CN111090868A - Terminal screen display control method, terminal and computer readable storage medium - Google Patents

Terminal screen display control method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN111090868A
CN111090868A CN201911272732.5A CN201911272732A CN111090868A CN 111090868 A CN111090868 A CN 111090868A CN 201911272732 A CN201911272732 A CN 201911272732A CN 111090868 A CN111090868 A CN 111090868A
Authority
CN
China
Prior art keywords
encrypted
track
target
preset
display control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911272732.5A
Other languages
Chinese (zh)
Inventor
王双磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN201911272732.5A priority Critical patent/CN111090868A/en
Publication of CN111090868A publication Critical patent/CN111090868A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a terminal screen display control method, a terminal and a computer readable storage medium, wherein the method comprises the following steps: acquiring an encrypted suspension track generated by a suspension object sliding above a screen; and acquiring an encrypted object according to the encrypted suspension track, and hiding the encrypted object. The invention realizes the rapid control of the screen display of the mobile terminal, simplifies the encryption process and plays a role in protecting the information of the terminal user.

Description

Terminal screen display control method, terminal and computer readable storage medium
Technical Field
The invention relates to the technical field of terminals, in particular to a terminal screen display control method, a terminal and a computer readable storage medium.
Background
In recent years, mobile terminals represented by smart phones have been developed rapidly, and as manufacturing costs and functions thereof have been reduced and updated, the popularity thereof has been increased, and most people have at least one mobile device such as a smart phone. With the pace of life of people increasing, and thanks to the advantages of convenience of mobile devices and the like, more and more people begin to use mobile devices such as smart phones and the like more than traditional computers, information security technologies of traditional computers have become mature day by day through decades of development, but are limited by hardware frames and network environments of mobile platforms, and the information security technologies are not suitable for mobile terminals. Currently, information security problems caused by mobile devices such as smart phones are frequent, and it is very important to protect information of mobile platforms.
In the existing terminal encryption process, a setting interface needs to be opened first, an encrypted file or picture is selected, then the operation to be encrypted is confirmed, then an authentication mode such as fingerprint verification or password input is popped up to enable a user to authenticate, and encryption is completed after the authentication is passed.
Disclosure of Invention
The invention mainly aims to provide a terminal screen display control method, a terminal and a computer readable storage medium, and aims to solve the problem that the encryption operation process of the terminal in the prior art is complicated.
In order to achieve the above object, the present invention provides a terminal screen display control method, including:
acquiring an encrypted suspension track generated by a suspension object sliding above a screen;
and acquiring an encrypted object according to the encrypted suspension track, and hiding the encrypted object.
Further, the step of obtaining the encrypted object based on the encrypted target track comprises:
judging the interface type of the interface where the screen is located;
if the interface type is a main screen, continuously judging whether the encrypted target track is a preset first track;
and if the encrypted target track is a preset first track, determining that the main screen bound with the preset first track is the encrypted object.
Further, after the step of continuously determining whether the encrypted target trajectory is the preset first trajectory if the interface type is the home screen, the method further includes:
if the encrypted target track is not the preset first track, continuously judging whether the encrypted target track is a preset second track;
if the encrypted target track is the preset second track, determining that the application identifier bound with the preset second track is the encrypted object;
further, after the step of continuously determining whether the encrypted target track is the preset second track if the encrypted target track is not the preset first track, the method further includes:
if the encrypted target track is not the preset second track, continuously judging whether the encrypted target track passes through the application identifier on the main screen;
and if the encrypted track passes through the application identifier on the main screen, determining that the application identifier on the main screen through which the encrypted track passes is the encrypted object.
Further, after the step of continuously determining whether the encrypted target trajectory passes through the application identifier on the main screen if the encrypted target trajectory is not the preset second trajectory, the method further includes:
and if the encrypted target track does not pass through the application identifier on the main screen, determining that the main screen is the encrypted object.
Further, the step of judging the interface type of the interface where the screen is located further includes:
if the interface type is a non-main screen, judging whether the encrypted target track is a preset third track;
and if the encrypted target track is a preset third track, determining all information related to the key information of the non-main screen in the terminal as the encrypted object.
Further, after the step of determining whether the encrypted target trajectory is a preset third trajectory if the interface type is a non-home screen, the method further includes:
and if the encrypted target track is not a preset third track, determining the non-main screen as the encrypted object.
Further, the step of obtaining the encrypted object according to the encrypted floating track includes:
generating an encrypted target track according to the encrypted suspension track, and distributing a secret key ID to the encrypted target track;
storing the encrypted target track and the secret key ID according to a one-to-one corresponding relationship;
and acquiring the encrypted object based on the encrypted target track.
Further, the step of generating an encrypted target track according to the encrypted levitation track includes:
drawing a perpendicular line perpendicular to the screen through a point on the encrypted suspension track, and setting an intersection point of the perpendicular line and the screen as a target point;
and taking the track formed by connecting all the target points as the encrypted target track.
Further, the step of assigning a key ID to the encrypted target track includes:
setting the horizontal and vertical coordinates of the target point on the encrypted target track as target data;
judging the target shape of the target track according to the target data;
and distributing a key ID for the target shape, wherein the key ID records the information of the encrypted object and the target shape.
Further, after the step of obtaining an encrypted object according to the encrypted floating trajectory and hiding the encrypted object, the method further includes:
if a decryption suspension track is received, generating a decryption target track corresponding to the decryption suspension track;
detecting whether the encrypted target track matched with the decrypted target track is prestored;
if yes, determining and displaying an encryption object pointed by the matched encryption target track based on the key ID corresponding to the matched encryption target track.
In addition, to achieve the above object, the present invention also provides a terminal screen display control device, including:
the acquisition module is used for acquiring an encrypted suspension track generated by the suspension object sliding above the screen;
the obtaining module is further used for obtaining an encrypted object according to the encrypted suspension track;
a hiding module for hiding the encrypted object.
In addition, in order to achieve the above object, the present invention further provides a terminal, which includes a memory, a processor, and a terminal screen display control program stored on the memory and operable on the processor, wherein the terminal screen display control program, when executed by the processor, implements the steps of the terminal screen display control method as described above.
Further, to achieve the above object, the present invention also provides a computer-readable storage medium having the terminal screen display control program stored thereon, which when executed by a processor, implements the steps of the terminal screen display control method as described above.
The method comprises the steps of obtaining an encrypted suspension track generated by sliding a suspension object above a screen; the encryption object is obtained according to the encryption suspension track and hidden, so that the screen display of the mobile terminal is quickly controlled, the encryption flow is simplified, the encryption operation process is simple, the time consumption is low, and the user experience is further improved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of a terminal for implementing various embodiments of the present invention;
FIG. 2 is a flowchart illustrating a method for controlling screen display of a terminal according to a first embodiment of the present invention;
FIG. 3 is a diagram illustrating a method for controlling screen display of a terminal according to the present invention to hide a plurality of main screens;
FIG. 4 is a diagram illustrating a method for controlling the display of a terminal screen according to the present invention to hide application identifiers of the same type;
FIG. 5 is a diagram illustrating a specific application identifier hidden by the terminal screen display control method according to the present invention;
fig. 6 is a schematic diagram illustrating the method for controlling the display of the terminal screen to hide the current main screen according to the present invention.
The implementation, functional features and advantages of the present invention will be described with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a terminal screen display control terminal, and referring to fig. 1, fig. 1 is a schematic structural diagram of a hardware operating environment according to an embodiment of the invention.
It should be noted that fig. 1 is a schematic structural diagram of a hardware operating environment of a terminal that operates the terminal screen display control method. The terminal of the embodiment of the invention can be a PC, a portable computer, a server and other terminals.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a memory 1005, a user interface 1003, a network interface 1004, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Optionally, the terminal operating the terminal screen display control method may further include an RF (Radio Frequency) circuit, a sensor, a WiFi module, and the like.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 for operating the terminal screen display control method may also include more or less components than those shown, or combine some components, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a computer-storage readable storage medium, may include therein an operating system, a network communication module, a user interface module, and a terminal screen display control program. The operating system is a program for managing and controlling hardware and software resources of the terminal screen display control terminal, and supports the operation of the terminal screen display control program and other software or programs.
The terminal operating the terminal screen display control method shown in fig. 1 may be used for echo cancellation, and the user interface 1003 is mainly used for detecting or outputting various information, such as detecting an encrypted floating track and outputting an encrypted object; the network interface 1004 is mainly used for interacting with a background server and communicating; the processor 1001 may be configured to call a terminal screen display control program stored in the memory 1005, and perform the following operations:
acquiring an encrypted suspension track generated by a suspension object sliding above a screen;
and acquiring an encrypted object according to the encrypted suspension track, and hiding the encrypted object.
Further, the step of obtaining the encrypted object based on the encrypted target track comprises:
judging the interface type of the interface where the screen is located;
if the interface type is a main screen, continuously judging whether the encrypted target track is a preset first track;
and if the encrypted target track is a preset first track, determining that the main screen bound with the preset first track is the encrypted object.
Further, after the step of continuously determining whether the encrypted target trajectory is the preset first trajectory if the interface type is the main screen, the processor 1001 is further configured to call a terminal screen display control program stored in the memory 1005, and execute the following operations:
if the encrypted target track is not the preset first track, continuously judging whether the encrypted target track is a preset second track;
and if the encrypted target track is the preset second track, determining that the application identifier bound with the preset second track is the encrypted object.
Further, after the step of continuously determining whether the encrypted target trajectory is the preset second trajectory if the encrypted target trajectory is not the preset first trajectory, the processor 1001 is further configured to invoke a terminal screen display control program stored in the memory 1005, and execute the following operations:
if the encrypted target track is not the preset second track, continuously judging whether the encrypted target track passes through the application identifier on the main screen;
and if the encrypted track passes through the application identifier on the main screen, determining that the application identifier on the main screen through which the encrypted track passes is the encrypted object.
Further, after the step of continuously determining whether the encrypted target trajectory passes through the application identifier on the main screen if the encrypted target trajectory is not the preset second trajectory, the processor 1001 is further configured to call a terminal screen display control program stored in the memory 1005, and perform the following operations:
and if the encrypted target track does not pass through the application identifier on the main screen, determining that the main screen is the encrypted object.
Further, after the step of determining the interface type of the interface where the screen is located, the processor 1001 is further configured to call a terminal screen display control program stored in the memory 1005, and perform the following operations:
if the interface type is a non-main screen, judging whether the encrypted target track is a preset third track;
and if the encrypted target track is a preset third track, determining all information related to the key information of the non-main screen in the terminal as the encrypted object.
Further, after the step of determining whether the encrypted target trajectory is the preset third trajectory if the interface type is the non-home screen, the processor 1001 is further configured to call a terminal screen display control program stored in the memory 1005, and execute the following operations:
and if the encrypted target track is not a preset third track, determining the non-main screen as the encrypted object.
Further, the step of obtaining the encrypted object according to the encrypted floating track includes:
generating an encrypted target track according to the encrypted suspension track, and distributing a secret key ID to the encrypted target track;
storing the encrypted target track and the secret key ID according to a one-to-one corresponding relationship;
and acquiring the encrypted object based on the encrypted target track.
Further, the step of generating an encrypted target track according to the encrypted levitation track includes:
drawing a perpendicular line perpendicular to the screen through a point on the encrypted suspension track, and setting an intersection point of the perpendicular line and the screen as a target point;
and taking the track formed by connecting all the target points as the encrypted target track.
Further, the step of assigning a key ID to the encrypted target track includes:
setting the horizontal and vertical coordinates of the target point on the encrypted target track as target data;
judging the target shape of the target track according to the target data;
and distributing a key ID for the target shape, wherein the key ID records the information of the encrypted object and the target shape.
Further, after the step of acquiring the encrypted object according to the encrypted floating trajectory and hiding the encrypted object, the processor 1001 is further configured to call a terminal screen display control program stored in the memory 1005, and perform the following operations:
acquiring the encrypted suspension track, and generating the encrypted target track corresponding to the encrypted suspension track;
detecting whether the secret key ID corresponding to the encrypted target track is prestored;
and if so, decrypting the encrypted object.
The invention discloses a terminal screen display control method, a terminal and a computer readable storage medium, wherein the method comprises the steps of obtaining an encrypted suspension track of a suspension object above a screen; the encryption object is obtained according to the encryption suspension track and hidden, so that the screen display of the mobile terminal is quickly controlled, the encryption flow is simplified, the encryption operation process is simple, the time consumption is low, and the user experience is further improved.
Based on the structure, the invention provides various embodiments of the terminal screen display control method.
The invention provides a terminal screen display control method.
Referring to fig. 1, fig. 1 is a flowchart illustrating a terminal screen display control method according to a first embodiment of the present invention.
In the present embodiment, an embodiment of a terminal screen display control method is provided, and it should be noted that although a logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in an order different from that here.
In this embodiment, the terminal screen display control method includes:
and step S10, acquiring the encrypted suspension track of the suspension object above the screen.
Before the encrypted suspension track is obtained, the user should input an encryption command to start the encryption mode, wherein the encryption command can be a key or a segment of voice and is not limited to the form of the encryption command. And after the encryption mode is started, if a suspended object is detected to exist above the screen or the distance from the suspended object to the screen is detected to be less than or equal to the critical induction distance, taking the track drawn by the suspended object as an encrypted suspended track. The suspension object can be a handwriting pen, an electromagnetic pen, a capacitance pen or a fingertip, and the critical sensing distance is the maximum distance capable of sensing the suspension object above the screen.
It will be appreciated that if the levitating object is not detected or if the distance from the levitating object to the screen is detected to be greater than the threshold sensing distance, the trajectory traced by the levitating object will not be detected and therefore may not be considered as an encrypted levitating trajectory.
And step S20, acquiring an encrypted object according to the encrypted suspension track, and hiding the encrypted object.
The information provided by the encrypted floating track contains an object which a user wants to encrypt, and after the encrypted floating track is obtained, the encrypted object can be obtained and hidden, so that the encrypted object is encrypted.
Further, step S20 includes:
step a, generating an encrypted target track according to the encrypted suspension track, and distributing a secret key ID to the encrypted target track.
The encrypted floating track is a track drawn by a floating object, is only a track outside the terminal, and is required to encrypt data selected by a user according to the encrypted floating track, and an encrypted target track corresponding to the encrypted floating track is also required to be obtained, wherein the encrypted target track is the same as the encrypted floating track, and the difference between the encrypted target track and the encrypted floating track is that coordinates of points on the encrypted target track are known by the terminal. A key ID is generated from an encrypted target track of known point coordinates and assigned to the encrypted target track.
Further, step a further comprises:
and a1, drawing a perpendicular line perpendicular to the screen through a point on the encrypted suspension track, and setting the intersection point of the perpendicular line and the screen as a target point.
And the step of generating the encrypted target track according to the encrypted suspension track comprises the steps of drawing a perpendicular line perpendicular to the screen through a point on the encrypted suspension track, and setting an intersection point of the perpendicular line and the screen as a target point, so that the encrypted target track can be known to be positioned on the screen.
And a2, using the track formed by connecting all the target points as the encrypted target track.
After acquiring a plurality of target points, taking a track formed by connecting the target points as an encrypted target track, and then distributing a key ID for the encrypted target track.
And b, storing the encrypted target track and the secret key ID according to a one-to-one corresponding relationship.
After the secret key ID is distributed to the encrypted target track, the encrypted target track and the secret key ID are stored in a one-to-one correspondence mode, and the purpose is to acquire the secret key ID according to the one-to-one correspondence relationship between the encrypted target track and the secret key ID corresponding to the encrypted suspension track during decryption so as to decrypt encrypted data.
And c, acquiring the encrypted object based on the encrypted target track.
While the encrypted floating track contains the information of the encrypted object, it is understood that the encrypted target track also contains the information of the encrypted object. And acquiring the encrypted object recorded by the encrypted target track, and hiding the encrypted object to finish the encryption of the encrypted object. The encrypted object can be an application identifier, a chat message, a form, an interface, and the like. How to judge the encrypted object will be explained in the third embodiment.
When the encrypted object is encrypted, the input encrypted floating track is arbitrarily drawn by the user, and the encrypted floating track is decrypted by using the same encrypted floating track. In order to prevent the information of the user from being encrypted by a non-user, when the user inputs an encryption instruction, a face detection function or an iris recognition function is turned on to confirm the user to which the artificial encryption object performing the encryption operation belongs.
According to the embodiment, the encryption suspension track of the suspension object above the screen is obtained, the encryption object is obtained according to the encryption suspension track, and the encryption object is hidden to complete encryption of the encryption object, so that rapid control over encrypted data is realized, the problems that in the prior art, an interface needs to be opened, an encryption file is selected, an encryption password is input, and other technical processes are complicated are solved, the time of encryption operation is saved for a user, and the experience of the user is further improved.
Further, a second embodiment of the terminal screen display control method of the present invention is proposed. The second embodiment of the terminal screen display control method differs from the first embodiment of the terminal screen display control method in that the step of assigning a key ID to the encryption target track includes:
further, step S10 further includes:
and d, setting the horizontal and vertical coordinates of the target point on the encrypted target track as target data.
The horizontal and vertical coordinates of the target point are coordinate values of the Y axis and the X axis of the coordinate system, which are the length and width of the screen, respectively, and the coordinate origin is arbitrarily set, and it should be noted that the coordinate origins of the same encrypted target trajectory are the same. And setting the horizontal and vertical coordinate values of the target point on the encrypted target track as target data to generate a key ID according to the target data.
And e, judging the target shape of the target track according to the target data.
It can be understood that the encrypted floating track has a shape, so the encrypted target track also has a shape, the shape of the encrypted target track is judged according to the coordinates of a target point on the encrypted target track, namely target data, and the shape of the target track, namely the target shape, is judged according to the target data.
The encrypted floating trajectory is arbitrarily set by the user, and therefore, the target shape is not limited, and may be an "S" shape, an "a" shape, a rectangle, or the like.
And f, distributing a key ID for the target shape, wherein the key ID records the information of the encrypted object and the target shape.
In this embodiment, the form of the key ID is not limited, but the key ID must include information of the encrypted object and the shape of the object, and here, a form "aa.bb.cc.dd" of the key ID is provided, where "aa" is a number of a desktop on which the screen is located, and "bb" is a number of an application. "cc" is the number of the interface on the screen at the time of encryption, "dd" is the number of the object shape, and when the encrypted object is a desktop, the key ID may be "01.00.00.02", from which it can be judged that the encrypted object is a desktop numbered 01; the encryption key may also be "00.01.00.03", and it may be determined that the encrypted object corresponding to the key ID is the application ID numbered "01"; the encryption key is "00.02.03.01", and the encryption object corresponding to the key ID is an open interface "03" of the application number "02". The setting rule of the key ID is not limited to the above example.
According to the embodiment of the application, the horizontal and vertical coordinates of the target point on the encrypted target track are set as the target data, the target shape of the target track is judged according to the target data, the key ID is distributed to the target shape, the information of the encrypted object and the target shape is recorded in the key ID, the encryption of the target data is achieved, the setting rule of the key ID of the embodiment accords with the encryption safety mechanism, the index is actually established for decryption, and the convenience and the rapidness of decryption operation are further improved.
Further, a third embodiment of the terminal screen display control method of the present invention is presented. The third embodiment of the terminal screen display control method differs from the first or second embodiment of the terminal screen display control method in that the step of obtaining the encrypted object based on the encrypted target trajectory includes:
and g, judging the interface type of the interface where the screen is positioned.
There are many types of interfaces, for example, a desktop where the screen is located, i.e., a main screen, a message interface for a conversation with a person, a text interface, etc., and after the encrypted target track is obtained and before the encrypted object of the encrypted target track is encrypted, the encrypted object needs to be judged according to the interface type of the encrypted target track and the interface where the screen is located.
And h, if the interface type is the main screen, continuously judging whether the encrypted target track is a preset first track.
If the type of the interface where the screen is located is detected to be a main screen, two encrypted objects are provided, one is an application identifier on the main screen, the other is the main screen, the encrypted object needs to be continuously judged, and the basis of continuous judgment is to judge whether the obtained encrypted target track is a preset first track. When the similarity between the encrypted target track and the preset first track is greater than a preset value, judging that the encrypted target track is the preset first track; and when the encrypted target track is smaller than or equal to the preset value, judging that the encrypted target track is not the preset first track.
And i, if the encrypted target track is a preset first track, determining that the main screen bound with the preset first track is the encrypted object.
It should be noted that before step i, the main screen is bound with the track having a certain shape, and referring to fig. 3, the binding method may be to bind the encrypted target track having a shape of "a" with the main screens 2 and 3, and store the binding relationship, and preset that the first track has "a". When the obtained encrypted target track is 'a', the first track can be judged to be a preset first track, and the main screens 2 and 3 corresponding to the 'a' are hidden according to the binding relationship. It is understood that there may be many kinds of preset first tracks, and as the track "b" is bound to the main screens 1 and 2, when the main screen acquires the track of the encryption target in the form of "b", it is determined that the main screens 1 and 2 are the encryption objects and the main screens 1 and 2 are hidden.
Further, after the step h, the method further comprises:
and h1, if the encrypted target track is not the preset first track, continuing to judge whether the encrypted target track is a preset second track.
When the similarity between the encrypted target track and the preset first track is lower than the preset value, the encrypted target track can be judged to be not the preset first track, and at the moment, whether the encrypted target track is the preset second track is continuously judged. It should be noted that before step h1, the application identifiers on the main screen are classified according to certain rules, and each class is stored in association with a track, which is a preset second track.
Step h2, if the encrypted target track is the preset second track, determining that the application identifier bound with the preset second track is the encrypted object.
When the encrypted target track is obtained, the encrypted target track is compared with the preset second track, when the similarity between the encrypted target track and the preset second track is greater than a preset value, the encrypted target track can be judged to be the preset second track, and further, the application identifier bound with the preset second track is determined to be an encrypted object and is hidden. Referring to fig. 4, a track in the shape of "e" is associated and bound with application identifiers "C" and "D", an encrypted target track in the shape of "e" is a preset second track, and when the encrypted target track in the shape of "e" is obtained, software "C" and "D" bound with the track of "e" can be determined and hidden.
Further, after the step h1, the method further includes:
and h3, if the encrypted target track is not the preset second track, continuing to judge whether the encrypted target track passes through the application identifier on the main screen.
And when the acquired encryption target track is not the preset second track, continuously judging whether the encryption target track passes through the application identification on the main screen so as to judge whether the encryption object is the passed application identification or the current main screen.
Step h4, if the encrypted track passes through the application identifier on the main screen, determining that the application identifier on the main screen through which the encrypted track passes is the encrypted object.
Referring to fig. 5, when it is detected that the coordinates of the target point on the encrypted target track coincide with the coordinates of the application identifier, it can be determined that the encrypted target track passes through the application identifier, it can be understood that the encrypted target track may pass through one or more application identifiers, the application identifier through which the encrypted target track passes is determined as an encrypted object, and the application identifier through which the encrypted target track passes is hidden, so as to encrypt the application identifier. And after the encrypted application identifier is decrypted, the application identifier can be displayed.
Further, after the step h3, the method further includes:
step h31, if the encrypted target track does not pass through the application identifier on the main screen, determining that the main screen is the encrypted object.
When it is not detected that the target point on the encrypted target track coincides with the coordinates of the application identifier, the encrypted object is determined as a main screen where the application identifier is located, and the main screen is hidden, so that the main screen is encrypted, referring to fig. 6.
Further, after the step g, the method further comprises the following steps:
and j, if the interface type is a non-main screen, judging whether the encrypted target track is a preset third track.
The non-main screen may be an interface for opening a file, may also be a chat interface, and the like, and the key information of the non-main screen is associated and bound with the preset third track, for example, the track in the form of "c" and the "zhang san" in the chat interface are bound and stored, and the track in the form of "c" is the preset third track.
And k, if the encrypted target track is a preset third track, determining all information related to the key information of the non-main screen in the terminal as the encrypted object.
When the encrypted target track is obtained, the encrypted target track is compared with a preset third track, when the similarity between the encrypted target track and the preset third track is greater than a preset value, the encrypted target track can be judged to be the preset third track, and all information related to the key information of the current non-main screen bound with the preset third track is determined to be an encrypted object and is hidden. For example, a track shaped like "c" is a preset third track and is bound with "zhang san" in the chat interface, when the track shaped like "c" is obtained in the chat interface of zhang san ", all information related to zhang san" in the terminal is determined as an encrypted object, and is hidden, and the information includes information related to zhang san including a file sent by zhang san, a transfer record of zhang san, and the like.
Further, after step j, the method further comprises:
step j1, if the encrypted target track is not a preset third track, determining that the non-main screen is the encrypted object.
And when the acquired encrypted target track and the preset third track are smaller than or equal to the preset value, judging that the encrypted target track is not the preset third track, determining that the encrypted object is the current non-main screen at the moment, and hiding the current non-main screen.
It should be noted that, if the current non-main screen displays a picture, the encrypted object is the picture, and if the current non-main screen is a chat dialog box, the encrypted object is a contact message, the contact message is hidden, and the contact message disappears from the message directory, so as to achieve the purpose of encrypting the contact message. If the interface where the encryption target track is located is a file, all the contents of the file are determined as an encryption object, the file is hidden, and the file name disappears from the file directory.
It should be noted that, classification is already made for the encrypted objects before encryption, and numbers are assigned to each class of encrypted objects, which facilitates generation of the key ID.
According to the embodiment, the encryption object is determined according to the encryption target track and the interface type, so that the encryption operation is not only specific to one application or one file, but also applicable to encryption of different types of data, wherein the different types of data comprise a plurality of related applications, a plurality of specified applications, data information related to key information in the file and the like, the flexibility of the encryption method is improved, and the application range of the encryption method is expanded.
Further, a fourth embodiment of the terminal screen display control method of the present invention is proposed. The fifth embodiment of the terminal screen display control method is different from the first, second or third embodiment of the terminal screen display control method in that after the step of obtaining the encrypted object according to the encrypted floating track and hiding the encrypted object, the method further comprises:
and step l, if a decrypted suspension track is received, generating the decrypted target track corresponding to the decrypted suspension track.
After the encrypted object is encrypted, if a user needs to decrypt the encrypted object, a decryption instruction is input firstly, then a decryption suspension track is input, after the decryption suspension track is obtained, a decryption target track corresponding to the decryption suspension track is obtained in the same way, and the obtaining method is the same as the method for obtaining the encrypted target track.
And m, detecting whether the encrypted target track matched with the decrypted target track is prestored.
Detecting whether the shape of the target track is the same as that of the decrypted target track or not according to the shape of the decrypted target track, and if so, indicating that an encrypted target track matched with the decrypted target track is prestored; if not, the input error of the decrypted suspension track is indicated, and the decryption fails.
And n, if yes, determining and displaying an encryption object pointed by the matched encryption target track based on the key ID corresponding to the matched encryption target track.
If the encrypted target track matched with the decrypted target track is prestored, the secret key ID of the encrypted target track is obtained according to the one-to-one corresponding storage relation between the encrypted target track and the secret key ID, the encrypted object is obtained according to the secret key ID, and the encrypted object is displayed.
The decryption method provided by the embodiment for the encryption method is simple in operation flow, can decrypt various types of data corresponding to the encryption method, is short in operation time, and improves the experience of users.
In addition, an embodiment of the present invention further provides a terminal screen display control device, where the terminal screen display control device includes:
the acquisition module is used for acquiring an encrypted suspension track generated by the suspension object sliding above the screen;
the obtaining module is further used for obtaining an encrypted object according to the encrypted suspension track;
a hiding module for hiding the encrypted object.
Further, the obtaining module further comprises:
the judging unit is used for judging the interface type of the interface where the screen is located;
the judging unit is further used for continuously judging whether the encrypted target track is a preset first track or not if the interface type is a main screen;
and the determining unit is used for determining the main screen bound with the preset first track as the encrypted object if the encrypted target track is the preset first track.
Further, the determining unit is further configured to, if the encrypted target trajectory is not the preset first trajectory, continue to determine whether the encrypted target trajectory is a preset second trajectory;
the determining unit is further configured to determine, if the encrypted target trajectory is the preset second trajectory, that the application identifier bound to the preset second trajectory is the encrypted object.
Further, the determining unit is further configured to, if the encrypted target trajectory is not a preset second trajectory, continue to determine whether the encrypted target trajectory passes through the application identifier on the main screen;
the determining unit is further configured to determine that the application identifier on the main screen through which the encrypted track passes is the encrypted object if the encrypted track passes through the application identifier on the main screen.
Further, the determining unit is further configured to determine that the main screen is the encrypted object if the encrypted target trajectory does not pass through the application identifier on the main screen.
Further, the determining unit is further configured to determine whether the encrypted target trajectory is a preset third trajectory if the interface type is a non-home screen;
the determining unit is further configured to determine all information related to the key information of the non-main screen in the terminal as the encrypted object if the encrypted target trajectory is a preset third trajectory.
Further, the determining unit is further configured to determine that the non-home screen is the encrypted object if the encrypted target trajectory is not a preset third trajectory.
Further, the obtaining module further comprises:
the generating unit is used for generating an encrypted target track according to the encrypted suspension track;
an allocation unit, configured to allocate a key ID to the encrypted target track;
the storage unit is used for storing the encrypted target track and the secret key ID according to a one-to-one corresponding relation;
an obtaining unit configured to obtain the encrypted object based on the encrypted target trajectory.
Further, the generating unit further includes:
the setting subunit is used for drawing a perpendicular line perpendicular to the screen through a point on the encrypted suspension track, and setting an intersection point of the perpendicular line and the screen as a target point;
the setting subunit is further configured to use a trajectory formed by connecting all the target points as the encrypted target trajectory.
Further, the setting unit is further configured to set horizontal and vertical coordinates of the target point on the encrypted target trajectory as target data;
a judging subunit, configured to judge a target shape of the target trajectory according to the target data;
an assigning subunit configured to assign a key ID to the target shape, where the key ID records information of the encrypted object and the target shape.
Further, the obtaining module further comprises;
the judging unit is used for judging the interface type of the interface where the screen is located;
the detection unit is used for detecting whether the encrypted target track passes through an application identifier on the desktop or not if the interface type is the desktop;
a determining unit, configured to determine, if the encrypted target track passes through the application identifier, that the application identifier through which the encrypted target track passes is the encrypted object; and if the encrypted target track does not pass through the application identifier, determining the desktop as an encrypted object.
Further, the determining unit is further configured to determine the interface where the screen is located as an encrypted object if the interface type is a non-desktop type.
Further, the terminal screen display control device further includes:
the receiving module is used for receiving the decrypted suspension track;
the generating module is used for generating the decryption target track corresponding to the decryption suspension track;
the detection module is used for detecting whether the encrypted target track matched with the decrypted target track is prestored;
and the determining and displaying module is used for determining and displaying the matched encrypted object pointed by the encrypted target track based on the key ID corresponding to the matched encrypted target track if the encrypted target track is the same as the encrypted target track.
The implementation of the terminal screen display control device of the present invention is basically the same as that of the terminal screen display control method, and is not described herein again.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, where a terminal screen display control program is stored on the computer-readable storage medium, and when executed by a processor, the terminal screen display control program implements the steps of the terminal screen display control method described above.
Note that the computer-readable storage medium may be provided in a terminal.
The specific implementation manner of the computer-readable storage medium of the present invention is substantially the same as that of the above-mentioned embodiments of the terminal screen display control method, and is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network terminal) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (13)

1. A terminal screen display control method is characterized by comprising the following steps:
acquiring an encrypted suspension track generated by a suspension object sliding above a screen;
and acquiring an encrypted object according to the encrypted suspension track, and hiding the encrypted object.
2. The terminal screen display control method of claim 1, wherein the step of obtaining the encrypted object based on the encrypted target trajectory comprises:
judging the interface type of the interface where the screen is located;
if the interface type is a main screen, continuously judging whether the encrypted target track is a preset first track;
and if the encrypted target track is a preset first track, determining that the main screen bound with the preset first track is the encrypted object.
3. The method for controlling display of a terminal screen according to claim 2, wherein after the step of continuously determining whether the encryption target trajectory is a preset first trajectory if the interface type is a main screen, the method further comprises:
if the encrypted target track is not the preset first track, continuously judging whether the encrypted target track is a preset second track;
and if the encrypted target track is the preset second track, determining that the application identifier bound with the preset second track is the encrypted object.
4. The terminal screen display control method according to claim 3, wherein after the step of continuing to determine whether the encrypted target trajectory is a preset second trajectory if the encrypted target trajectory is not the preset first trajectory, further comprising:
if the encrypted target track is not the preset second track, continuously judging whether the encrypted target track passes through the application identifier on the main screen;
and if the encrypted track passes through the application identifier on the main screen, determining that the application identifier on the main screen through which the encrypted track passes is the encrypted object.
5. The terminal screen display control method of claim 4, wherein after the step of continuing to determine whether the encrypted target trajectory passes through an application identifier on the main screen if the encrypted target trajectory is not a preset second trajectory, further comprising:
and if the encrypted target track does not pass through the application identifier on the main screen, determining that the main screen is the encrypted object.
6. The terminal screen display control method of claim 2, wherein the step of determining the interface type of the interface where the screen is located further comprises, after the step of determining the interface type of the interface where the screen is located:
if the interface type is a non-main screen, judging whether the encrypted target track is a preset third track;
and if the encrypted target track is a preset third track, determining all information related to the key information of the non-main screen in the terminal as the encrypted object.
7. The terminal screen display control method of claim 6, wherein after the step of determining whether the encryption target trajectory is a preset third trajectory if the interface type is a non-home screen, further comprising:
and if the encrypted target track is not a preset third track, determining the non-main screen as the encrypted object.
8. The terminal screen display control method of claim 1, wherein the step of obtaining an encrypted object according to the encrypted floating trajectory comprises:
generating an encrypted target track according to the encrypted suspension track, and distributing a secret key ID to the encrypted target track;
storing the encrypted target track and the secret key ID according to a one-to-one corresponding relationship;
and acquiring the encrypted object based on the encrypted target track.
9. The terminal screen display control method of claim 8, wherein the step of generating an encrypted target trajectory from the encrypted hover trajectory comprises:
drawing a perpendicular line perpendicular to the screen through a point on the encrypted suspension track, and setting an intersection point of the perpendicular line and the screen as a target point;
and taking the track formed by connecting all the target points as the encrypted target track.
10. The terminal screen display control method of claim 8, wherein the step of assigning a key ID to the encryption target track comprises:
setting the horizontal and vertical coordinates of the target point on the encrypted target track as target data;
judging the target shape of the target track according to the target data;
and distributing a key ID for the target shape, wherein the key ID records the information of the encrypted object and the target shape.
11. The terminal screen display control method of claim 8, wherein after the step of obtaining an encrypted object according to the encrypted floating trajectory and hiding the encrypted object, further comprising:
if a decryption suspension track is received, generating a decryption target track corresponding to the decryption suspension track;
detecting whether the encrypted target track matched with the decrypted target track is prestored;
if yes, determining and displaying an encryption object pointed by the matched encryption target track based on the key ID corresponding to the matched encryption target track.
12. A terminal characterized in that the terminal comprises a memory, a processor and a terminal screen display control program stored on the memory and executable on the processor, the terminal screen display control program, when executed by the processor, implementing the steps of the terminal screen display control method according to any one of claims 1 to 11.
13. A computer-readable storage medium, characterized in that a terminal screen display control program is stored thereon, which when executed by a processor implements the steps of the terminal screen display control method according to any one of claims 1 to 11.
CN201911272732.5A 2019-12-09 2019-12-09 Terminal screen display control method, terminal and computer readable storage medium Pending CN111090868A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911272732.5A CN111090868A (en) 2019-12-09 2019-12-09 Terminal screen display control method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911272732.5A CN111090868A (en) 2019-12-09 2019-12-09 Terminal screen display control method, terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN111090868A true CN111090868A (en) 2020-05-01

Family

ID=70396355

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911272732.5A Pending CN111090868A (en) 2019-12-09 2019-12-09 Terminal screen display control method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111090868A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117727829A (en) * 2023-10-31 2024-03-19 北京城建集团有限责任公司 Preparation method and system of photoelectric curtain wall

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117727829A (en) * 2023-10-31 2024-03-19 北京城建集团有限责任公司 Preparation method and system of photoelectric curtain wall

Similar Documents

Publication Publication Date Title
US20230325538A1 (en) Method and apparatus for processing biometric information in electronic device
US11934505B2 (en) Information content viewing method and terminal
KR102223609B1 (en) Content sharing method and apparatus
US9781123B2 (en) Methods of providing social network service and server performing the same
CN103916233B (en) A kind of information ciphering method and device
US10506068B2 (en) Cloud-based cross-device digital pen pairing
CN105701420B (en) A kind of management method and terminal of user data
CN105760737A (en) Control method for applications and terminal
CA2813172A1 (en) Multiple-access-level lock screen
WO2019196693A1 (en) Application control method and device, readable storage medium and terminal
CN110826043A (en) Digital identity application system and method, identity authentication system and method
CN103914520B (en) Data query method, terminal device and server
CN107395610B (en) Communication authentication method, first terminal and second terminal
US10019913B2 (en) Information encryption system and information encryption method using optical character recognition
EP2927833A1 (en) Methods and devices for granting access to and enabling passcode protection for a file
CN111344707A (en) Electronic device comprising a display and method of encrypting and decrypting information
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN106203174A (en) Application information processing method and device and electronic equipment
CN107767133A (en) Virtual card opens chucking method, apparatus and system, storage medium
WO2016119341A1 (en) Method and device for implementing multi-user login mode, and computer storage medium
CN109801065A (en) Virtual card opens chucking method, apparatus and system, storage medium
TW201826158A (en) Method, Device and Terminal for Displaying Data
KR20210011577A (en) Apparatus and Method for Personal authentication using Sim Toolkit and Applet
US20200201977A1 (en) Method for authenticating a first user and corresponding first device and system
CN111090868A (en) Terminal screen display control method, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination