CN111258697A - Screenshot control method of terminal equipment, terminal equipment and storage medium - Google Patents

Screenshot control method of terminal equipment, terminal equipment and storage medium Download PDF

Info

Publication number
CN111258697A
CN111258697A CN202010051136.0A CN202010051136A CN111258697A CN 111258697 A CN111258697 A CN 111258697A CN 202010051136 A CN202010051136 A CN 202010051136A CN 111258697 A CN111258697 A CN 111258697A
Authority
CN
China
Prior art keywords
target application
screenshot
terminal device
key information
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010051136.0A
Other languages
Chinese (zh)
Inventor
汪时灿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Technologies Co Ltd filed Critical Sangfor Technologies Co Ltd
Priority to CN202010051136.0A priority Critical patent/CN111258697A/en
Publication of CN111258697A publication Critical patent/CN111258697A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a screenshot control method of terminal equipment, which comprises the following steps: when screenshot operation is detected in a target application of a terminal device, acquiring screenshot times in the target application; and when the screenshot frequency is more than or equal to one time, hiding the key information in the target application. The invention also discloses a terminal device and a computer readable storage medium. The method and the device reduce the risk of information leakage caused by screenshot of the application interface.

Description

Screenshot control method of terminal equipment, terminal equipment and storage medium
Technical Field
The present invention relates to the field of image processing technologies, and in particular, to a screenshot control method for a terminal device, and a computer-readable storage medium.
Background
At present, in order to facilitate a user to obtain interface information of an application program, a terminal device is generally provided with a screen capture function so that the user can capture a corresponding interface screenshot. However, in this way, the screenshot information of the application interface is easily shared, which causes a certain hidden danger of information leakage when the screenshot is performed on the application interface.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a screenshot control method of a terminal device, the terminal device and a computer readable storage medium, which reduce the risk of information leakage caused by screenshot of an application interface.
In order to achieve the above object, the present invention provides a screenshot control method of a terminal device, including the following steps:
when screenshot operation is detected in a target application of a terminal device, acquiring screenshot times in the target application;
and when the screenshot frequency is more than or equal to one time, hiding the key information in the target application.
Optionally, the step of hiding the key information in the target application includes:
and covering and displaying a preset graph on the application interface of the target application so as to shield key information in the target application.
Optionally, the preset graph is a preset graphical interface, and the step of displaying the preset graph on the application interface of the target application in an overlaying manner includes:
adding a layer on the upper layer of the layer where the application interface is located;
and displaying the preset graphical interface on the newly added layer to cover the display interface.
Optionally, the preset graph is a preset picture, and the step of displaying the preset graph on the application interface of the target application in an overlaying manner includes:
identifying key information in an application interface of the target application;
acquiring a display area where the key information is located;
and covering and displaying the preset picture on the display area.
Optionally, after the step of obtaining the number of times of screen capturing in the target application when the screen capturing operation is detected in the target application of the terminal device, the method further includes:
acquiring an application interface of which the corresponding screenshot times are more than or equal to one time in the target application as a target application interface;
and hiding the key information in the target application interface.
Optionally, the step of hiding the key information in the target application interface includes:
acquiring a background color value of the target application interface;
and adjusting the color value of the key information in the target application interface to be the background color value.
Optionally, after the step of hiding the key information in the target application when the number of screenshots is greater than or equal to one, the method further includes:
sending a hidden processing cancellation request of the key information to a management terminal;
and when response information returned by the management terminal based on the hiding processing canceling request is received, the hiding processing of the key information is canceled.
Optionally, after the step of hiding the key information in the target application when the number of screenshots is greater than or equal to one, the method further includes:
outputting prompt information to prompt a user that the key information is hidden currently;
and when the confirmation response of the prompt message is received, deleting the screenshot corresponding to the screenshot operation, and/or sending a hidden processing cancellation request of the key message to a management terminal.
Optionally, after the step of obtaining the number of times of screen capturing in the target application when the screen capturing operation is detected in the target application of the terminal device, the method further includes:
in the current use period of the target application, when the screenshot frequency is more than or equal to one time, executing the step of hiding the key information in the target application;
and clearing the screenshot times when the next use period of the target application starts.
In order to achieve the above object, the present invention further provides a terminal device, including:
the terminal equipment comprises a memory, a processor and a screenshot control program of the terminal equipment, wherein the screenshot control program of the terminal equipment is stored in the memory and can be run on the processor, and when the screenshot control program of the terminal equipment is executed by the processor, the steps of the screenshot control method of the terminal equipment are realized.
In order to achieve the above object, the present invention further provides a computer-readable storage medium, where a screenshot control program of a terminal device is stored on the computer-readable storage medium, and when the screenshot control program of the terminal device is executed by a processor, the steps of the screenshot control method of the terminal device are implemented.
According to the screenshot control method of the terminal equipment, the terminal equipment and the computer-readable storage medium, when screenshot operation is detected in the target application of the terminal equipment, screenshot times in the target application are obtained; and when the screenshot frequency is more than or equal to one time, hiding the key information in the target application. Therefore, when the corresponding times of screenshot operation performed by the user in the target application are too many, the terminal can hide the key information in the target application, so that further disclosure of the key information is prevented, and the risk of information disclosure caused by screenshot performed on the application interface is reduced.
Drawings
Fig. 1 is a schematic diagram of a hardware operating environment of a terminal according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an embodiment of a screenshot control method of a terminal device according to the present invention;
fig. 3 is a schematic flowchart of another embodiment of a screenshot control method of a terminal device according to the present invention;
fig. 4 is a schematic flowchart of a screenshot control method of a terminal device according to another embodiment of the present invention;
fig. 5 is a flowchart illustrating a screenshot control method of a terminal device according to another embodiment of the present invention.
Fig. 6 is a schematic flowchart of a screenshot control method of a terminal device according to another embodiment of the present invention;
FIG. 7 is an exemplary diagram of a preset graphical interface shielding application interface in an embodiment of a screenshot control method of a terminal device according to the present invention;
fig. 8 is a diagram illustrating a multi-terminal interaction according to an embodiment of a screenshot control method of a terminal device of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a screenshot control method of terminal equipment, which reduces the risk of information leakage caused by screenshot of an application interface.
As shown in fig. 1, fig. 1 is a schematic diagram of a hardware operating environment of a terminal according to an embodiment of the present invention;
the terminal of the embodiment of the invention can be terminal equipment.
As shown in fig. 1, the terminal may include: a processor 1001, such as a Central Processing Unit (CPU), a memory 1002, and a communication bus 1003. The communication bus 1003 is used for implementing connection communication between the components in the terminal. The memory 1002 may be a random-access memory (RAM) or a non-volatile memory (non-volatile memory), such as a disk memory. The memory 1002 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration of the terminal shown in fig. 1 is not intended to be limiting of the terminal of embodiments of the present invention and may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1002, which is a kind of computer storage medium, may include therein a screen shot control program of the terminal device.
In the terminal shown in fig. 1, the processor 1001 may be configured to call a screenshot control program of the terminal device stored in the memory 1002, and perform the following operations:
when screenshot operation is detected in a target application of a terminal device, acquiring screenshot times in the target application;
and when the screenshot frequency is more than or equal to one time, hiding the key information in the target application.
Further, the processor 1001 may call the screenshot control program of the terminal device stored in the memory 1002, and further perform the following operations:
and covering and displaying a preset graph on the application interface of the target application so as to shield key information in the target application.
Further, the processor 1001 may call the screenshot control program of the terminal device stored in the memory 1002, and further perform the following operations:
adding a layer on the upper layer of the layer where the application interface is located;
and displaying the preset graphical interface on the newly added layer to cover the display interface.
Further, the processor 1001 may call the screenshot control program of the terminal device stored in the memory 1002, and further perform the following operations:
identifying key information in an application interface of the target application;
acquiring a display area where the key information is located;
and covering and displaying a preset picture on the display area.
Further, the processor 1001 may call the screenshot control program of the terminal device stored in the memory 1002, and further perform the following operations:
acquiring an application interface of which the corresponding screenshot times are more than or equal to one time in the target application as a target application interface;
and hiding the key information in the target application interface.
Further, the processor 1001 may call the screenshot control program of the terminal device stored in the memory 1002, and further perform the following operations:
acquiring a background color value of the target application interface;
and adjusting the color value of the key information in the target application interface to be the background color value.
Further, the processor 1001 may call the screenshot control program of the terminal device stored in the memory 1002, and further perform the following operations:
sending a hidden processing cancellation request of the key information to a management terminal;
and when response information returned by the management terminal based on the hiding processing canceling request is received, the hiding processing of the key information is canceled.
Further, the processor 1001 may call the screenshot control program of the terminal device stored in the memory 1002, and further perform the following operations:
outputting prompt information to prompt a user that the key information is hidden currently;
and when the confirmation response of the prompt message is received, deleting the screenshot corresponding to the screenshot operation, and/or sending a hidden processing cancellation request of the key message to a management terminal.
Further, the processor 1001 may call the screenshot control program of the terminal device stored in the memory 1002, and further perform the following operations:
in the current use period of the target application, when the screenshot frequency is more than or equal to one time, executing the step of hiding the key information in the target application;
and clearing the screenshot times when the next use period of the target application starts.
Referring to fig. 2, in an embodiment, the screenshot control method of the terminal device includes:
and step S10, when the screenshot operation is detected in the target application of the terminal equipment, acquiring the screenshot times in the target application.
In this embodiment, the terminal in this embodiment may be a terminal device, such as a smart phone, a tablet computer, or the like.
Optionally, the terminal acquires at least one Application as a target Application in advance among installed applications (applications) on the device. The target application may be set by the user in advance, or may be set by the designer of the terminal device (i.e., default setting of the system).
Alternatively, the terminal system may be an IOS (iphone Operation system) system, an android system, an embedded system, or the like, and is preferably an IOS system.
Optionally, the terminal device is provided with a screenshot service, and the screenshot service may also be provided by the target application. When a user performs screenshot operation corresponding to the screenshot service on the terminal device, the mobile terminal intercepts content currently displayed on a screen of the terminal device and generates a picture of the displayed content as a screenshot corresponding to the screenshot operation.
Optionally, in the process of opening the target application, if the terminal detects that a screenshot event is generated (or detects that a screenshot is generated), it is determined that a screenshot operation is detected in the target application.
Optionally, when the terminal detects that there is a behavior corresponding to the screenshot operation in the target application, the terminal may further record the screenshot frequency accordingly, and associate the screenshot frequency with the target application, that is, record the frequency of the screenshot operation performed in the target application.
Optionally, in the process of opening the target application, when the terminal detects that a screenshot operation exists in the target application, a screenshot corresponding to the screenshot operation is generated. Meanwhile, the terminal adds one to the accumulated screenshot times associated with the target application, and obtains the finally obtained screenshot times.
And step S20, judging whether the screenshot frequency is more than or equal to one time.
Further, after acquiring the screenshot frequency corresponding to the target application, the terminal detects whether the acquired screenshot frequency is greater than or equal to one time.
And step S30, hiding the key information in the target application.
Optionally, when the terminal detects that the number of screenshots in the target application is greater than or equal to one, it is determined that the target application has a risk of information leakage, and therefore, the terminal performs hiding processing on the key information in the target application.
Optionally, the key information is information that needs to be kept secret, or information that is not convenient to disclose, including at least one of certificate information (identification card, driver's license, passport, etc.), a phone number, and address information. The certificate information may be character information having the same number of characters as the certificate number. For example, character information composed of 18-bit digits is recognized as an identification number (it should be understood that character information in which 17 is a combination of a digit and a 1-bit letter is also possible); the telephone number can be character information consisting of 13 digits, or character information consisting of an area code plus 8 digits; the address information may be a character information combination having a regional administrative region identification character such as "province", "city", "district", "town", and the like. The character information of the identification characters of the administrative regions of the areas such as province, city, district and town is combined and recognized as address information.
Of course, the key information may also be preset information (such as some sensitive data) preset by an engineer, the preset information has certain information attributes, and the terminal uses the information meeting the information attributes as the key information.
Alternatively, the terminal may recognize text information and picture information in the target application through a machine learning technology, and use the recognized certificate information (identity card, driving license, passport, etc.), telephone number, address information as key information.
Optionally, the terminal may also use all display contents in the target application as the key information, or use display contents of an application interface in the target application as the key information.
Optionally, the manner of hiding the key information in the target application by the terminal may be that a preset graphical interface or a preset picture is displayed in a covering manner on an application interface of the target application so as to shield the key information in the target application; the hiding processing mode may also be a mode of adjusting a color value of a font of the key information, so that a color difference value between the color value of the key information and a background color value of a display interface where the key information is located is within a preset difference value range.
And step S40, not hiding the key information in the target application.
Optionally, if the terminal detects that the number of screenshots in the target application is less than one, the terminal may not hide the key information in the target application at present, and return to continue to detect the screenshots.
Optionally, the screenshot control method of the terminal device in this embodiment may be implemented by integrating a program corresponding to the screenshot control method of the terminal device into an SDK (software development kit) of the system application, and providing the program for the target application to call in a form of manual development integration or automatic packaging. Therefore, the method of the embodiment of the invention can be realized without manual development of APP developers corresponding to each target application. Of course, even if the APP developer performs manual development, the method applying the embodiment of the present invention is within the scope of the present invention.
Therefore, when the user performs screenshot operation in the target application, the terminal can hide the key information in the target application, so that further leakage of the key information is prevented, and the risk of information leakage caused by screenshot of an application interface is reduced.
In another embodiment, as shown in fig. 3, on the basis of the embodiment shown in fig. 2, the step of hiding the key information in the target application includes:
and step S31, displaying a preset graph on the application interface of the target application in an overlaying mode so as to shield key information in the target application.
In this embodiment, when the terminal detects that the number of screenshots in the target application is greater than or equal to one, it is determined that the target application has a risk of information leakage, and therefore, the terminal shields the key information in the target application by using a preset graph, so that the key information is hidden.
Optionally, the preset graph may be a preset picture, or may be a preset graphical interface.
Optionally, when the terminal hides the key information in the target application, a new layer may be added on an upper layer of a layer where an application interface of the target application is located, and a preset graphical interface may be displayed on the new layer to cover the display interface.
Optionally, referring to fig. 7, the terminal generates an opaque interception interface in advance as a preset graphical interface and stores the preset graphical interface in the database, and when the terminal detects that the screenshot frequency corresponding to the target application is greater than or equal to one time, the terminal adds a new layer 20 on the layer 10 where the application interface of the target application is currently located. Further, the terminal obtains a pre-stored preset graphical interface from the database, and displays the preset graphical interface on the newly added layer 20, that is, the display layer where the preset graphical interface is located is on the layer corresponding to the application interface of the target application, which is equivalent to covering a preset graphical interface on the application interface displayed by the target application, so as to shield the original display interface of the target application.
Further, the default graphical interface has a lock attribute, and once displayed, the user cannot directly unlock the display of the default graphical interface by manual operation (for example, the default graphical interface may be a screen lock interface). Therefore, if the user does not unlock the preset graphical interface in the unlocking mode corresponding to the preset graphical interface, the user cannot see the key information displayed by the application interface covered by the preset graphical interface. Meanwhile, even if the user performs screenshot operation in the target application, the screenshot can be only the content displayed by the preset graphical interface.
Optionally, when the terminal hides the key information in the target application, the key information in the target application may be first identified, and a display area of an application interface where the key information to be hidden is located may be identified. Then, the terminal adds preset pictures on the display areas, namely, a layer of preset pictures is covered on the display areas, so that the key information is shielded. Therefore, even if the user carries out screenshot operation on the target application, the key information in the screenshot which can be intercepted is also shielded by the preset picture.
It should be noted that the preset picture is an opaque picture displaying a preset pattern, such as a mosaic picture (i.e., the preset pattern is a mosaic pattern).
Therefore, the key information in the target application is shielded by using the preset graphical interface or the preset picture, so that the key information is hidden, and the risk of information leakage caused by screenshot of the application interface is reduced.
In another embodiment, as shown in fig. 4, on the basis of the embodiments of fig. 2 to fig. 3, after the step of obtaining the number of times of screen shots in the target application when the screen shot operation is detected in the target application of the terminal device, the method further includes:
and step S50, acquiring an application interface of which the corresponding screenshot times are more than or equal to one time in the target application as a target application interface.
And step S60, hiding the key information in the target application interface.
In this embodiment, when recording the screen capturing times of the target application, the terminal may record the screen capturing times corresponding to each application interface in the target application, that is, when detecting the screen capturing operation in the target application, and when generating the screen capturing of the application interface to which the screen capturing operation is directed, the terminal further records the screen capturing times corresponding to the application interface.
Further, the target application may be at least one application set as the target application interface in all application interfaces of the target application, and when the terminal records the screen capture times of the target application, only the screen capture times corresponding to the target application interface of the target application need to be recorded, and other non-target application interfaces in the target application are not recorded.
Optionally, when the terminal detects that an application interface with corresponding screenshot times greater than or equal to one time exists in the target application, the application interface is acquired as the target application interface, and the key information in the target application interface is hidden.
Optionally, when the application interface currently displayed by the target application is switched to the target application interface, the terminal displays the preset graph on the target application interface in a covering manner so as to shield key information in the target application interface. Therefore, the method does not influence the user to watch the content of other application interfaces or influence the user to perform screenshot operation on other application interfaces.
In another embodiment, as shown in fig. 5, on the basis of the embodiments of fig. 2 to fig. 4, the step of hiding the key information in the target application interface includes:
and step S61, obtaining a background color value of the target application interface.
And step S62, adjusting the color value of the key information in the target application interface to the background color value.
Optionally, the mode that the terminal hides the key information in the target application interface may also be a mode that a background color value of the target application interface is obtained first, and then the color value of the key information in the target application interface is adjusted to the background color value. Therefore, the user can hardly see the key information in the target application interface, and even if the user continues to perform screenshot operation on the target application interface, the obtained screenshot can hardly see the key information.
Optionally, the terminal identifies the key information in the target application interface, acquires a background color value (a color value may be RGB, YUV, CMY, HSV, or the like) of a background color of the target application interface, and then adjusts a character color of the key information according to the acquired background color value.
Specifically, the terminal generates a target color value according to the background color value and converts the character color of the key information into the target color value, so that the character color of the key information is consistent with the background color of the target application interface.
Therefore, only the key information of the target application interface in the target application is hidden, the risk of information leakage caused by screenshot of the application interface is reduced, and normal use of other application interfaces by a user is not influenced.
In another embodiment, as shown in fig. 6, on the basis of the embodiments of fig. 2 to fig. 5, after the step of hiding the key information in the target application when the screenshot number is greater than or equal to one, the method further includes:
step S70, sending a hiding processing cancellation request of the key information to the management terminal.
Step S80, when receiving the response information returned by the management terminal based on the concealment processing cancellation request, canceling the concealment processing of the key information.
In this embodiment, the terminal device is associated with a management terminal, and the management terminal may be specifically a server.
Optionally, the key information hiding operation performed by the terminal is only for the target application.
Referring to fig. 8, when a user uses a terminal device to perform screenshot operation on a target application, and when the terminal device detects that the screenshot frequency is greater than or equal to one time, the user performs a hiding operation on key information in the target application. At this time, the user may send a hidden process cancellation request for the key information to the server through another application on the terminal device to request the server to cancel the hiding of the key information, and the administrator of the server sees the hidden process cancellation request, and may determine the security level of the user currently using the terminal device by himself or herself, and when the administrator considers that the security risk of the user is low, it is considered that the hidden process may be canceled. At this time, the administrator can return a response message to the terminal device through the server. And when the terminal equipment receives response information returned by the management terminal based on the hiding processing canceling request, the hidden of the hidden key information in the target application is canceled.
For example, if the terminal hides the key information by displaying the preset graphical interface, the terminal may cancel the display of the preset graphical interface to cancel the hiding processing of the key information.
Of course, if the target application supports the data transfer service, the user may also issue a hidden process cancellation request to the management terminal through the target application.
Optionally, the terminal may first detect whether the user has deleted the screenshot corresponding to the screenshot operation when sending the hiding processing cancellation request. If yes, the terminal allows to send a hiding processing canceling request; if not, the terminal does not allow sending the hiding processing canceling request currently.
Optionally, the response information returned by the management terminal includes the first response information and the second response information. When the terminal receives the first response information, the terminal cancels the hiding of the hidden key information in the target application; when the terminal receives the second response information, the terminal cancels the hiding of the hidden key information in the target application, and meanwhile, the terminal performs zero clearing processing on the screenshot times corresponding to the target application (or performs zero clearing processing on the screenshot times corresponding to the target application interface).
Optionally, after the terminal hides the key information of the target application, a prompt message may be output to prompt the user that the key information is currently hidden. For example, if the terminal hides the key information by displaying the preset graphical interface, the terminal may directly display the prompt information in the preset graphical interface.
Further, the prompt message may further include a confirmation option and a cancellation option, and the user may send out a confirmation response of the prompt message by selecting the confirmation option, or may send out a cancellation response of the prompt message by canceling the option.
Optionally, when the terminal receives a confirmation response of the prompt message, deleting the screenshot corresponding to the screenshot operation; optionally, when receiving the confirmation response of the prompt message, the terminal sends a hidden processing cancellation request of the key message to the management terminal; optionally, when receiving the confirmation response of the prompt message, the terminal deletes the screenshot corresponding to the screenshot operation, and sends a hidden processing cancellation request of the key message to the management terminal.
Optionally, when the terminal receives a cancellation response of the prompt message, the hiding process of the key information of the target application terminal is continuously maintained.
Alternatively, the number of screenshots of the target application may be associated with time, and the target application may be preset with a plurality of usage periods.
Optionally, when a screenshot operation is detected in a target application of the terminal device, after the step of obtaining the number of screenshots in the target application, the method further includes: and when the screenshot times in the current use period are more than or equal to one time, executing the step of hiding the key information in the target application, and then, when the next use period starts, automatically clearing the saved screenshot times of the target application by the terminal.
Therefore, after the terminal hides the key information of the target application, the user is forced to pass the audit of the related management terminal and/or delete the screenshot corresponding to the screenshot operation, and the hiding of the key information is allowed to be released, so that the user is prevented from frequently performing screenshot operation in the target application, and the risk of information leakage caused by screenshot in an application interface is reduced.
In addition, the present invention further provides a terminal device, where the terminal device includes a memory, a processor, and a screenshot control program of the terminal device that is stored in the memory and can be run on the processor, and the processor implements the steps of the screenshot control method of the terminal device according to the above embodiment when executing the screenshot control program of the terminal device.
In addition, the present invention further provides a computer-readable storage medium, where the computer-readable storage medium includes a screenshot control program of a terminal device, and the screenshot control program of the terminal device, when executed by a processor, implements the steps of the screenshot control method of the terminal device according to the above embodiments.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is an alternative embodiment. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a television, a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only an alternative embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (11)

1. A screenshot control method of a terminal device is characterized by comprising the following steps:
when screenshot operation is detected in a target application of a terminal device, acquiring screenshot times in the target application;
and when the screenshot frequency is more than or equal to one time, hiding the key information in the target application.
2. The screenshot control method of a terminal device as claimed in claim 1, wherein said step of hiding key information in said target application comprises:
and covering and displaying a preset graph on the application interface of the target application so as to shield key information in the target application.
3. The screenshot control method of a terminal device according to claim 2, wherein the preset graphic is a preset graphic interface, and the step of displaying the preset graphic over the application interface of the target application includes:
adding a layer on the upper layer of the layer where the application interface is located;
and displaying the preset graphical interface on the newly added layer to cover the display interface.
4. The screenshot control method of a terminal device as claimed in claim 2, wherein the preset graphic is a preset picture, and the step of displaying the preset graphic over the application interface of the target application includes:
identifying key information in an application interface of the target application;
acquiring a display area where the key information is located;
and covering and displaying the preset picture on the display area.
5. The screenshot control method of a terminal device according to any one of claims 1-4, wherein after the step of obtaining the number of screenshots in a target application when the screenshot operation is detected in the target application of the terminal device, the method further comprises:
acquiring an application interface of which the corresponding screenshot times are more than or equal to one time in the target application as a target application interface;
and hiding the key information in the target application interface.
6. The screenshot control method of a terminal device according to claim 5, wherein the step of hiding the key information in the target application interface includes:
acquiring a background color value of the target application interface;
and adjusting the color value of the key information in the target application interface to be the background color value.
7. The screenshot control method of a terminal device according to claim 1, wherein after the step of hiding the key information in the target application when the screenshot number is greater than or equal to one, the method further comprises:
sending a hidden processing cancellation request of the key information to a management terminal;
and when response information returned by the management terminal based on the hiding processing canceling request is received, the hiding processing of the key information is canceled.
8. The screenshot control method of a terminal device according to claim 1 or 7, further comprising, after the step of hiding the key information in the target application when the screenshot number is greater than or equal to one, the step of:
outputting prompt information to prompt a user that the key information is hidden currently;
and when the confirmation response of the prompt message is received, deleting the screenshot corresponding to the screenshot operation, and/or sending a hidden processing cancellation request of the key message to a management terminal.
9. The screenshot control method of a terminal device according to claim 1, wherein after the step of obtaining the number of screenshots in the target application when the screenshot operation is detected in the target application of the terminal device, the method further comprises:
in the current use period of the target application, when the screenshot frequency is more than or equal to one time, executing the step of hiding the key information in the target application;
and clearing the screenshot times when the next use period of the target application starts.
10. A terminal device, characterized in that the terminal device comprises a memory, a processor and a screenshot control program of the terminal device stored on the memory and executable on the processor, and the screenshot control program of the terminal device, when executed by the processor, implements the steps of the screenshot control method of the terminal device according to any one of claims 1 to 9.
11. A computer-readable storage medium, on which a screenshot control program of a terminal device is stored, the screenshot control program of the terminal device, when executed by a processor, implementing the steps of the screenshot control method of the terminal device according to any one of claims 1 to 9.
CN202010051136.0A 2020-01-16 2020-01-16 Screenshot control method of terminal equipment, terminal equipment and storage medium Pending CN111258697A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010051136.0A CN111258697A (en) 2020-01-16 2020-01-16 Screenshot control method of terminal equipment, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010051136.0A CN111258697A (en) 2020-01-16 2020-01-16 Screenshot control method of terminal equipment, terminal equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111258697A true CN111258697A (en) 2020-06-09

Family

ID=70947594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010051136.0A Pending CN111258697A (en) 2020-01-16 2020-01-16 Screenshot control method of terminal equipment, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111258697A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140280001A1 (en) * 2013-03-14 2014-09-18 GearSay, Inc. Systems and methods for organizing, presenting, and retrieving information about items of interest in a social network of interests
CN110262735A (en) * 2019-06-17 2019-09-20 深圳传音控股股份有限公司 The processing method and mobile terminal of screenshot

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140280001A1 (en) * 2013-03-14 2014-09-18 GearSay, Inc. Systems and methods for organizing, presenting, and retrieving information about items of interest in a social network of interests
CN110262735A (en) * 2019-06-17 2019-09-20 深圳传音控股股份有限公司 The processing method and mobile terminal of screenshot

Similar Documents

Publication Publication Date Title
KR102225192B1 (en) Method and apparatus for generating security questions and verifying identities
CN108171025B (en) Method for realizing multi-user login mode, terminal and computer readable storage medium
US10635456B2 (en) Method for entering operating system desktop and mobile intelligent terminal
CN106471495B (en) Content in protection mobile device is not excavated
CN109063504B (en) Private file access method, mobile terminal and storage medium
US10395022B2 (en) Access control for a resource
US11004163B2 (en) Terminal-implemented method, server-implemented method and terminal for acquiring certification document
CN104267982A (en) Application program start control system and method
CN111783055A (en) Account information management method and device and electronic equipment
CN107506637A (en) Information displaying method and device, terminal and readable storage medium storing program for executing
CN106778381B (en) Important information processing method and terminal
CN112040145B (en) Image processing method and device and electronic equipment
CN104933375A (en) Method and system for protecting electronic display document
CN111857464A (en) Information display method and device, electronic equipment and readable storage medium
CN113282364B (en) Display method, display device and electronic equipment
CN114115664A (en) Screenshot processing method, device, equipment and medium
CN108334788B (en) File tamper-proofing method and device
CN115374451A (en) Message processing method, device, equipment and computer readable storage medium
CN115659295B (en) Page protection method, device, equipment and storage medium
CN111258697A (en) Screenshot control method of terminal equipment, terminal equipment and storage medium
CN107633174B (en) User input management method and device and terminal
CN110706221A (en) Verification method, verification device, storage medium and device for customizing pictures
CN106648671A (en) Application upgrade method and terminal
CN112417533A (en) Anti-screenshot method and device, computer equipment and storage medium
CN113395234A (en) Traffic hijacking monitoring method and device for promotion information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200609