending method and device and terminal device
CN108990041B (en) Method and equipment for setting main card and auxiliary card
KR102051396B1 (en) System and method for synchronizing clipboards and sharing documents between multiple devices
CN111031145A (en) Remote assistance method and system based on intelligent terminal
CN111369718A (en) Method and system for marking and notifying intelligent door lock hijack function
CN112165706A (en) Equipment connection management method and device and Bluetooth equipment
US11153302B2 (en) Peering method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant