CN112035878A - Information display method and device and electronic equipment - Google Patents

Information display method and device and electronic equipment Download PDF

Info

Publication number
CN112035878A
CN112035878A CN202010897876.6A CN202010897876A CN112035878A CN 112035878 A CN112035878 A CN 112035878A CN 202010897876 A CN202010897876 A CN 202010897876A CN 112035878 A CN112035878 A CN 112035878A
Authority
CN
China
Prior art keywords
privacy
information
electronic device
target message
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010897876.6A
Other languages
Chinese (zh)
Inventor
陈强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Hangzhou Co Ltd
Original Assignee
Vivo Mobile Communication Hangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Hangzhou Co Ltd filed Critical Vivo Mobile Communication Hangzhou Co Ltd
Priority to CN202010897876.6A priority Critical patent/CN112035878A/en
Publication of CN112035878A publication Critical patent/CN112035878A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/043Real-time or near real-time messaging, e.g. instant messaging [IM] using or handling presence information

Abstract

The application discloses an information display method, an information display device and electronic equipment, belongs to the technical field of communication, and can solve the problem that privacy of a user to which privacy information belongs is leaked due to the fact that the user wants to send a message with the privacy information in a fast forwarding mode. The method comprises the following steps: the method comprises the steps that first electronic equipment receives a target message which is sent by second electronic equipment and contains privacy information, wherein the target message carries a privacy instruction; the method comprises the steps that under the condition that first input aiming at the target message is received by first electronic equipment, privacy processing is carried out on the privacy information, and the processed target message is obtained; wherein the first input is used to indicate a target operation, and the target operation includes any one of: copying, forwarding and screen capturing; and responding to the first input, and executing the target operation on the processed target message by the first electronic equipment.

Description

Information display method and device and electronic equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to an information display method and device and electronic equipment.
Background
Currently, users can conveniently use an instant chat application to send messages (such as text messages, picture messages, etc.) to other users, so as to perform real-time communication. It is assumed that user a sends a message to user B using the instant chat application, where the message may be a message with the personal privacy information of user a, and when user B needs to inform other users of a part of the content in the message, user B can easily forward the message to other users by one-touch because the current instant chat application is very simple and convenient to forward the message (for example, user B can copy the message directly and send the message).
However, the user a does not want the message with personal privacy to be sent to other users by the user B, and obviously, the one-key forwarding operation leaks the personal privacy of the user a, which brings personal security risks to the user a.
Disclosure of Invention
The embodiment of the application aims to provide an information display method, an information display device and electronic equipment, which can solve the problem that privacy of a user to whom private information belongs is leaked due to the fact that the user wants to send a message with the private information in a fast forwarding mode.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides an information display method, which is applied to a first electronic device, and the method includes: the method comprises the steps that first electronic equipment receives a target message which is sent by second electronic equipment and contains privacy information, wherein the target message carries a privacy instruction; the method comprises the steps that under the condition that first input aiming at the target message is received by first electronic equipment, privacy processing is carried out on the privacy information, and the processed target message is obtained; wherein the first input is used to indicate a target operation, and the target operation includes any one of: copying, forwarding and screen capturing; and responding to the first input, and executing the target operation on the processed target message by the first electronic equipment.
In a second aspect, an embodiment of the present application provides an information display method, which is applied to a second electronic device, and the method includes: the second electronic equipment generates a target message; the second electronic equipment adds a privacy instruction to the target message under the condition that the target message contains privacy information; the second electronic equipment sends a target message added with the privacy instruction to the first electronic equipment; the privacy instruction is used for instructing the first electronic equipment to perform privacy processing on the privacy message when receiving a first input aiming at the target message; wherein the first input is used to indicate a target operation, and the target operation includes any one of: copy, forward, and screen capture.
In a third aspect, an embodiment of the present application provides an information display apparatus, where the apparatus includes a receiving module, a processing module, and an executing module; the receiving module is configured to receive a target message that is sent by a second electronic device and contains privacy information, where the target message carries a privacy instruction; the processing module is configured to, when a first input for the target message received by the receiving module is received, perform privacy processing on the privacy information to obtain a processed target message; wherein the first input is used to indicate a target operation, and the target operation includes any one of: copying, forwarding and screen capturing; the execution module is configured to execute the target operation on the processed target message processed by the processing module.
In a fourth aspect, an embodiment of the present application provides an information display apparatus, where the apparatus includes: the device comprises a generating module, a processing module and a sending module; the generating module is configured to generate a target message; the processing module is used for adding a privacy instruction to the target message under the condition that the target message is identified to contain privacy information; the sending module is used for sending the target message which is processed by the processing module and added with the privacy instruction to the first electronic equipment; the privacy instruction is used for instructing the first electronic device to perform privacy processing on the privacy information when the first electronic device sends the privacy information to other electronic devices.
In a fifth aspect, embodiments of the present application provide an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, implement the steps of the method according to the first aspect.
In a sixth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a seventh aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In the embodiment of the application, after receiving a target message which is sent by a second electronic device and carries a privacy instruction and contains privacy information, a first electronic device executes privacy processing on the target message under the condition that a first input which is used for indicating a first operation and is aimed at the target message by a user is received (the first operation may include any one of copying, forwarding and screen capturing), so as to obtain a processed target message. Then, the electronic equipment responds to the first input, and executes the target operation on the processed target message. Therefore, if the target message has the privacy instruction, before the first electronic device forwards the target message to other electronic devices, if the target message is subjected to target operations such as copying, forwarding or screen capturing on an interface where the target message is located, the first electronic device can automatically perform privacy processing on the privacy information in the target message while the user performs the target operations, so that the user cannot acquire the target message capable of displaying the privacy information in the target operation manner, and further, after the other electronic devices receive the processed target message, the other electronic devices cannot view the privacy information in the target message, thereby avoiding the problem of personal privacy leakage of an original user corresponding to the target message, and further ensuring the personal privacy and personal data safety of the original user corresponding to the target message.
Drawings
Fig. 1 is a schematic structural diagram of an information display system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an information display method according to an embodiment of the present application;
fig. 3 is a schematic view of an interface applied by an information display method according to an embodiment of the present disclosure;
fig. 4 is a second schematic flowchart of an information display method according to an embodiment of the present application;
fig. 5 is a second schematic view of an interface applied by an information display method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an information display device according to an embodiment of the present invention;
fig. 7 is a second schematic structural diagram of an information display device according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present invention;
fig. 9 is a second schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The name "Natural Language Processing (NPL)" appearing in the present application will be described below.
NPL natural language processing is a discipline that studies linguistic problems in human-to-human and human-to-computer interactions, and can be used to develop applications or services that can understand human language. For example, speech recognition, speech translation, understanding complete sentences, understanding synonyms of matches, and generating grammatically correct complete sentences and paragraphs.
The NPL may develop a model representing a language capability (linguistic competence) and a language application (linguistic performance), the electronic device may build a computing framework to implement the language model, and an improvement method is proposed to continuously improve the language model, and the electronic device may design various practical systems according to the language model to provide a result meeting the user's requirements to the user. For example, when the social network site of the electronic device is pushed, after the language input by the user is acquired, the characters input by the user are found to be matched with the characters for english learning, and then advertisements related to english learning are pushed to the user.
The information display method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
The information display method provided by the embodiment of the application can be applied to scenes that a user copies, forwards and captures the information with the privacy information.
Aiming at a scene of copying, forwarding and screenshot carried out by forwarding a message with privacy information by a user, supposing that the user 1 sends a message A with an identity number of the user 1 to the electronic equipment 2 of the user 2 by using an instant chat application in the electronic equipment 1, when the user 3 inquires the identity number of the user 1 from the user 2 by using the instant chat application of the electronic equipment 3, because the instant chat application is very convenient to forward the message, the user 2 can directly forward the message A sent by the user 1 to the electronic equipment 3 of the user 3 through instant chat software of the electronic equipment 2, or send the screenshot of the message A to the electronic equipment 3 of the user 3. Therefore, the leakage of the personal identity information of the user 1 is caused, and the personal privacy security of the user 1 is influenced.
In this embodiment of the application, when the user 1 inputs the message a in an input box of a dialog box between the electronic device 1 and the electronic device 2, the electronic device 1 may recognize privacy information in the message a, that is, an identity card number of the user 1, add a privacy instruction to the message a, and then the electronic device 1 sends the message a carrying the privacy instruction to the electronic device 2, where the instruction may perform privacy processing, such as deletion processing or fuzzy processing, on the identity card number in the message a when the message a is forwarded. After the electronic device 2 receives the message a of the privacy instruction, if the electronic device 2 receives a sending instruction that the user 3 forwards the message a of the privacy instruction to the electronic device 3, the privacy instruction instructs the electronic device 2 to perform privacy processing on the identity card number in the message a, and then the message a subjected to the privacy processing is sent to the electronic device 3. Therefore, the user 3 of the electronic device 3 cannot see the privacy information, namely the identification number, of the user 1, so that the leakage of the personal privacy of the user 1 is avoided, and the personal privacy and the personal data security of the user 1 are protected.
As shown in fig. 1, an information display system provided in an embodiment of the present application includes a first electronic device 201, a second electronic device 202, and a third electronic device 203, where message transmission may be performed among the first electronic device 201, the second electronic device 202, and the third electronic device 203, in an embodiment of the present application, the second electronic device 202 transmits a message to the first electronic device 201, and the first electronic device 201 transmits a message to the third electronic device 203.
The second electronic device 202 generates a target message. The second electronic device 202 adds a privacy instruction to the target message if the target message contains privacy information. The second electronic device 202 transmits the target message to which the above-described privacy instruction is added to the first electronic device 201. The privacy instruction is used for instructing the first electronic device to perform privacy processing on the privacy information when the first electronic device sends the privacy message to other electronic devices.
The first electronic device 201 receives a target message containing privacy information sent by the second electronic device 202, where the target message carries a privacy instruction. The first electronic device 201 executes privacy processing on the privacy information under the condition that a first input aiming at the target message is received, and a processed target message is obtained; wherein the first input is used to indicate a target operation, and the target operation includes any one of: copying, forwarding and screen capturing; in response to the first input, the first electronic device 201 performs the target operation on the processed target message.
In this way, after receiving a target message which is sent by the second electronic device and carries a privacy instruction and contains privacy information, the first electronic device executes privacy processing on the target message under the condition that a first input which is used for indicating a first operation and is aimed at the target message by a user is received (the first operation may include any one of copying, forwarding and screen capturing), so as to obtain a processed target message. Then, the electronic equipment responds to the first input, and executes the target operation on the processed target message. Therefore, if the target message has the privacy instruction, before the first electronic device forwards the target message to other electronic devices, if the target message is subjected to target operations such as copying, forwarding or screen capturing on an interface where the target message is located, the first electronic device can automatically perform privacy processing on the privacy information in the target message while the user performs the target operations, so that the user cannot acquire the target message capable of displaying the privacy information in the target operation manner, and further, after the other electronic devices receive the processed target message, the other electronic devices cannot view the privacy information in the target message, thereby avoiding the problem of personal privacy leakage of an original user corresponding to the target message, and further ensuring the personal privacy and personal data safety of the original user corresponding to the target message.
Optionally, the privacy processing includes any one of: the first electronic device 201 blurs the private information in the target message, the first electronic device 201 deletes the private information, and the first electronic device 201 hides the private information.
In this way, when the second electronic device generates the target message, and the second electronic device identifies that the target message carries the privacy information, adds a privacy instruction which can be used for instructing the first electronic device to perform privacy processing on the privacy information when the first electronic device sends the target message to other electronic devices to the privacy information, and then sends the privacy instruction to the first electronic device. After receiving a target message which is sent by the second electronic device and carries a privacy instruction and contains privacy information, the first electronic device may execute privacy processing on the target message to obtain a processed target message under the condition that a target operation of a user on the target message is received. Therefore, if the target message carries the privacy instruction, when the first electronic device forwards the target message to other electronic devices or sends the screenshot of the target message, the first electronic device sends the target message which is subjected to privacy processing, so that other electronic devices cannot check the privacy information in the target message after receiving the processed target message, the problem that the personal privacy of the original user corresponding to the target message is leaked is avoided, and the personal privacy and personal data safety of the original user corresponding to the target message are further ensured.
Optionally, after the first electronic device 201 performs the privacy processing on the target message, the first electronic device 201 sends a privacy recovery request to the second electronic device 202; the first electronic device 201 receives the confirmation viewing instruction sent by the second electronic device 202; the first electronic device 201 performs information recovery on the privacy information after privacy processing to obtain the privacy information.
In this way, when the user of the first electronic device needs to check the privacy information of the user of the second electronic device again, the privacy restoration request can be sent to the second electronic device to apply for checking the privacy information again. Therefore, the privacy safety of the user of the second electronic device is ensured, the open permission is reserved for the user of the first electronic device to check the privacy information, the user of the second electronic device is not required to edit the privacy information again, the operation steps are saved for the user of the second electronic device, and the efficiency of using the electronic device is improved.
Optionally, after the first electronic device 201 performs the privacy processing on the target message, the first electronic device 201 sends a privacy recovery request to the second electronic device 202; the first electronic device 201, upon receiving the privacy recovery response sent by the second electronic device 202 and when the user input password is the same as the preset recovery password corresponding to the privacy information, performs information recovery on the privacy information after privacy processing to obtain the privacy information.
Therefore, after the user of the first electronic device receives the privacy recovery response, the user can recover the privacy information only by inputting the preset recovery password. Therefore, the privacy safety of the user of the second electronic device is further ensured, meanwhile, the open permission is reserved for the user of the first electronic device to check the privacy information, the user of the second electronic device is not required to edit the privacy information again, the operation steps are saved for the user of the second electronic device, and the efficiency of using the electronic device is improved.
Optionally, after the first electronic device 201 receives a target message sent by a second electronic device, the first electronic device 201 sends an authorization release request to the second electronic device when the target message carries a privacy instruction; the first electronic device 201 receives the confirmation permission release instruction sent by the second electronic device, and deletes the privacy instruction.
Therefore, when the user of the first electronic device really needs to enable the user of the third electronic device to check the target information, the user of the second electronic device can be requested to check the permission, so that the user of the first electronic device is not required to input text information or voice information to repeatedly inquire, the user of the second electronic device is not required to repeatedly send privacy information, the operation steps of the user of the second electronic device are saved, and the efficiency of the user in using the electronic device is improved.
Optionally, the privacy instruction further includes: the second electronic device 202 sets a display instruction of a first predetermined time period of the private information for the target message.
Optionally, after the second electronic device 202 sends the target message added with the privacy instruction to the first electronic device 201, the second electronic device 202 receives a privacy recovery request sent by the first electronic device; the second electronic device 202 sends a confirmation viewing instruction to the first electronic device 201, where the confirmation viewing instruction is used to instruct the privacy information to resume displaying within a second predetermined time period.
Therefore, when the user of the second electronic device allows the user of the first electronic device to check the target message subjected to the privacy processing again, the user of the second electronic device does not need to send the privacy information to the user of the second electronic device again, and the user of the first electronic device can check the privacy information again by sending the checking confirmation instruction, so that the operation steps of the second electronic device are saved, and the efficiency of using the electronic device is improved.
The present embodiment provides an information display method, as shown in fig. 2, which is applied to a first electronic device, and includes the following steps 301 to 303:
step 301: the first electronic equipment receives a target message containing privacy information sent by the second electronic equipment.
In this embodiment of the application, the first electronic device and the second electronic device may be different electronic devices or may be the same electronic device.
In the embodiment of the present application, the target message carries a privacy instruction.
Illustratively, the privacy instruction may be an instruction executable by any electronic device.
In this embodiment of the application, the privacy instruction may be used to instruct the first electronic device to perform privacy processing on the privacy information when the first electronic device sends the privacy information to another electronic device.
For example, the second electronic device may send the privacy information for a predetermined number of times by presetting the privacy instruction, and when the cumulative number of times of sending the privacy information exceeds the predetermined number of times of sending, may trigger the first electronic device to perform privacy processing on the privacy information. For example, the privacy directive indicates: when the preset number of times of sending the privacy information is 1, the second electronic device sends the target information containing the privacy information to the first electronic device, the privacy information is sent for 1 time, when the first electronic device sends the privacy information to other electronic devices, the accumulated number of times of sending the privacy information is 2, and when the number of times of sending the privacy information exceeds 1 time, the privacy instruction can trigger the first electronic device to carry out privacy processing on the privacy information.
In this embodiment of the application, the target message may be text information, picture information, or multimedia information, such as video information.
Step 302: and the first electronic equipment executes privacy processing on the privacy information under the condition of receiving a first input aiming at the target message to obtain a processed target message.
In an embodiment of the present application, the first input is used to indicate a target operation, and the target operation includes any one of: copy, forward, and screen capture.
In this embodiment of the application, the first input may be a touch input, a voice input, or an input of a special gesture, which is not limited in this embodiment of the application.
Optionally, in an embodiment of the present application, the privacy processing includes any one of: and blurring the privacy information in the target message, deleting the privacy information, and hiding the privacy information.
In the embodiment of the present application, when the privacy processing is performed in a manner of blurring the privacy information, a mosaic may be added to the privacy information. For example, when the first electronic device performs a targeting operation on the target message, a mosaic may be added to the private information in the target message, so that the private information in the target message cannot be seen by users of other electronic devices except the user of the first electronic device and the user of the second electronic device.
In this embodiment of the present application, the deleting the privacy information may be: and deleting the data corresponding to the privacy information from the data corresponding to the target message to further obtain a processed target message, wherein the processed target message does not contain the privacy information. Since the target message does not contain the private information, if the user of the first electronic device forwards the processed target information to the other electronic device, the user of the other electronic device cannot view the private information in the target information.
In this embodiment of the application, the hiding the privacy information may be: the first electronic equipment changes the data corresponding to the privacy information into hidden data and does not display the hidden data. Although the data corresponding to the target message still includes the data corresponding to the private information, since the corresponding display mode of the private information is a hidden mode, if the user of the first electronic device forwards the processed target information to the other electronic device, the user of the other electronic device cannot view the private information in the target information after the other electronic device receives the target information.
In the embodiment of the application, when the first electronic device performs privacy processing on the privacy information displayed in the target interface, the interior of the first electronic device can complete the privacy processing by destroying the data information corresponding to the privacy information, that is, the data corresponding to the privacy information is completely destroyed; the privacy processing may also be accomplished by changing the manner in which the private information is displayed. The privacy processing mode may be pre-stored in the privacy instruction.
In an example, when the first electronic device blurs the privacy information in the target message for privacy processing, after data information corresponding to the privacy information in the first electronic device is destroyed, a mosaic is added to a corresponding position of original privacy information in the target message for privacy processing; and mosaic can be directly added at the corresponding position of the original privacy information in the target information for privacy processing.
In an example, when the first electronic device hides the privacy information in the target message for privacy processing, data information corresponding to the privacy information in the first electronic device may be destroyed in advance, and target information that does not display the privacy information any more is formed for privacy processing; or directly forming target information which does not display privacy information any more to finish privacy processing.
In an example, when the first electronic device deletes the private information in the target message for privacy processing, the data information corresponding to the private information may be completely destroyed (for example, the data information is crushed), or the data information in the private information may be deleted, but the data information corresponding to the private information still remains in the first electronic device.
Therefore, the user can select the privacy processing mode meeting the self requirement from different privacy processing modes to finish the privacy processing of the privacy information, diversified privacy processing modes are provided for the user, and the user can effectively use the privacy processing function of the privacy information in the electronic equipment.
In this embodiment of the application, the processed target message and the processed target message may be target messages in different forms, or may be target messages in the same form. For example, if the target message is text information, when the first input is that the user of the first electronic device forwards the target message to users of other electronic devices, the text information may be directly forwarded, and then the first electronic device performs privacy processing on privacy information in the text information and then performs the forwarding operation; the current display interface displaying the text information may also be subjected to screenshot, so as to generate the picture information including the privacy information, and then the first electronic device may also process the privacy information in the picture information and then perform the forwarding operation.
Step 303: and responding to the first input, and executing the target operation on the processed target message by the first electronic equipment.
