CN111786876B - Information processing method, device, electronic equipment and computer readable medium - Google Patents

Information processing method, device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN111786876B
CN111786876B CN202010610002.8A CN202010610002A CN111786876B CN 111786876 B CN111786876 B CN 111786876B CN 202010610002 A CN202010610002 A CN 202010610002A CN 111786876 B CN111786876 B CN 111786876B
Authority
CN
China
Prior art keywords
message
interface
target
hidden
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010610002.8A
Other languages
Chinese (zh)
Other versions
CN111786876A (en
Inventor
张骏
王潇男
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Douyin Vision Co Ltd
Douyin Vision Beijing Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010610002.8A priority Critical patent/CN111786876B/en
Publication of CN111786876A publication Critical patent/CN111786876A/en
Application granted granted Critical
Publication of CN111786876B publication Critical patent/CN111786876B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure provides an information processing method, an information processing device, electronic equipment and a computer readable medium, and relates to the technical field of information processing. The method comprises the following steps: setting the display attribute of the target message to be hidden in response to the hidden setting operation for the selected target message in the message interface; and hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form. According to the technical scheme, the message with the hiding requirement can be hidden on the message interface, and the problem of poor privacy caused by the fact that the message needing to be hidden is displayed on the message interface is solved, so that better privacy protection is achieved under the condition that the message interface does not need to be quitted.

Description

Information processing method, device, electronic equipment and computer readable medium
Technical Field
The present disclosure relates to the field of information processing technologies, and in particular, to an information processing method, an information processing apparatus, an electronic device, and a computer-readable medium.
Background
With the rapid development of computer technology and communication technology, the internet is widely applied, people can use the terminal to carry out daily communication through the internet, and the communication mode of people is enriched. For example, the user can communicate through various communication platforms with chat function.
At present, chat messages of a communication platform can be directly seen in a user login state, and when a user is in a chat process or a plurality of users use the same terminal, the chat messages of the current user can be easily seen by other users, so that the privacy of the chat messages is poor.
Disclosure of Invention
The present disclosure provides an information processing method, apparatus, electronic device, and computer readable medium, which are used to solve the problems in the prior art.
In a first aspect, an information processing method is provided, and the method includes:
in response to a hiding setting operation for a selected target message in the message interface, setting a display attribute of the target message to be hidden;
and hiding the target message with the display attribute being hidden on a message interface by adopting a preset hidden message form.
In a second aspect, there is provided an information processing apparatus comprising:
the message interface hiding setting module is used for responding to hiding setting operation of a selected target message in a message interface and setting the display attribute of the target message to be hidden;
and the hiding module is used for hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form.
In a third aspect, the present disclosure provides an electronic device comprising:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the corresponding operations of the information processing method as shown in the first aspect of the present disclosure are performed.
In a fourth aspect, the present disclosure provides a computer-readable medium for storing computer instructions, which, when executed on a computer, enable the computer to perform operations corresponding to the information processing method as shown in the first aspect of the present disclosure.
The technical scheme provided by the disclosure has the following beneficial effects:
in the information processing method, the information processing apparatus, the electronic device, and the computer-readable medium provided in the embodiments of the present disclosure, in response to a hiding setting operation for a selected target message in a message interface, a display attribute of the target message is set to be hidden; and hiding the target message with the display attribute being hidden on a message interface by adopting a preset hidden message form. According to the technical scheme, the message with the hiding requirement can be hidden on the message interface, the problem of poor privacy caused by the fact that the message needing to be hidden is displayed on the message interface is solved, and therefore better privacy protection is achieved under the condition that the message interface does not need to be quitted.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present disclosure, the drawings used in the description of the embodiments of the present disclosure will be briefly described below.
Fig. 1 is a flowchart of an information processing method according to an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of decryption guidance information provided by an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of decryption guidance information provided by an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a process of decrypting a chat message according to an embodiment of the disclosure;
fig. 5 is a schematic diagram of a process of decrypting a chat message according to an embodiment of the disclosure;
fig. 6 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of a messaging interface provided by embodiments of the present disclosure;
fig. 8 is a schematic diagram of hidden message content provided by an embodiment of the present disclosure;
fig. 9 is a schematic diagram of hidden message content and format provided by an embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing the devices, modules or units, and are not used for limiting the devices, modules or units to be different devices, modules or units, and also for limiting the sequence or interdependence relationship of the functions executed by the devices, modules or units.
It is noted that references to "a" or "an" in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will appreciate that references to "one or more" are intended to be exemplary and not limiting unless the context clearly indicates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The following describes the technical solutions of the present disclosure and how to solve the above technical problems in specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present disclosure will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of an information processing method according to an embodiment of the present disclosure, and as shown in fig. 1, the method may include:
step S101, responding to the hiding setting operation of the selected target message in the message interface, and setting the display attribute of the target message to be hidden;
the execution main body of the method provided by the embodiment of the disclosure can be a terminal of a user, such as a computer, a mobile phone and the like of the user.
The message interface can comprise an interactive interface which has a chat function and shows chat messages in the communication platform. The communication platform may include, but is not limited to, a game platform, a video and audio publishing platform, a chat and friend making platform, and the like.
The user can select the message on the message interface in various ways, the terminal takes the message selected by the user as a target message, and displays a display attribute setting interface aiming at the target message, wherein the display attribute can include but is not limited to: and displaying and hiding. And receiving a setting operation aiming at the display attribute input by the user on the display attribute setting interface, and when the user clicks a 'hide' button, setting the display attribute of the selected message to be hidden by the terminal in response to the hiding setting operation aiming at the selected message by the user.
Specific implementations for targeting messages on the message interface may include a variety of implementations, as described in the following examples.
In one possible implementation, the method further includes:
responding to the message selection operation aiming at the message interface, and determining the message corresponding to the message selection operation as a target message; or
And in response to the time setting operation aiming at the message interface, determining the message corresponding to the time setting operation in the message interface as the target message.
In practical application, the terminal may determine the target message according to a selection operation of the user on the message in the message interface, and take the message corresponding to the selection operation of the user as the target message. The user interface can display a plurality of messages, and the terminal takes at least one message corresponding to the user selection operation as a target message.
In addition to determining the target message according to the selection operation of the user, the target message can be determined according to the time setting operation of the user on the message interface, and the message received (or sent) in the time period set by the time setting operation is taken as the target message.
In one example, if the user is to select a message received within the 9 am-10 pm time period of day 6/20, then "select message by received time" is selected in the message interface, the user is presented with a time input interface to receive the message reception time entered by the user at the time input interface: and 9-10 am of 20 days in 6 months, and selecting the message with the receiving time of 9-10 am of 20 days in 6 months as the target message by the terminal according to the time setting operation of the user.
In the embodiment of the application, the target message can be determined according to the selection operation of the user, and can also be determined according to the time setting operation of the user, the determination mode of the target message is flexible, and different requirements of the user can be met.
In one possible implementation manner, in response to a message selection operation for a message interface, determining a message corresponding to the message selection operation as a target message includes:
and in response to the message selection operation aiming at the message corresponding to the at least one target user in the message interface, determining the message corresponding to the at least one target user as the target message.
In practical application, all messages corresponding to one target user may be selected as target messages for message selection operation, a part of messages corresponding to one target user may also be selected as target messages, and all messages corresponding to two or more target users may also be selected as target messages.
In an example, all chat messages between the user a and the user B may be selected, some chat messages between the user a and the user B may be selected, all chat messages between the user a and the user B, and all chat messages between the user a and the user C may be selected, and the terminal takes a message corresponding to the selection operation as a target message.
Optionally, the user may also select the target user first, and then perform a time setting operation on the message corresponding to the target user. The terminal determines a target user according to the selection operation of the user, determines a target message corresponding to the target user according to the time setting operation of the message corresponding to the target user, and takes the message sent by the target user (or sent to the target user) received within the time period set by the time setting operation as the target message.
And S102, hiding the target message with the display attribute being hidden on a message interface by adopting a preset hidden message form.
The preset hidden message form may include, but is not limited to, the content of the hidden target message, or the content and format of the hidden target message. When the content of the target message is hidden, the format of the target message can be reserved at the position corresponding to the target message, and a user is prompted to have the hidden message; when the content and the format of the target message are hidden, in order to display the prompt information at the corresponding position of the target message or the designated position in the message interface, the user is prompted to have the hidden message through the prompt information.
In one example, the message interface before hiding is shown in fig. 7, and includes message 1, message 2, message 3, and message 4; when the content of the target message is hidden, the format of the target message can be reserved at the position corresponding to the target message to prompt a user that the hidden message exists, the message 2 in fig. 7 is hidden as the target message, the content of the message 2 is hidden, and the format is reserved, as shown in fig. 8, the format of the hidden target message is represented by a black line frame; when hiding the content and format of the target message, in order to display the prompt message at the position corresponding to the target message or the designated position in the message interface, the user is prompted to have the hidden message by the prompt message, the message 2 in fig. 7 is hidden as the target message, and the content and format of the message 2 are hidden, as shown in fig. 9, the user is prompted to have the hidden message by the hidden message shown in fig. 9; or a user identifier corresponding to the target message, for example, a user name, a user avatar, or the like, may be displayed at the position corresponding to the target message, and the user identifier prompts that the hidden message exists at the position.
In one possible implementation, the hidden setting operation includes a message encryption operation, and the method further includes:
responding to the message encryption operation, and acquiring encryption information;
storing the encrypted information and the content of the target message in a specified storage space in an associated manner;
setting the display attribute of the target message as hidden, comprising:
and setting the display attribute of the target message to be encrypted and hidden.
In practical application, the hidden setting operation may include multiple hidden setting modes, and may directly hide the target message in the message interface, and further, for better privacy protection, the target message may be hidden in an encrypted mode, and the display attribute of the target message is set to be encrypted and hidden. And acquiring encryption information according to the message encryption operation. The specific form of the encrypted information may include at least one of numbers, letters, symbols, images, videos, audios, and the like.
And after the encrypted information of the user aiming at the selected message is obtained, establishing an association relation between the encrypted information and the corresponding target message. The user can input corresponding encryption information for each target message, that is, one target message corresponds to one encryption information; in addition, the same encryption information may also be input for two or more target messages, that is, two or more target messages correspond to one encryption information, which is not limited in this disclosure. When a user inputs corresponding encryption information for each target message, establishing an association relationship between the target message and the corresponding encryption information; when a user inputs the same encrypted information aiming at two or more than two target messages, the encrypted information and two or more than two chatting records are established into an association relation.
If the user logging in the communication platform at the current terminal is the user A, when the chat message in the chat interactive interface is at least one chat message of the user corresponding to the first user identifier, the first user identifier can be a user establishing a friend relationship with the user A, the user identifier of the user B, the friend relationship is a friend request sent by one user, and after the other user receives the request, the two users can send messages to each other for chatting. If the chat messages in the chat interactive interface are messages for chatting between the user A and the user B, each chat message comprises a corresponding message identifier, and when the user sets encryption operation on one or more chat messages, the encryption information can be associated with the message identifier of each message, and the corresponding encryption information can be determined according to the message identifier of each message.
In addition, the message interface may also be a user identifier list interface, the chat message may be a chat message corresponding to at least one second user identifier displayed in the user identifier list interface, and if the user whose current terminal logs in the communication platform is the user a, when the chat message in the chat interaction interface is a chat message corresponding to each of a plurality of second user identifiers, the second user identifier may be a user who has established a friend relationship with the user a: the chat messages in the chat interactive interface are respectively the chat message records of the chat between the user A and the user B, between the user A and the user C and the like, each chat message corresponds to the corresponding second user identifier, after the user A sets the encryption information for the chat message corresponding to the user B, the encryption information is set for all the chat messages before the user A and the user B by the user A, the association relationship between the encryption information and the user identifier of the user B is established, and the corresponding encryption information can be determined according to the user identifier of the user B.
After the encrypted information is associated with the message identifier of at least one chat message, the encrypted information and the chat message corresponding to the message identifier associated with the encrypted information can be sent to the server for storage, after a response message returned by the server is received, the terminal deletes the chat message corresponding to the encrypted information in the chat interactive interface, or stores the chat message corresponding to the encrypted information in a local encrypted database, so that the encrypted chat message is not displayed in the current chat interactive interface any more. In the embodiment of the disclosure, part or all of all the chat messages corresponding to the current user and a certain friend user can be encrypted, so that the privacy protection requirement of the current user on the chat messages is met, and the security of the chat messages is improved.
In one possible implementation, obtaining encryption information in response to a message encryption operation includes:
responding to the message encryption operation aiming at the target message, and displaying an encryption information acquisition interface;
and acquiring the encrypted information through the encrypted information acquisition interface.
In practical application, when a terminal receives a message encryption operation aiming at a target message, an encryption information acquisition interface is displayed, wherein the encryption information acquisition interface can comprise but is not limited to a button for a user to select default encryption information and a button for customizing encryption information, and when the user selects the default encryption information, the pre-stored encryption information is used as the encryption information of the target message; and when the user selects the custom encryption information, receiving the custom encryption information set by the user as the encryption information of the target message.
In one possible implementation mode, a candidate encryption mode option is displayed on an encryption information acquisition interface;
obtaining the encrypted information through an encrypted information obtaining interface, comprising:
and responding to the encryption mode selection operation aiming at the candidate encryption mode option, and acquiring the encryption information by adopting the encryption mode corresponding to the encryption mode selection operation.
In practical application, the encryption information acquisition interface displays candidate encryption mode options, and the candidate encryption modes may include, but are not limited to: inputting password encryption, selecting password encryption and encrypting user characteristic information. User characteristic information may include, but is not limited to: fingerprint features, facial features of the user. And acquiring encryption information according to the encryption mode corresponding to the selection operation, and encrypting the target message. In the embodiment of the application, the encrypted information acquisition interface provides multiple encryption modes for a user to select, and the personalized requirements of the user can be met.
In a possible implementation manner, the acquiring of the encrypted information through the encrypted information acquiring interface includes any one of the following:
acquiring encrypted information input by aiming at an encrypted information acquisition interface;
responding to the selection operation aiming at the encrypted information option to obtain encrypted information, wherein the encrypted information option is displayed on an encrypted information acquisition interface;
and acquiring user characteristic information through an encrypted information acquisition interface, and taking the user characteristic information as encrypted information.
In practical application, the requirements of users on various encryption modes can be met. The encryption scheme may include any of: inputting a password, selecting the password and encrypting the user characteristics. When the user selects the password input mode for encryption, displaying a password input interface, and receiving a password input by the user on the password input interface as encryption information of the target message; when a user selects a password encryption mode, a password selection interface is displayed for the user, the password selection interface comprises numbers, characters, symbols and the like, and each component of encryption information is determined according to the selection operation of the user aiming at least one of the numbers, the characters and the symbols to obtain the encryption information; when the user selects user feature encryption, fingerprint features or facial features of the user are collected to serve as encryption information of the target message.
In one possible implementation, the method further comprises:
and responding to the message display operation aiming at the target message with the selected display attribute being hidden in the message interface, and displaying the content of the target message.
In practical application, for a target message hidden in a message interface, a position corresponding to the target message or a designated position in the message interface may display a prompt message to prompt a user that the position has the hidden message. When the user needs to view the message content, the content of the target message is displayed to the user according to the message display operation of the user, for example, the click operation aiming at the prompt message.
In one possible implementation, the method further includes:
responding to message display operation aiming at a target message with a selected display attribute of encryption hiding in a message interface, and acquiring encryption information of the target message;
and acquiring the content of the target message from the specified storage space according to the encrypted information and displaying the content.
The message display operation may be a decryption operation, after the encrypted information is obtained, the encrypted information is verified, and if the verification is passed, the content of the target message is obtained from the specified storage space and displayed.
For the encrypted hidden target message, the corresponding position of the target message or the designated position in the message interface can display decryption guide information, and the decryption guide information is used for guiding a user to decrypt the encrypted chat message. The decryption guidance information may be text information, image information, a combination of text and image, an encryption information input box, and the like. After the decryption guide information is triggered, the encryption information input by the user can be received, and decryption is performed by using the encryption information. The decryption guidance information may also be triggered by the user, and then the user characteristics are collected according to the user trigger, which includes but is not limited to: fingerprint features, facial features, etc.
In an example, the message interface includes 5 chat messages, and if the user sets the same encryption information for the first chat message and the third chat message, the first chat message and the third chat message are hidden in the message interface, and the decryption guidance information is displayed at a position of the first chat message in the message interface before encryption: the text content 'please input the encrypted information' and a corresponding encrypted information input box; likewise, the decryption guidance information is displayed at the position of the third chat message in the message interface before encryption: the text content 'please input the encryption information' and the corresponding encryption information input box.
In the embodiment of the disclosure, because the two users have time sequence when chatting, when the chatting messages are encrypted, in order to avoid disturbing the display sequence of the chatting messages, the decryption guide information is displayed at the corresponding position of each chatting message, so that the users can conveniently check the context information.
After a user encrypts two or more chat messages with continuous positions in the message interface, one piece of decryption guide information can be displayed at the positions corresponding to the two or more chat messages, so that the display sequence of the chat messages is not disturbed, the display area can be saved, the problem that the user can check the corresponding chat messages by multiple operations when the plurality of pieces of decryption guide information are displayed in the message interface is avoided, and the operation times are reduced.
As in the above example, if the user sets the same encryption information for the first chat message, the third chat message, and the fourth chat message in the message interface, the first chat message, the third chat message, and the fourth chat message are hidden in the message interface, and the decryption guidance information is displayed at the position of the first chat message in the message interface before encryption: the text content 'please input the encrypted information' and a corresponding encrypted information input box; displaying a decryption guide message at the position of the third chat message and the fourth chat message in the message interface before encryption: the text content 'please input the encryption information' and the corresponding encryption information input box.
In addition, if the chat message in the message interface is a chat message corresponding to each of the plurality of users, when the decryption guidance information is displayed, one piece of decryption guidance information may be displayed at a designated position in the message interface. For example, displaying decryption guidance information at the top of the page: the text content 'private chat group' and the encrypted information input box; or displaying the text content 'private chat group', and displaying an encrypted information input box when receiving the click operation of the user.
When the chat messages in the message interface are the chat messages corresponding to a plurality of users, each chat message corresponds to each user identifier, and the problem of display sequence can be not considered among the chat messages, so that the decryption guide information can be displayed in the message interface after each chat message is encrypted, and the decryption guide information corresponding to each user identifier can be displayed at the appointed position in the message interface when the encryption information corresponding to each chat message is different; when the encryption information corresponding to a plurality of chat messages is the same, one piece of decryption guide information corresponding to more than two user identifications can be displayed at the appointed position in the message interface, so that the problem that the page area is excessively occupied is avoided.
After a user triggers decryption guide information, a terminal sends a decryption request to a server, the decryption request carries encrypted information, the server verifies the encrypted information, and after the verification is successful, a corresponding chat message is determined based on the content of the encrypted information and is sent to the terminal; or after receiving the encrypted information, the server verifies the encrypted information, sends a notification message to the terminal after the verification is passed, and the terminal inquires the chat message content corresponding to the encrypted information from the local encrypted database based on the notification message and displays the chat message content.
When the encrypted information is in the form of a password, in order to improve the smoothness of user operation and reduce the problem of password re-input caused by misoperation and the like, optionally, the length of the password can be set to 4-6 characters, if the password continuously input by the user comprises the passwords in the correct sequence, the password is input correctly, if the length of the continuously input password exceeds a certain number of characters, the password is input in failure, when the failure frequency of the password input by the user reaches a threshold value, a cooling period is entered, the user cannot input the password for decryption in the cooling period, the input failure information can be recorded in a server, and the cooling state cannot be released when the user logs in again or clears the cache and the like, so that the security of private data is improved. After the cooling period is over, the user may again enter the encrypted information for decryption. And after the server successfully verifies the encrypted information, the terminal obtains the chat messages corresponding to the encrypted information, and displays the chat messages in a message interface for the user to browse.
For better explanation of the technical solution of the present disclosure, how to display the decryption guidance information when the chat message in the message interface is a chat message corresponding to a user is described below by using an example.
As shown in fig. 2, the message interface (e.g. the private letter detail page shown in the figure) includes a plurality of chat messages, where the plurality of chat messages are chat messages corresponding to the first user identifier. After a second chat message in the message interface is encrypted, the second chat message is hidden in the message interface, and decryption guide information is displayed at a position corresponding to the second chat message, such as "enter password to unlock private chat" and a numeric keypad, as shown in the figure, through which the user can decrypt the encrypted chat message.
How to display the decryption guidance information when the message interface is a user identifier list interface and each chat message is a chat message corresponding to at least one second user identifier displayed in the user identifier list interface is described as an example below.
As shown in FIG. 3, the message interface is a user identification list interface (e.g., private messenger page as shown), where "Rachel Jayson" is shown as the user identification and "Can't wait to see you! "identify the content of the corresponding latest chat message for the user. When at least one of the chat messages is encrypted, a user identifier and the chat message corresponding to the encrypted chat message are hidden in a message interface, decryption guide information is displayed at the top end of the message interface, the specific form of the decryption guide information is a text content 'private chat' and an encryption information input box in a rotating wheel mode, and a user can select a password in an up-and-down sliding rotating wheel mode to decrypt the encrypted chat message.
To better explain the decryption process of the chat message in the embodiment of the present disclosure, the decryption process is described below by way of an example.
As shown in fig. 4, if the message interface is a chat message interaction interface corresponding to the first user identifier, in an encrypted state, at least one piece of decryption guidance information and at least one piece of chat message corresponding to the first user identifier are displayed in the interface. When receiving a decryption operation of a user for the decryption guide information, displaying a password input interface; when a password input by a user is received, verifying the password, acquiring a corresponding chat message when the verification is successful (the password is correct as shown in the figure), displaying the chat message on a message interface, and quitting the message interface (quitting the private chat detail page as shown in the figure) when a quitting operation of the user is received; if the password authentication fails and the failure times reach the threshold value, entering a locking state, entering a cooling period, wherein in the cooling period, the user cannot input the password again for decryption, and after the cooling period is finished, entering an encryption state again, and the user can input the password again for decryption.
As shown in fig. 5, if the message interface is a user identifier list interface, in an encrypted state, the user identifier list interface displays decryption guide information and a second user identifier corresponding to an unencrypted chat message, the second user identifier corresponding to the encrypted chat message is hidden in the current page (in a hidden state shown in the figure), when a downward sliding operation of the user for the decryption guide information is received (as a private list page slides down) the password input box is displayed, the state is to be unlocked, when the password input by the user is received, the password is verified, if the verification is successful (as the password shown in the figure is correct), the second user identifier corresponding to the decryption guide information is displayed on the user identifier list interface (as the displayed state shown in the figure), if the password is input incorrectly and the number of input errors reaches a threshold value, the state is unlocked and the user cannot input the password again for decryption, after the cooling period is over, the user can input the password again for decryption.
The information processing method provided by the embodiment of the disclosure sets the display attribute of the target message to be hidden in response to the hidden setting operation for the selected target message in the message interface; and hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form. According to the technical scheme, the message with the hiding requirement can be hidden on the message interface, and the problem of poor privacy caused by the fact that the message needing to be hidden is displayed on the message interface is solved, so that better privacy protection is achieved under the condition that the message interface does not need to be quitted.
Based on the same principle as the method shown in fig. 1, an embodiment of the present disclosure also provides an information processing apparatus 30, as shown in fig. 6, where the information processing apparatus 30 may include:
a setting module 31, configured to set a display attribute of a selected target message in a message interface as hidden in response to a hidden setting operation for the target message;
and the hiding module 32 is configured to hide the target message with the display attribute being hidden on the message interface in a preset hidden message form.
In one possible implementation, the hidden setting operation includes a message encryption operation, and the information processing apparatus 30 further includes an obtaining module configured to:
responding to the message encryption operation, and acquiring encryption information;
storing the encrypted information and the content of the target message in a specified storage space in an associated manner;
the setting module 31, when setting the display attribute of the target message to be hidden, is configured to:
and setting the display attribute of the target message as encryption hiding.
In one possible implementation manner, the obtaining module is configured to:
responding to the message encryption operation aiming at the target message, and displaying an encrypted information acquisition interface;
and acquiring the encrypted information through the encrypted information acquisition interface.
In a possible implementation manner, a candidate encryption mode option is displayed on the encryption information acquisition interface;
the obtaining module is used for obtaining the encrypted information through the encrypted information obtaining interface:
and responding to the encryption mode selection operation aiming at the candidate encryption mode option, and acquiring the encryption information by adopting the encryption mode corresponding to the encryption mode selection operation.
In a possible implementation manner, the acquiring of the encrypted information through the encrypted information acquiring interface includes any one of the following:
acquiring encrypted information input by aiming at an encrypted information acquisition interface;
responding to the selection operation aiming at the encrypted information option to obtain encrypted information, wherein the encrypted information option is displayed on an encrypted information acquisition interface;
and acquiring user characteristic information through an encrypted information acquisition interface, and taking the user characteristic information as encrypted information.
The information processing apparatus 30 further includes a target message determination module for:
responding to the message selection operation aiming at the message interface, and determining the message corresponding to the message selection operation as a target message; or
And in response to the time setting operation aiming at the message interface, determining the message corresponding to the time setting operation in the message interface as the target message.
In one possible implementation manner, when the target message determination module determines, in response to a message selection operation for the message interface, a message corresponding to the message selection operation as a target message, the target message determination module is configured to:
and in response to a message selection operation aiming at the message corresponding to the at least one target user in the message interface, determining the message corresponding to the at least one target user as a target message.
In one possible implementation, the information processing apparatus 30 further includes a content display module configured to:
and responding to the message display operation aiming at the target message with the selected display attribute being hidden in the message interface, and displaying the content of the target message.
In one possible implementation, the information processing apparatus 30 further includes a message display module configured to:
responding to message display operation aiming at a target message with a selected display attribute of encryption hiding in a message interface, and acquiring encryption information of the target message;
and acquiring the content of the target message from the specified storage space according to the encrypted information and displaying the content.
The information processing apparatus according to the embodiment of the present disclosure may execute the information processing method provided by the embodiment of the present disclosure, and the implementation principle is similar, the actions executed by the modules in the information processing apparatus according to the embodiments of the present disclosure correspond to the steps in the information processing method according to the embodiments of the present disclosure, and for the detailed functional description of the modules in the information processing apparatus, reference may be specifically made to the description in the corresponding information processing method shown in the foregoing, and details are not repeated here.
In the information processing apparatus provided in the embodiment of the present disclosure, in response to a hiding setting operation for a selected target message in a message interface, a display attribute of the target message is set to be hidden; and hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form. According to the technical scheme, the message with the hiding requirement can be hidden on the message interface, the problem of poor privacy caused by the fact that the message needing to be hidden is displayed on the message interface is solved, and therefore better privacy protection is achieved under the condition that the message interface does not need to be quitted.
Referring now to FIG. 10, shown is a schematic diagram of an electronic device 600 suitable for use in implementing embodiments of the present disclosure. The execution subject of the technical solution of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle-mounted terminal (e.g., a car navigation terminal), etc., and a stationary terminal such as a digital TV, a desktop computer, etc. The electronic device shown in fig. 10 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
The electronic device includes: a memory and a processor, wherein the processor may be referred to as a processing device 601 described below, and the memory may include at least one of a Read Only Memory (ROM) 602, a Random Access Memory (RAM) 603, and a storage device 608, which are described below:
as shown in fig. 10, the electronic device 600 may include a processing means (e.g., central processing unit, graphics processor, etc.) 601 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 600 to communicate with other devices wirelessly or by wire to exchange data. While fig. 10 illustrates an electronic device 600 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: in response to a hiding setting operation for a selected target message in the message interface, setting a display attribute of the target message to be hidden; and hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules or units described in the embodiments of the present disclosure may be implemented by software or hardware. Wherein the designation of a module or unit does not in some cases constitute a limitation of the unit itself.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems on a chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
According to one or more embodiments of the present disclosure, there is provided an information processing method including:
in response to a hiding setting operation for a selected target message in a message interface, setting a display attribute of the target message to be hidden;
and hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form.
In one possible implementation, the hiding setting operation includes a message encryption operation, and the method further includes:
responding to the message encryption operation, and acquiring encryption information;
storing the encryption information and the content of the target message in a specified storage space in an associated manner;
the setting the display attribute of the target message to be hidden comprises:
and setting the display attribute of the target message as encryption hiding.
In one possible implementation, the obtaining encryption information in response to the message encryption operation includes:
responding to the message encryption operation aiming at the target message, and displaying an encryption information acquisition interface;
and acquiring the encrypted information through the encrypted information acquisition interface.
In a possible implementation manner, the encryption information acquisition interface displays candidate encryption mode options;
the acquiring of the encrypted information through the encrypted information acquisition interface includes:
and responding to the encryption mode selection operation aiming at the candidate encryption mode option, and acquiring encryption information by adopting the encryption mode corresponding to the encryption mode selection operation.
In a possible implementation manner, the acquiring of the encrypted information through the encrypted information acquiring interface includes any one of:
acquiring encryption information input by aiming at the encryption information acquisition interface;
responding to the selection operation aiming at the encrypted information option to obtain encrypted information, wherein the encrypted information option is displayed on the encrypted information acquisition interface;
and acquiring user characteristic information through the encrypted information acquisition interface, and taking the user characteristic information as the encrypted information.
In one possible implementation, the method further includes:
responding to the message selection operation aiming at the message interface, and determining the message corresponding to the message selection operation as a target message; or
And in response to the time setting operation aiming at the message interface, determining the message corresponding to the time setting operation in the message interface as a target message.
In one possible implementation manner, the determining, in response to a message selection operation for the message interface, a message corresponding to the message selection operation as a target message includes:
and in response to a message selection operation aiming at a message corresponding to at least one target user in the message interface, determining the message corresponding to the at least one target user as a target message.
In one possible implementation, the method further includes:
and responding to the message display operation aiming at the target message with the selected display attribute being hidden in the message interface, and displaying the content of the target message.
In one possible implementation, the method further includes:
responding to message display operation aiming at a target message with a selected display attribute of encryption hiding in the message interface, and acquiring encryption information of the target message;
and acquiring and displaying the content of the target message from the specified storage space according to the encrypted information.
According to one or more embodiments of the present disclosure, there is provided an information processing apparatus including:
the setting module is used for responding to hiding setting operation aiming at the selected target message in the message interface and setting the display attribute of the target message to be hidden;
and the hiding module is used for hiding the target message with the display attribute being hidden on the message interface by adopting a preset hidden message form.
In a possible implementation manner, the hidden setting operation includes a message encryption operation, and the information processing apparatus further includes an obtaining module configured to:
responding to the message encryption operation, and acquiring encryption information;
storing the encryption information and the content of the target message in a specified storage space in an associated manner;
the setting module is configured to, when the display attribute of the target message is set to be hidden:
and setting the display attribute of the target message as encryption hiding.
In a possible implementation manner, the obtaining module is configured to:
responding to the message encryption operation aiming at the target message, and displaying an encrypted information acquisition interface;
and acquiring the encrypted information through the encrypted information acquisition interface.
In a possible implementation manner, the encryption information acquisition interface displays candidate encryption mode options;
the acquisition module is configured to:
and responding to the encryption mode selection operation aiming at the candidate encryption mode option, and acquiring encryption information by adopting the encryption mode corresponding to the encryption mode selection operation.
In a possible implementation manner, the acquiring of the encrypted information through the encrypted information acquiring interface includes any one of:
acquiring encryption information input by aiming at the encryption information acquisition interface;
responding to the selection operation aiming at the encrypted information option to obtain encrypted information, wherein the encrypted information option is displayed on the encrypted information acquisition interface;
and acquiring user characteristic information through the encrypted information acquisition interface, and taking the user characteristic information as the encrypted information.
In one possible implementation manner, the information processing apparatus further includes a target message determination module configured to:
responding to the message selection operation aiming at the message interface, and determining the message corresponding to the message selection operation as a target message; or
And in response to the time setting operation aiming at the message interface, determining the message corresponding to the time setting operation in the message interface as a target message.
In one possible implementation manner, when the target message determination module determines, in response to a message selection operation for the message interface, that a message corresponding to the message selection operation is a target message, the target message determination module is configured to:
and in response to a message selection operation aiming at a message corresponding to at least one target user in the message interface, determining the message corresponding to the at least one target user as a target message.
In one possible implementation manner, the information processing apparatus further includes a content display module configured to:
and responding to the message display operation aiming at the target message with the selected display attribute being hidden in the message interface, and displaying the content of the target message.
In one possible implementation manner, the information processing apparatus further includes a message display module configured to:
responding to message display operation aiming at a target message with a selected display attribute of encryption hiding in the message interface, and acquiring encryption information of the target message;
and acquiring the content of the target message from the specified storage space according to the encryption information and displaying the content.
In accordance with one or more embodiments of the present disclosure, there is provided an electronic device including:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the information processing method is executed.
According to one or more embodiments of the present disclosure, there is provided a computer-readable medium for storing computer instructions which, when executed on a computer, make the computer perform the information processing method.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (12)

1. An information processing method, characterized in that the method comprises: in response to a hiding setting operation for a selected target message in a message interface, setting a display attribute of the target message to be hidden, and displaying a user identifier corresponding to the target message at a position corresponding to the target message;
hiding the target message with the display attribute of being hidden on the message interface by adopting a preset hidden message form;
when the hidden message is in the form of the content of the hidden target message, hiding the target message with the display attribute of being hidden on the message interface, and reserving the format of the target message at the position corresponding to the target message in the message interface;
when the hidden message is in the form of the content and the format of the hidden target message, hiding the target message with the display attribute of being hidden on the message interface, and displaying prompt information at a position corresponding to the target message in the message interface or a designated position in the message interface;
wherein the hiding setting operation comprises inputting corresponding encryption information for each target message; and/or, inputting the same encryption information aiming at two or more target messages.
2. The information processing method according to claim 1, wherein the hidden setting operation includes a message encryption operation, the method further comprising:
responding to the message encryption operation, and acquiring encryption information;
storing the encryption information and the content of the target message in a specified storage space in an associated manner;
the setting the display attribute of the target message to be hidden comprises:
and setting the display attribute of the target message as encryption hiding.
3. The information processing method according to claim 2, wherein said obtaining encryption information in response to the message encryption operation includes:
responding to the message encryption operation aiming at the target message, and displaying an encryption information acquisition interface;
and acquiring the encrypted information through the encrypted information acquisition interface.
4. The method according to claim 3, wherein the encryption information acquisition interface displays a candidate encryption mode option;
the acquiring of the encrypted information through the encrypted information acquisition interface includes:
and responding to the encryption mode selection operation aiming at the candidate encryption mode option, and acquiring encryption information by adopting the encryption mode corresponding to the encryption mode selection operation.
5. The information processing method according to claim 3, wherein the acquiring of the encrypted information through the encrypted information acquisition interface includes any one of:
acquiring encryption information input by aiming at the encryption information acquisition interface;
responding to the selection operation aiming at the encrypted information option to obtain encrypted information, wherein the encrypted information option is displayed on the encrypted information acquisition interface;
and acquiring user characteristic information through the encrypted information acquisition interface, and taking the user characteristic information as the encrypted information.
6. The information processing method according to claim 1, wherein the method further comprises:
responding to the message selection operation aiming at the message interface, and determining the message corresponding to the message selection operation as a target message; or
And in response to the time setting operation aiming at the message interface, determining the message corresponding to the time setting operation in the message interface as a target message.
7. The information processing method according to claim 6, wherein the determining, in response to a message selection operation for the message interface, a message corresponding to the message selection operation as a target message includes:
and in response to a message selection operation aiming at a message corresponding to at least one target user in the message interface, determining the message corresponding to the at least one target user as a target message.
8. The information processing method according to claim 1, characterized by further comprising:
and responding to the message display operation aiming at the target message with the selected display attribute being hidden in the message interface, and displaying the content of the target message.
9. The information processing method according to claim 2, characterized by further comprising:
responding to message display operation aiming at a target message with a selected display attribute of encryption hiding in the message interface, and acquiring encryption information of the target message;
and acquiring the content of the target message from the specified storage space according to the encryption information and displaying the content.
10. An information processing apparatus characterized in that the apparatus comprises:
the setting module is used for responding to the hiding setting operation aiming at the selected target message in the message interface, setting the display attribute of the target message to be hidden, and displaying the user identification corresponding to the target message at the position corresponding to the target message;
the hiding module is used for hiding the target message with the display attribute being hidden on the message interface in a preset hidden message form;
wherein, when the hidden message is in the form of hiding the content of the target message, the hiding module is further configured to: reserving the format of the target message at the position corresponding to the target message in the message interface;
when the hidden message form is the content and format of the hidden target message, the hiding module is further configured to: displaying prompt information at a position corresponding to a target message in the message interface or a designated position in the message interface;
wherein the hiding setting operation comprises inputting corresponding encryption information for each target message; and/or, inputting the same encryption information aiming at two or more target messages.
11. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the information processing method according to any one of claims 1 to 9 is executed.
12. A computer-readable medium for storing computer instructions which, when executed on a computer, cause the computer to perform the information processing method of any one of claims 1 to 9.
CN202010610002.8A 2020-06-29 2020-06-29 Information processing method, device, electronic equipment and computer readable medium Active CN111786876B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010610002.8A CN111786876B (en) 2020-06-29 2020-06-29 Information processing method, device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010610002.8A CN111786876B (en) 2020-06-29 2020-06-29 Information processing method, device, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN111786876A CN111786876A (en) 2020-10-16
CN111786876B true CN111786876B (en) 2022-11-04

Family

ID=72760191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010610002.8A Active CN111786876B (en) 2020-06-29 2020-06-29 Information processing method, device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN111786876B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112416210A (en) * 2020-11-11 2021-02-26 珠海格力电器股份有限公司 Information encryption and decryption method, system, storage medium and electronic equipment
CN112528326B (en) * 2020-12-09 2024-01-02 维沃移动通信有限公司 Information processing method and device and electronic equipment
CN112965778B (en) * 2021-03-22 2023-08-04 北京五八信息技术有限公司 Chat page display method, chat page display device, electronic equipment and computer readable medium
CN113194198B (en) * 2021-04-29 2022-10-11 维沃移动通信有限公司 Message processing method and message processing device
CN114117541A (en) * 2022-01-26 2022-03-01 中国民航信息网络股份有限公司 Reservation recording information protection method, related device and computer storage medium
CN114598671B (en) * 2022-03-21 2023-01-31 北京明略昭辉科技有限公司 Session message processing method, device, storage medium and electronic equipment
CN114610199B (en) * 2022-03-21 2023-04-21 北京明略昭辉科技有限公司 Session message processing method and device, storage medium and electronic equipment
CN114817784A (en) * 2022-04-11 2022-07-29 维沃移动通信有限公司 Message processing method and device, electronic equipment and readable storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463004A (en) * 2013-09-24 2015-03-25 北京三星通信技术研究有限公司 Method and device for protecting interface content

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9985933B2 (en) * 2014-12-29 2018-05-29 Entefy Inc. System and method of sending and receiving secret message content over a network
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN107194268A (en) * 2017-06-30 2017-09-22 珠海市魅族科技有限公司 A kind of information processing method, device, computer installation and readable storage medium storing program for executing
CN110659512B (en) * 2019-09-27 2022-02-11 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463004A (en) * 2013-09-24 2015-03-25 北京三星通信技术研究有限公司 Method and device for protecting interface content

Also Published As

Publication number Publication date
CN111786876A (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN111786876B (en) Information processing method, device, electronic equipment and computer readable medium
US10735196B2 (en) Password-less authentication for access management
US10157275B1 (en) Techniques for access management based on multi-factor authentication including knowledge-based authentication
US9794264B2 (en) Privacy controlled network media sharing
US11818140B2 (en) Targeted authentication queries based on detected user actions
US20180124599A1 (en) Authentication for a limited data entry device
EP3272093B1 (en) Method and system for anti-phishing using smart images
US9740835B2 (en) Systems and methods for creating and sharing protected content
CN112040330A (en) Video file processing method and device, electronic equipment and computer storage medium
US20150111535A1 (en) Method and apparatus for providing service based on voice session authentication
CN110555300A (en) application program authorization method, client, server, terminal device and medium
CN112487451B (en) Display method and device and electronic equipment
US20220248227A1 (en) Network Authentication Via Encrypted Network Access Packages
CN112328094A (en) Information input method, cloud input method system and client
US9886572B2 (en) Lie vault
CN112311750B (en) Interaction method and device and electronic equipment
JP6753728B2 (en) Programs, information processing methods, and terminals
CN111897620A (en) Interaction method and device and electronic equipment
CN111131284B (en) Information verification method and device, electronic equipment and computer readable storage medium
CN115510419A (en) Electronic equipment control method and device, electronic equipment and storage medium
CN107580001B (en) Application login and authentication information setting method and device, computer device and storage medium
CN113595853A (en) Mail attachment processing method and device, electronic equipment and storage medium
CN110619218B (en) Method and apparatus for generating information
JP7071107B2 (en) Programs, information processing methods, and information processing terminals
CN111343138B (en) Information processing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee after: Tiktok vision (Beijing) Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee before: BEIJING BYTEDANCE NETWORK TECHNOLOGY Co.,Ltd.

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee after: Douyin Vision Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee before: Tiktok vision (Beijing) Co.,Ltd.