Example 1: assume that the user of the first electronic device wants to forward (i.e., the above-mentioned target operation) a message a (target message) with the identification card information (i.e., the above-mentioned privacy information) of the user of the second electronic device to the third electronic device through the instant chat application. As shown in fig. 3 (a), the first electronic device receives a message a (31 in fig. 3) containing identification card information sent by the second electronic device. The message a is text information, and meanwhile, the information a carries a privacy instruction for controlling a user of the first electronic device to forward the identity card information, and the privacy instruction can perform fuzzy processing (namely, the privacy processing) on the privacy information when the first electronic device sends the privacy information to other electronic devices.
When a user of the first electronic device presses the message a for a long time and touches a forwarding control in the first electronic device to forward the message a (i.e., the first input), the cumulative number of times that the first electronic device acquires that the identity card information in the message a is sent is 2 times, and is greater than the preset cumulative number of times that the message a is sent by 1 time, the privacy instruction is triggered to start. The privacy instruction controls the first electronic device to perform obfuscation on the identification card information, as shown in (b) in fig. 3, to obtain a processed message a, where the identification card information in the message a is added with a mosaic. At this time, the first electronic device forwards the processed message a to the third electronic device.
In the information display method provided by the embodiment of the application, after receiving a target message which is sent by a second electronic device and carries a privacy instruction and contains privacy information, a first electronic device executes privacy processing on the target message under the condition that a first input which is used for indicating a first operation and is aimed at the target message by a user is received (the first operation may include any one of copying, forwarding and screen capturing), so that the processed target message is obtained. Then, the electronic equipment responds to the first input, and executes the target operation on the processed target message. Therefore, if the target message has the privacy instruction, before the first electronic device forwards the target message to other electronic devices, if the target message is subjected to target operations such as copying, forwarding or screen capturing on an interface where the target message is located, the first electronic device can automatically perform privacy processing on the privacy information in the target message while the user performs the target operations, so that the user cannot acquire the target message capable of displaying the privacy information in the target operation manner, and further, after the other electronic devices receive the processed target message, the other electronic devices cannot view the privacy information in the target message, thereby avoiding the problem of personal privacy leakage of an original user corresponding to the target message, and further ensuring the personal privacy and personal data safety of the original user corresponding to the target message.
Optionally, in this embodiment of the present application, after the step 301, the information display method provided in this embodiment of the present application further includes the following steps 304 to 306:
step 304: the first electronic device displays the target message on the target interface.
Step 305: and after the display duration of the target message reaches a first preset duration, the first electronic equipment executes the privacy processing on the privacy information under the condition that the first message carries a privacy instruction, so as to obtain a processed target message.
Step 306: and the first electronic equipment displays the processed target message on the target interface.
For example, the target interface may be an interface used by the first electronic device to display a target message after the first electronic device receives the target message sent by the second electronic device. For example, after the second electronic device sends the target message to the first electronic device through the instant chat application, the target interface is an interface for displaying the target message in the instant chat application of the first electronic device.
For example, the first predetermined time period may be preset by the second electronic device, or may be set by a user in a self-defined manner.
For example, the first predetermined time period may be used to limit the display time period of the private information in the target message on the target interface.
In one example, the first predetermined time period may be stored in the target message, and the first electronic device starts to count at the time when the target message is displayed on the target interface until the first predetermined time period is reached, so as to perform privacy processing on the privacy information in the target message.
For example, the privacy processing may refer to the foregoing description, and is not described herein again.
In one example, when the first preset time length is reached, the first electronic device displays a target message with the privacy information being processed in a fuzzy mode, or a target message with the privacy information being deleted, or a target message with the privacy information being hidden on the target interface.
Example 2: with reference to example 1, after receiving a message a including identification card information forwarded by a second electronic device, the first electronic device includes a privacy instruction and a predetermined time 1 (i.e., the first predetermined time) that can be displayed. When a user enters a dialog interface (namely the target interface) corresponding to the message A and starts to display the message A on the dialog interface, and when the display duration reaches a preset duration 1, the first electronic device performs fuzzy processing (namely the privacy processing) on the identity card information. And displaying the message A after the fuzzy processing is carried out on the conversation interface.
Therefore, when the user of the second electronic device needs to send own privacy information to the user of the first electronic device, if the user of the first electronic device does not want to be able to check the own privacy information all the time, the user can trigger the first electronic device to perform privacy processing on the privacy information when the display duration reaches through specifying the display duration of the privacy information in the user electronic device of the first electronic device, so that the user can be ensured not to check the own information for a long time by other users, the privacy safety of the user is guaranteed, and the privacy information is prevented from being leaked.
Optionally, in this embodiment of the application, after the performing the privacy processing on the target message in the step 302, the information display method provided in this embodiment of the application further includes the following steps 307 to 309:
step 307: and the first electronic equipment sends a privacy recovery request to the second electronic equipment.
Step 308: and the first electronic equipment receives the checking confirmation instruction sent by the second electronic equipment.
Step 309: and the first electronic equipment recovers the privacy information after privacy processing to obtain the privacy information.
Illustratively, the privacy restoration request may be used to: after the first electronic device carries out privacy processing on the privacy information, the privacy information which is processed in the first electronic device is recovered, and the privacy information is displayed in the second electronic device again.
For example, the user may send the privacy restoration request to the second electronic device by performing the first input on the target message. The first input may be a touch input, a voice input, or an input of a specific gesture, which is not limited in the embodiments of the present application.
In one example, the user may trigger the first electronic device to display an instruction menu in an area other than the target message by long-pressing the target message, and then the user performs a selection on the privacy restoration request in the instruction menu, and the first electronic device transmits the privacy restoration request to the second electronic device in response to a selection input by the user.
Illustratively, the confirmation viewing instruction is used for instructing the private information to resume displaying within a second predetermined time.
In an example, before the first electronic device sends the privacy recovery request to the second electronic device, if the data information corresponding to the privacy information has been completely destroyed in the first electronic device, the first electronic device may receive the data information corresponding to the privacy information sent by the second electronic device while receiving the confirmation view instruction sent by the second electronic device, and the first electronic device may recover the first privacy information according to the data information corresponding to the privacy information.
For example, after the first electronic device performs privacy restoration on the privacy-processed privacy information to obtain the privacy information, the user of the first electronic device may view the privacy information in different ways according to the difference of information included in the privacy restoration request.
In an example, if the privacy restoration request does not include the information about the limited duration, the first electronic device restores the privacy-processed privacy information, after the privacy information is obtained, the user of the first electronic device may view the privacy information all the time, and the privacy information in the first electronic device is kept in a state that is not processed by privacy all the time after the privacy information is restored.
In another example, if the privacy restoration request includes information about a time limit, the first electronic device may restore the privacy-processed privacy information within a second predetermined time period to obtain the privacy information.
Further, the first electronic device may perform information recovery on the privacy information after the privacy processing within a second predetermined time period, so as to obtain the privacy information. The second preset time length may be preset by the second electronic device or may be set by a user in a self-defined manner.
Further, the second preset time period may be stored in the confirmation viewing instruction, and the timing is started at the time when the first electronic device resumes displaying the private information until the second preset time period is reached, and the privacy processing is performed on the private information again.
Example 3: with reference to example 2, when the message a in the first electronic device arrives within the predetermined time period 1, and after the message a is processed by privacy, if the user of the first electronic device needs to view the message a, the first electronic device may send a privacy recovery request to the second electronic device. After receiving the confirmation viewing instruction sent by the second electronic device, the first electronic device displays the identity card information again within the preset time length 2 in the dialogue interface, and after the identity card information is displayed for the preset time length 2 in the dialogue interface, performs fuzzy processing on the identity card information again.
In this way, when the user of the first electronic device needs to check the privacy information of the user of the second electronic device again, the privacy restoration request can be sent to the second electronic device to apply for checking the privacy information again. Therefore, the privacy safety of the user of the second electronic device is ensured, the open permission is reserved for the user of the first electronic device to check the privacy information, the user of the second electronic device is not required to edit the privacy information again, the operation steps are saved for the user of the second electronic device, and the efficiency of using the electronic device is improved.
Optionally, in this embodiment of the present application, after the performing the privacy processing on the target message in step 302, the information display method provided in this embodiment of the present application further includes the following steps 310 to 311:
step 310: and the first electronic equipment sends a privacy recovery request to the second electronic equipment.
Step 311: and the first electronic equipment recovers the privacy processed privacy information to obtain the privacy information under the condition that the privacy recovery response sent by the second electronic equipment is received and the password input by the user is the same as the preset recovery password corresponding to the privacy information.
For example, the description of the privacy restoration request may refer to the foregoing description, and is not repeated here.
For example, the preset recovery password may be used to view the private information.
For example, after the first electronic device receives the privacy recovery request, it is required to input password information that is the same as the preset recovery password, and then the information of the privacy information after privacy processing can be recovered to obtain the privacy information.
In one example, the preset recovery password is preset by the second electronic device, and in another example, the preset recovery password may be a password that is set by a user of the second electronic device in a customized manner and can be replaced at any time.
Therefore, after the user of the first electronic device receives the privacy recovery response, the user can recover the privacy information only by inputting the preset recovery password. Therefore, the privacy safety of the user of the second electronic device is further ensured, meanwhile, the open permission is reserved for the user of the first electronic device to check the privacy information, the user of the second electronic device is not required to edit the privacy information again, the operation steps are saved for the user of the second electronic device, and the efficiency of using the electronic device is improved.
Optionally, in this embodiment of the present application, after step 301, the information display method provided in this embodiment of the present application further includes the following steps 312 to 313:
step 312: and the first electronic equipment sends an authority release request to the second electronic equipment under the condition that the target message carries a privacy instruction.
Step 313: and the first electronic equipment receives the confirmation permission release instruction sent by the second electronic equipment and deletes the privacy instruction.
Illustratively, the permission release request may be used to: and requesting to delete the privacy instruction in the target message.
For example, the user may send the permission release request to the second electronic device by performing a second input on the target message. The second input may refer to the first input, and is not described herein again.
In one example, the user may trigger the first electronic device to display an instruction menu in an area other than the target message by long-pressing the target message, and then, the user performs a selection input on the permission release request in the instruction menu, and the first electronic device transmits the permission release request to the second electronic device in response to the selection input of the user.
For example, the above-mentioned validation authority release instruction may be used to: and confirming to delete the privacy instruction in the target message of the first electronic equipment.
For example, after the first electronic device deletes the privacy instruction, when the first electronic device performs a target operation on the target information containing the privacy information, the first electronic device will not perform privacy processing on the privacy information in the target information.
Example 4: with reference to example 1, after receiving the message a carrying the privacy instruction, if the user of the first electronic device needs to send the message a to the third electronic device, the first electronic device may send an authorization release request to the second electronic device, after receiving the authorization release instruction sent by the second electronic device, the first electronic device may send the complete and unprocessed message a to the third electronic device, and in the third electronic device, the privacy information in the message a may be displayed in the display interface.
Therefore, when the user of the first electronic device really needs to enable the user of the third electronic device to check the target information, the user of the second electronic device can be requested to check the permission, so that the user of the first electronic device is not required to input text information or voice information to repeatedly inquire, the user of the second electronic device is not required to repeatedly send privacy information, the operation steps of the user of the second electronic device are saved, and the efficiency of the user in using the electronic device is improved.
The present embodiment further provides another information display method, as shown in fig. 4, where the present embodiment is applied to a second electronic device, and the information display method includes the following steps 401 and 403:
step 401: the second electronic device generates a target message.
In the embodiment of the present application, the target message may refer to the description of the target message, which is not described herein again.
In this embodiment, the target message may be a message input by the user in the second electronic device.
In one example, the target message may be a message input by a user in an input box of the electronic device. For example, the text information input by the user in the input box of the chat application, or the picture information input by the user in the input box, or the video information input by the user in the input box.
In the embodiment of the application, the second electronic device may determine that the second electronic device generates the target message by determining that the application having the function of performing message interaction with the other electronic device starts the function of inputting the message.
Step 402: and the second electronic equipment adds a privacy instruction to the target message under the condition that the target message contains privacy information.
In the embodiment of the application, the privacy instruction is used for instructing the first electronic device to perform privacy processing on the privacy information when receiving a first input aiming at the target message; wherein the first input is used to indicate a target operation, and the target operation includes any one of: copy, forward, and screen capture.
In this embodiment of the application, the private information may be automatically identified by the second electronic device, or may be indicated by a user through customization.
In the embodiment of the present application, the first input may refer to the foregoing description, and is not described herein again.
In the embodiment of the present application, the privacy processing may refer to the foregoing description, and is not described herein again.
In this embodiment of the application, the private information identified by the second electronic device may be identified by itself, or may be identified after being manually marked by a user.
In one example, the second electronic device may identify private information in the target application using an application with NPL functionality. Generally, an application with an NPL function carries a word stock, words related to privacy information, such as an identity card number, a telephone number, address information, and the like, may be pre-stored in the word stock, and when a sensitive word matching the pre-stored word related to the privacy information is retrieved from a target message by the application with the NPL function, the sensitive word may be identified as the privacy information.
In another example, the user may add a privacy flag to the private information in the target message by himself after generating the target message, so that the second electronic device identifies the private information marked by the privacy flag. For example, when the target message contains the privacy information, the user may select the privacy information in an input box of the electronic device and press a selection area of the privacy information for a long time, and then a privacy marking control may pop up in the second electronic device, and at this time, the user clicks the privacy marking control to add the privacy marking to the privacy information for the second electronic device to recognize.
Optionally, in this embodiment of the application, the privacy instruction further includes: and setting a first preset time length of display instructions of the privacy information for the target message.
For example, the first predetermined time period may refer to the foregoing description, and is not described herein again.
Step 403: and the second electronic equipment sends the target message added with the privacy instruction to the first electronic equipment.
Example 5: assume that the user of the second electronic device needs to send a message a containing identification card information (i.e., the above-mentioned privacy information) to the first electronic device, while the user does not want the other party to see the identification card information. As shown in fig. 5, after the user inputs a message a in the input box of the chat application of the second electronic device, the user may click the add-privacy-label control to select the id card information in the message a, and add a privacy label to the id card information in the message a. After the second electronic device recognizes the privacy mark, confirming that the position of the privacy mark is the privacy information, and adding a privacy instruction for controlling the display duration 1 of the privacy information in the first electronic device and performing fuzzy processing on the identity card information in the message A when the first electronic device sends the target message again to the target message. And finally, sending the target message after the privacy adding instruction to the first electronic equipment.
In the information display method provided by the application, after the second electronic device generates the target message, if the second electronic device recognizes that the target message contains the privacy information, when the second electronic device instructs the first electronic device to transmit the privacy information to the other electronic device, the second electronic device performs privacy processing on the privacy information by using the target message, and transmits the target message added with the privacy instruction to the first electronic device. Therefore, when the user of the second electronic device does not want other users except the user of the first electronic device to view the privacy information in the target message, the privacy instruction can be added to the target message, so that when the first electronic device sends the target message to other electronic devices, the privacy information in the target message is subjected to privacy processing, the problem that the personal privacy of the user of the second electronic device is leaked is avoided, and the personal privacy safety of the user of the second electronic device is improved.
Optionally, in this embodiment, after the step 403, the information display method provided in this embodiment further includes the following steps 404 and 405:
step 404: and the second electronic equipment receives the privacy recovery request sent by the first electronic equipment.
Step 405: and the second electronic equipment sends a confirmation viewing instruction to the first electronic equipment, wherein the confirmation viewing instruction is used for indicating the privacy information to be restored and displayed.
For example, the privacy restoration request may refer to the foregoing description, and is not described herein again.
For example, the confirmation view instruction may refer to the foregoing description and will not be described herein.
For example, after the second electronic device receives the privacy recovery request sent by the first electronic device, a window for inquiring whether the user of the first electronic device is allowed to view the privacy information in the target message may be displayed in the second electronic device, and the user may send a confirmation view instruction to the first electronic device by selecting a confirmation view instruction control in the window.
Therefore, when the user of the second electronic device allows the user of the first electronic device to check the target message subjected to the privacy processing again, the user of the second electronic device does not need to send the privacy information to the user of the second electronic device again, and the user of the first electronic device can check the privacy information again by sending the checking confirmation instruction, so that the operation steps of the second electronic device are saved, and the efficiency of using the electronic device is improved.
Optionally, in this embodiment of the application, the sending of the confirmation view instruction to the first electronic device in step 405 may include the following step 406:
step 406: and the second electronic equipment sends a preset recovery password to the first electronic equipment.
For example, the preset recovery password may refer to the foregoing description, and is not described herein again.
Optionally, in this embodiment of the application, the sending of the confirmation view instruction to the first electronic device in step 405 may include the following step 407:
step 407: and the second electronic equipment changes the preset recovery password of the privacy information.
Illustratively, the user of the second electronic device has the right to change the preset recovery password of the private information at any time.
In one example, if the user of the first electronic device can recover the privacy information within a predetermined time period, by receiving a privacy recovery response and inputting a first preset recovery password. If the user of the second electronic device changes the first preset recovery password into the second preset recovery password within the preset time, the user of the first electronic device cannot recover the private information again by using the first preset password after the preset time is over.
So, through resetting the authority of predetermineeing the recovery password at any time for second electronic equipment distribution change, the user of second electronic equipment can be more convenient for privacy information encryption, guarantees privacy information's security, when the user does not need the user of first electronic equipment to look over this privacy information, if privacy information includes and predetermines to show for long time, then the user of second electronic equipment can improve privacy information's security through the change password.
In the information display method provided in the embodiment of the present application, the execution main body may be an information display device, or a control module in the information display device for executing the information display method. In the embodiment of the present application, an information display device executing an information display method is taken as an example, and the information display device provided in the embodiment of the present application is described.
Fig. 6 is a schematic structural diagram of a possible information display device according to an embodiment of the present disclosure. As shown in fig. 6, the information display apparatus 600 includes: the device comprises a receiving module 601, a processing module 602 and an executing module 603; the receiving module 601 is configured to receive a target message sent by a second electronic device, where the target message carries a privacy instruction; the processing module 602 is configured to, when receiving the first input for the target message received by the receiving module, perform privacy processing on the privacy information to obtain a processed target message; wherein the first input is used to indicate a target operation, and the target operation includes any one of: copying, forwarding and screen capturing; the executing module 603 is configured to execute the target operation on the processed target message processed by the processing module.
Optionally, in an embodiment of the present application, the privacy processing includes any one of: and blurring the privacy information in the target message, deleting the privacy information, and hiding the privacy information.
Optionally, in this embodiment of the application, the apparatus 600 further includes a sending module 604; the sending module 604 is further configured to send a privacy recovery request to the second electronic device; the receiving module 601 is further configured to receive a confirmation viewing instruction sent by the second electronic device; the processing module 602 is further configured to perform information recovery on the privacy information after privacy processing, so as to obtain the privacy information.
Optionally, in this embodiment of the application, the sending module is configured to send a privacy recovery request to the second electronic device; the processing module is configured to, when receiving a privacy recovery response sent by the second electronic device and when a user input password is the same as a preset recovery password corresponding to the privacy information, perform information recovery on the privacy information after privacy processing to obtain the privacy information.
Optionally, in this embodiment of the present application, the apparatus further includes a deleting module 605; the sending module 604 is further configured to send an authorization release request to the second electronic device when the target message carries a privacy instruction; the deleting module 605 is configured to receive a permission release instruction sent by the second electronic device, and delete the privacy instruction.
It should be noted that, as shown in fig. 6, modules that are necessarily included in the information display apparatus 600 are indicated by solid line boxes, such as a receiving module 601; modules that may be included in the information display apparatus 600 are illustrated with dashed boxes, such as the transmit module 604.
Fig. 7 is a schematic diagram of a possible structure of an information display device according to an embodiment of the present application, and as shown in fig. 7, an information display device 700 includes: a generating module 701, a processing module 702 and a sending module 703; the generating module 701 is configured to generate a target message; the processing module 702 is configured to add a privacy instruction to the target message generated by the generating module 701 when it is recognized that the target message includes privacy information; the sending module 703 is configured to send, to the first electronic device, the target message, which is processed by the processing module 702 and to which the privacy instruction is added; the privacy instruction is used for instructing the first electronic equipment to perform privacy processing on the privacy information when receiving a first input aiming at the target message; wherein the first input is used to indicate a target operation, and the target operation includes any one of: copy, forward, and screen capture.
In the information display device provided by the application, after the second electronic device generates the target message, if the second electronic device recognizes that the target message contains the privacy information, when the second electronic device instructs the first electronic device to transmit the privacy information to the other electronic device, the second electronic device performs privacy processing on the privacy information and transmits the target message added with the privacy instruction to the first electronic device. Therefore, when the user of the second electronic device does not want other users except the user of the first electronic device to view the privacy information in the target message, the privacy instruction can be added to the target message, so that when the first electronic device sends the target message to other electronic devices, the privacy information in the target message is subjected to privacy processing, the problem that the personal privacy of the user of the second electronic device is leaked is avoided, and the personal privacy safety of the user of the second electronic device is improved.
Optionally, in this embodiment of the application, the privacy instruction further includes: and setting a first preset time length of display instructions of the privacy information for the target message.
Optionally, in this embodiment of the present application, the apparatus 700 further includes: a receiving module 704; the receiving module 704 is configured to receive a privacy recovery request sent by the first electronic device; the sending module 703 is further configured to send a confirmation viewing instruction to the first electronic device, where the confirmation viewing instruction is used to instruct the privacy information to resume to be displayed within a second predetermined time.
As shown in fig. 7, the modules included in the information display device 700 are illustrated by solid line boxes, such as a generating module 701; modules that may be included in the information display apparatus 700 are illustrated with dashed boxes, such as the receiving module 704.
The information display device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The information display device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The information display device provided in the embodiment of the present application can implement each process implemented by the method embodiments of fig. 2 to fig. 5, and is not described here again to avoid repetition.
Optionally, as shown in fig. 8, an electronic device 800 is further provided in this embodiment of the present application, and includes a processor 801, a memory 802, and a program or an instruction stored in the memory 802 and executable on the processor 801, where the program or the instruction is executed by the processor 801 to implement each process of the information display method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic devices and the non-mobile electronic devices described above.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 100 includes, but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, and a processor 110. Wherein the user input unit 107 includes: touch panel 1071 and other input devices 1072, display unit 106 including display panel 1061, input unit 104 including image processor 1041 and microphone 1042, memory 109 may be used to store software programs (e.g., an operating system, application programs needed for at least one function), and various data.
Those skilled in the art will appreciate that the electronic device 100 may further comprise a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
When the electronic device 100 is a first electronic device, the user input unit 107 is configured to receive a target message sent by a second electronic device, where the target message carries a privacy instruction; a processor 110, configured to, in a case where the user input unit 107 receives a first input for the target message, perform privacy processing on the privacy information to obtain a processed target message; wherein the first input is used to indicate a target operation, and the target operation includes any one of: copying, forwarding and screen capturing; a processor 110, configured to execute the target operation on the processed target message in response to the first input received by the user input unit 107.
Optionally, the radio frequency unit 101 is further configured to send a privacy recovery request to the second electronic device; the user input unit 107 is further configured to receive a confirmation viewing instruction sent by the second electronic device; the processor 110 is further configured to perform information recovery on the privacy information after the privacy processing, so as to obtain the privacy information.
Optionally, the radio frequency unit 101 is configured to send a privacy recovery request to the second electronic device; the processor 110 is further configured to, when receiving the privacy restoration response sent by the second electronic device and when the user input password is the same as the preset restoration password corresponding to the privacy information, perform information restoration on the privacy information after the privacy processing to obtain the privacy information.
Optionally, the radio frequency unit 101 is further configured to send an authorization release request to the second electronic device under the condition that the target message carries a privacy instruction; the processor 110 is further configured to receive a permission release instruction sent by the second electronic device, and delete the privacy instruction.
Wherein, when the electronic device 100 is a second electronic device, the processor 110 is configured to generate a target message; the processor 110 is further configured to add a privacy instruction to the target message generated by the processor if the target message contains privacy information; a radio frequency unit 101, configured to send a target message to which the privacy instruction processed by the processor 110 is added to the first electronic device; the privacy instruction is used for instructing the first electronic equipment to perform privacy processing on the privacy information when receiving a first input aiming at the target message; wherein the first input is used to indicate a target operation, and the target operation includes any one of: copy, forward, and screen capture.
Optionally, the user input unit 107 is configured to receive a privacy recovery request sent by the first electronic device; the radio frequency unit 101 is further configured to send a confirmation viewing instruction to the first electronic device, where the confirmation viewing instruction is used to instruct the privacy information to resume displaying.
It should be understood that, in the embodiment of the present application, the input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics Processing Unit 1041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 107 includes a touch panel 1071 and other input devices 1072. The touch panel 1071 is also referred to as a touch screen. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 109 may be used to store software programs as well as various data including, but not limited to, application programs and an operating system. The processor 110 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned information display method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the above information display method embodiment, and can achieve the same technical effect, and the details are not repeated here to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (18)

1. An information display method is applied to a first electronic device and is characterized in that,
receiving a target message which is sent by second electronic equipment and contains privacy information, wherein the target message carries a privacy instruction;
under the condition that a first input aiming at the target message is received, carrying out privacy processing on the privacy information to obtain a processed target message; wherein the first input is used for indicating a target operation, and the target operation comprises any one of the following items: copying, forwarding and screen capturing;
in response to the first input, performing the target operation on the processed target message.
2. The method of claim 1, wherein the privacy processing comprises any one of: and blurring the privacy information in the target message, deleting the privacy information, and hiding the privacy information.
3. The method of claim 1, wherein after the performing the privacy processing on the private information, the method further comprises:
sending a privacy restoration request to the second electronic device;
receiving a confirmation checking instruction sent by the second electronic equipment;
and recovering the privacy information after privacy processing to obtain the privacy information.
4. The method according to claim 1, wherein after the performing the privacy processing on the privacy information, the method comprises:
sending a privacy restoration request to the second electronic device;
and under the condition that a privacy recovery response sent by the second electronic equipment is received and a user input password is the same as a preset recovery password corresponding to the privacy information, performing information recovery on the privacy information after privacy processing to obtain the privacy information.
5. The method of claim 1, wherein after receiving the target message sent by the second electronic device, the method further comprises:
sending an authority release request to the second electronic equipment under the condition that the target message carries a privacy instruction;
and receiving a permission releasing confirmation instruction sent by the second electronic equipment, and deleting the privacy instruction.
6. An information display method is applied to a second electronic device and is characterized in that,
generating a target message;
adding a privacy instruction to the target message under the condition that the target message contains privacy information;
sending a target message added with the privacy instruction to the first electronic equipment;
the privacy instruction is used for instructing the first electronic equipment to carry out privacy processing on the privacy information when receiving first input aiming at the target message; wherein the first input is used for indicating a target operation, and the target operation comprises any one of the following items: copy, forward, and screen capture.
7. The method of claim 6, wherein the privacy instructions further comprise: and setting a first preset time length of display instructions of the privacy information for the target message.
8. The method according to claim 6, wherein after sending the target message added with the privacy instruction to the first electronic device, the method further comprises:
receiving a privacy recovery request sent by the first electronic equipment;
and sending a confirmation viewing instruction to the first electronic equipment, wherein the confirmation viewing instruction is used for indicating the privacy information to be restored to display.
9. The information display device is characterized by comprising a receiving module, a processing module and an execution module;
the receiving module is used for receiving a target message which is sent by second electronic equipment and contains privacy information, and the target message carries a privacy instruction;
the processing module is used for executing privacy processing on the privacy information under the condition that the first input aiming at the target message received by the receiving module is received, so as to obtain a processed target message; wherein the first input is used for indicating a target operation, and the target operation comprises any one of the following items: copying, forwarding and screen capturing;
the execution module is configured to execute the target operation on the processed target message processed by the processing module.
10. The apparatus of claim 9, wherein the privacy process comprises any one of: and blurring the privacy information in the target message, deleting the privacy information, and hiding the privacy information.
11. The apparatus of claim 9, wherein said apparatus further comprises: a sending module;
the sending module is further configured to send a privacy restoration request to the second electronic device;
the receiving module is further configured to receive a confirmation viewing instruction sent by the second electronic device;
the processing module is further configured to perform information recovery on the privacy information after privacy processing to obtain the privacy information.
12. The apparatus of claim 9,
the sending module is used for sending a privacy recovery request to the second electronic equipment;
and the processing module is used for recovering the privacy information after privacy processing to obtain the privacy information under the condition that the privacy recovery response sent by the second electronic equipment is received and the password input by the user is the same as the preset recovery password corresponding to the privacy information.
13. The apparatus of claim 9, further comprising a deletion module;
the sending module is further configured to send an authorization release request to the second electronic device under the condition that the target message carries a privacy instruction;
the deleting module is further configured to receive a permission release confirmation instruction sent by the second electronic device, and delete the privacy instruction.
14. An information display apparatus, characterized in that the apparatus comprises: the device comprises a generating module, a processing module and a sending module;
the generating module is used for generating a target message;
the processing module is used for adding a privacy instruction to the target message generated by the generating module under the condition that the target message contains privacy information;
the sending module is used for sending the target message which is processed by the processing module and added with the privacy instruction to first electronic equipment;
the privacy instruction is used for instructing the first electronic equipment to carry out privacy processing on the privacy information when receiving first input aiming at the target message; wherein the first input is used for indicating a target operation, and the target operation comprises any one of the following items: copy, forward, and screen capture.
15. The apparatus of claim 14, wherein the privacy instructions further comprise: and setting a first preset time length of display instructions of the privacy information for the target message.
16. The apparatus of claim 14, further comprising: a receiving module;
the receiving module is used for receiving a privacy recovery request sent by the first electronic device;
the sending module is further configured to send a confirmation viewing instruction to the first electronic device, where the confirmation viewing instruction is used to instruct the privacy information to resume to be displayed within a second predetermined time.
17. An electronic device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the information display method according to any one of claims 1 to 5 or any one of claims 6 to 8.
18. A readable storage medium, characterized in that a program or instructions are stored thereon, which program or instructions, when executed by a processor, implement the steps of the information display method according to any one of claims 1 to 5 or any one of claims 6 to 8.
CN202010897876.6A 2020-08-31 2020-08-31 Information display method and device and electronic equipment Pending CN112035878A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010897876.6A CN112035878A (en) 2020-08-31 2020-08-31 Information display method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010897876.6A CN112035878A (en) 2020-08-31 2020-08-31 Information display method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN112035878A true CN112035878A (en) 2020-12-04

Family

ID=73587241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010897876.6A Pending CN112035878A (en) 2020-08-31 2020-08-31 Information display method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112035878A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112578965A (en) * 2020-12-25 2021-03-30 维沃移动通信有限公司 Processing method and device and electronic equipment
CN113079086A (en) * 2021-04-07 2021-07-06 维沃移动通信有限公司 Message transmitting method, message transmitting device, electronic device, and storage medium
WO2022242376A1 (en) * 2021-05-19 2022-11-24 腾讯科技(深圳)有限公司 Message processing method and apparatus, and device, storage medium and program product
WO2024045740A1 (en) * 2022-09-02 2024-03-07 京东科技信息技术有限公司 Guard method and apparatus for page information, and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609433A (en) * 2017-09-18 2018-01-19 联想(北京)有限公司 Method for secret protection and electronic equipment
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment
CN111581665A (en) * 2020-05-09 2020-08-25 维沃移动通信有限公司 Data processing method and device and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609433A (en) * 2017-09-18 2018-01-19 联想(北京)有限公司 Method for secret protection and electronic equipment
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment
CN111581665A (en) * 2020-05-09 2020-08-25 维沃移动通信有限公司 Data processing method and device and electronic equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112578965A (en) * 2020-12-25 2021-03-30 维沃移动通信有限公司 Processing method and device and electronic equipment
CN113079086A (en) * 2021-04-07 2021-07-06 维沃移动通信有限公司 Message transmitting method, message transmitting device, electronic device, and storage medium
WO2022242376A1 (en) * 2021-05-19 2022-11-24 腾讯科技(深圳)有限公司 Message processing method and apparatus, and device, storage medium and program product
WO2024045740A1 (en) * 2022-09-02 2024-03-07 京东科技信息技术有限公司 Guard method and apparatus for page information, and electronic device

Similar Documents

Publication Publication Date Title
CN112035878A (en) Information display method and device and electronic equipment
CN113285866B (en) Information sending method and device and electronic equipment
CN112416200A (en) Display method, display device, electronic equipment and readable storage medium
CN112417420A (en) Information processing method and device and electronic equipment
CN114827068A (en) Message sending method and device, electronic equipment and readable storage medium
CN113676395A (en) Information processing method, related device and readable storage medium
CN112181351A (en) Voice input method and device and electronic equipment
CN112422735A (en) Information prompting method and device and electronic equipment
CN112099714A (en) Screenshot method and device, electronic equipment and readable storage medium
CN112184168A (en) Reminding task generation method and device and electronic equipment
CN115277670A (en) Network connection control method and device of target application and electronic equipment
CN114780192A (en) Remote assistance method, remote assistance device and electronic equipment
CN112270004B (en) Content encryption method and device and electronic equipment
CN112637195B (en) Method and device for controlling electronic equipment and electronic equipment
CN113835820A (en) Graphic code display method and device
CN113965640A (en) Message processing method and device
CN112785312A (en) Information sharing method and device, electronic equipment and readable storage medium
CN113312662A (en) Message processing method and device and electronic equipment
CN112866475A (en) Image sending method and device and electronic equipment
CN112448884A (en) Content saving method and device
CN112996138A (en) Communication establishing method, device and storage medium
CN112702260B (en) Image sending method and device and electronic equipment
CN115412524B (en) Message processing method, device, electronic equipment and medium
CN112035032B (en) Expression adding method and device
CN113360938A (en) Data transmission method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination