CN113282364A - Display method, display device and electronic equipment - Google Patents

Display method, display device and electronic equipment Download PDF

Info

Publication number
CN113282364A
CN113282364A CN202110632589.7A CN202110632589A CN113282364A CN 113282364 A CN113282364 A CN 113282364A CN 202110632589 A CN202110632589 A CN 202110632589A CN 113282364 A CN113282364 A CN 113282364A
Authority
CN
China
Prior art keywords
user
icon
area
display
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110632589.7A
Other languages
Chinese (zh)
Other versions
CN113282364B (en
Inventor
蔡云涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Hangzhou Co Ltd
Original Assignee
Vivo Mobile Communication Hangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Hangzhou Co Ltd filed Critical Vivo Mobile Communication Hangzhou Co Ltd
Priority to CN202110632589.7A priority Critical patent/CN113282364B/en
Publication of CN113282364A publication Critical patent/CN113282364A/en
Application granted granted Critical
Publication of CN113282364B publication Critical patent/CN113282364B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a display method, a display device and electronic equipment, which belong to the technical field of electronic equipment, wherein the display method comprises the following steps: under the condition that the display content of the interface comprises the privacy information, canceling the display of the privacy information; displaying the privacy information or an interface corresponding to the privacy information under the condition that the current user passes the identity authentication and the sight line of the user is matched with the first area; the first area is a display area before the privacy information is cancelled and displayed.

Description

Display method, display device and electronic equipment
Technical Field
The application belongs to the technical field of electronic equipment, and particularly relates to a display method, a display device and electronic equipment.
Background
In the related art, users generate more and more private information on electronic devices such as mobile phones and tablets, including private applications, sensitive data documents, and the like. At present, the privacy protection mainly utilizes the modes of passwords, fingerprints and the like to lock the electronic equipment.
When the user uses the mobile phone in a public place, the mobile phone is in an unlocked state, so that the risk of privacy leakage exists.
Disclosure of Invention
An object of the embodiments of the present application is to provide a display method, a display apparatus, and an electronic device, which can effectively protect privacy and security of information.
In a first aspect, an embodiment of the present application provides a display method, including:
under the condition that the display content of the interface comprises the privacy information, canceling the display of the privacy information;
displaying the privacy information or an interface corresponding to the privacy information under the condition that the current user passes the identity authentication and the realization of the user is matched with the first area;
the first area is a display area before the privacy information is cancelled and displayed.
In a second aspect, an embodiment of the present application provides a display device, including:
the cancellation module is used for canceling the display of the privacy information under the condition that the display content of the interface comprises the privacy information;
the display module is used for displaying the privacy information or an interface corresponding to the privacy information under the condition that the user passes the identity authentication and the user is matched with the first area;
the first area is a display area before the privacy information is cancelled and displayed.
In a third aspect, embodiments of the present application provide an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, where the program or instructions, when executed by the processor, implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, embodiments of the present application provide a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the steps of the method according to the first aspect.
According to the embodiment of the application, the privacy information is cancelled and displayed, the sight line information of the current legal user is acquired, whether the current user has the requirement for checking or acquiring the privacy information is judged according to the sight line information, and the privacy information is displayed for the user according to the user requirement, so that the threshold for checking the privacy information is improved, a third person who does not know the privacy information condition can not check the privacy information, the risk of privacy leakage is reduced, and the privacy safety of information data is effectively guaranteed.
Drawings
FIG. 1 shows a flow chart of a display method according to an embodiment of the application;
FIG. 2 shows a front view of an electronic device according to an embodiment of the application;
FIG. 3 shows one of the schematic diagrams of a private information cancellation display according to an embodiment of the present application;
FIG. 4 shows a second schematic diagram of a private information cancellation display according to an embodiment of the present application;
FIG. 5 shows a third schematic diagram of a private information cancellation display according to an embodiment of the present application;
FIG. 6 shows a fourth schematic diagram of a private information cancellation display according to an embodiment of the present application;
fig. 7 is a block diagram showing a structure of a display device according to an embodiment of the present application;
FIG. 8 shows a block diagram of an electronic device according to an embodiment of the application;
fig. 9 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The display method, the display device, and the electronic device provided in the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
In some embodiments of the present application, an information display method is provided, and fig. 1 shows a flowchart of a display method according to an embodiment of the present application, and as shown in fig. 1, the method includes:
102, canceling the display of the privacy information under the condition that the display content of the interface comprises the privacy information;
104, displaying the privacy information or an interface corresponding to the privacy information under the condition that the user passes the identity authentication and the sight line of the user is matched with the first area;
the first area is a display area before the privacy information is cancelled and displayed.
In the embodiment of the application, a display interface is displayed on a display screen of the electronic device, and the display interface may be a main interface (such as a desktop), a menu interface, an application interface of an application program, a web browsing interface, a word processing interface, a chat window, a quick browsing interface, an information preview interface, and the like. And if the content marked as the private information is included in the content displayed on the display interface, canceling the display of the private information and enabling the private information to enter an invisible state.
Specifically, when the display of the private information is canceled, the private information may be directly "not displayed", and the private information coincides with the deleted state. The private information may also be brought into a "non-display" state by other means, for example, the transparency of the private information may be adjusted to 100% to be brought into a completely transparent state, and at this time, in the private display area, display content that is originally located "below" the private information, such as a menu background, desktop wallpaper, chat bubbles, or text box, etc., is displayed.
In other embodiments, the private information may also be blocked by a blocking object, for example, the private information is blocked by an image, for example, the private information is the text "ABC", and an irrelevant picture may be blocked at the position where "ABC" is displayed, for example, the position where "ABC" is originally displayed is blocked by a piece of "small safflower". At this time, the user can only see the picture of the small red flower in the display interface, but cannot see the text information of the ABC.
In still other embodiments, the privacy information may be further obfuscated to make the privacy information unrecognizable, such as "mosaic" processing the privacy information.
The privacy information may be sensitive information or program preset and designated by a program or system, such as device information, a hardware identification code, a network identification code, owner identity information, and the like of an electronic device such as a mobile phone, or electronic payment software, electronic banking software, electronic identity information, and the like. The private information may be manually specified by the user, and the user may set any information such as text information, picture information, application icons, and data tables as the private information according to the actual needs of the user.
It can be understood that a privacy mode and a general mode can be set, and in the privacy mode, the privacy information is hidden or displayed in a cancellation mode, so that the privacy information is invisible, and the privacy safety is ensured. In the case of a scene where the user is at home, etc., the mode can be switched to the normal mode in which the private information is normally displayed as well as the non-private information.
The privacy mode and the general mode can be switched manually by a user, and can be switched automatically according to the scene of the electronic equipment. For example, when the mobile phone recognizes that the mobile phone is currently in a public place, for example, the current position of the mobile phone is not located at a position such as a "home" or a "company" set by the user through a Global Positioning System (GSM), a beidou System, a galileo System, or the like, it is determined that the user is currently in the public place, and the privacy mode is automatically switched to. And when the current position of the acquired mobile phone is at the set positions of 'family', 'company' and the like, the mobile phone is automatically switched to the normal mode.
Whether the user is in a public place can be judged in a Wi-Fi binding mode. For example, when the user is connected to a specific Wi-Fi, the user is judged to be in a non-public place, and then the general mode is automatically switched to. And after the connection with the specific Wi-Fi is disconnected, the user is judged to be in a public place, and the privacy mode is automatically switched at the moment.
Furthermore, the privacy information is cancelled and displayed, and the identity of the current user is judged at the same time, wherein the identity authentication based on biological identification can be carried out on the current user through modes such as face identification, fingerprint identification, iris identification and the like. And if the current user passes the identity authentication, further acquiring the sight line information of the current user, and determining the attention area of the current user in the display interface according to the sight line of the user, namely the sight line 'watching' area of the user.
The method and the device can be used for collecting the sight line information of the user by utilizing an infrared light emitter and a front camera which are arranged on a screen of the electronic equipment. Specifically, fig. 2 shows a front view of an electronic apparatus according to an embodiment of the present application, and as shown in fig. 2, an infrared light emitter 204 and a camera 206 are disposed above a screen 202 of the electronic apparatus 200. The camera 206 may be configured to obtain face data, so as to perform identity authentication on the current user. The camera 206 may be a general camera or a structured light camera, so as to improve the safety of face recognition.
After the current user passes the identity authentication, the infrared light emitter 204 emits infrared light to the face of the user, at this time, the infrared light spots reflected by the pupil and the cornea of the eye of the user are collected by the camera 206, and the attention direction of the eye of the user, that is, the sight line of the user, is identified by the reflected infrared light spots. According to the convergence area of the sight lines of the eyes of the user, the current attention position of the user on the screen can be accurately obtained.
Further, if the line of sight of the user is matched with the first area, that is, the concerned area of the user is a display area before the privacy information is canceled from being displayed, it is determined that the user wishes to view or acquire the privacy information, the privacy information is displayed in a preset manner or an interface corresponding to the privacy information is displayed to the user, and if the line of sight of the user is not matched with the first area, it is indicated that the current user does not have a requirement for viewing or acquiring the privacy information, the state of canceling the display of the privacy information is maintained.
According to the embodiment of the application, the privacy information is cancelled and displayed, the sight line information of the current legal user is acquired, whether the current user has the requirement for checking or acquiring the privacy information is judged according to the sight line information, and the privacy information is displayed for the user according to the user requirement, so that the threshold for checking the privacy information is improved, a third person who does not know the privacy information condition can not check the privacy information, the risk of privacy leakage is reduced, and the privacy safety of information data is effectively guaranteed.
In some embodiments of the present application, the cancelling the display of the private information includes:
the privacy information is transparently processed to form a blank area at the first location.
In the embodiment of the application, when the private information is cancelled to be displayed, the position of the private information in the display interface is determined firstly. After the position of the private information is determined, the private information is subjected to a transparentization process, at which time the private information is no longer visible, and a blank area, i.e., the "first area", is formed in an area where the private information is originally displayed. The blank area may be a "blank" area, that is, no content is displayed in the first area, and the blank area may also display background information under the original privacy information, such as desktop wallpaper, menu background, and the like.
Specifically, in the case where the privacy information is an icon of a privacy application, such as an icon of bank software, fig. 3 shows one of schematic diagrams of a privacy information cancellation display according to an embodiment of the present application, and as shown in fig. 3, the original privacy information 300 is a black square icon, and after the privacy information is cancelled and displayed, the privacy information 300 is not displayed, and only a blank area 302 is left (a dashed frame is only used as a schematic diagram, and is not displayed in an actual interface).
In the case where the privacy information is text, fig. 4 shows a second schematic diagram of the privacy information cancellation display according to the embodiment of the present application, and as shown in fig. 4, the privacy information 400 is text in a solid frame (the solid frame is only used as an illustration, and is not shown in the actual interface), and after the privacy information 400 is cancelled and displayed, the privacy information 400 is not displayed, and only a blank area 402 is left (the dashed frame is only used as an illustration, and is not shown in the actual interface).
After the privacy information is canceled and displayed, if it is detected that the concerned position of the user is a blank area, such as the blank area 402 shown in fig. 4, the concerned position of the user is known to the current user, and at this time, it is determined that the concerned position of the user matches the privacy information, and the privacy information is displayed to the current user. According to the embodiment of the application, the threshold for checking the privacy information is improved, so that a third person who does not know the privacy information condition can not check the privacy information, the risk of privacy leakage is reduced, and the privacy safety of information data is effectively guaranteed.
In some embodiments of the present application, after canceling the display of the private information, the method further comprises:
updating a display area of target content in the display content to a first area;
the user's gaze is matched to the first region, including:
the line of sight of the user coincides with the first area or the line of sight of the user coincides with the second area;
the second area is an area between the target content and the adjacent content.
In the embodiment of the application, after the display of the private information is cancelled, the target content is determined in the display content of the current interface, and the display area of the target content is updated to the first area, that is, the target content is moved to the first area where the private information is originally displayed. That is, the displayed contents in the interface are rearranged, so that an unknown third party cannot infer the hidden position of the privacy information from the information arrangement manner in the displayed contents of the interface.
Further, after the display position of the target content is updated to the first area, the target content "replaces" the display position of the private information, and the adjacent content of the target content, that is, the area between the target content and the adjacent content of the original private content, at this time is the second area. And if the sight line of the user is matched with the second area, namely the attention area of the user is the second area, confirming that the sight line of the user is matched with the first area, and displaying the privacy information or displaying an interface corresponding to the privacy information.
Specifically, after the display of the private information is cancelled, first, non-private information on two sides of an icon of the private information is acquired, namely, first information and second information, wherein the private information is located between the first information and the second information, that is, arranged in a manner of "first information-private information-second information".
When the privacy information is canceled and displayed, the privacy information is directly erased, the first information or the second information which is in situ positioned at two sides of the privacy information is determined as target information, and the target information is moved to a display area of the original privacy information, namely the first area, namely, a sequencing mode of the first information, the privacy information and the second information is changed into a sequencing mode of the first information and the second information, so that the privacy information is fully hidden. At this time, the gap region between the third icon and the fourth icon is the "second region" described above.
Due to the fact that the information displayed in the interface is rearranged, an unknown third party cannot deduce that the interface contains the private information and cannot deduce the hidden position of the private information, and therefore the threshold for checking the private information is improved, the third party who does not know the condition of the private information cannot check the private information, the risk of privacy leakage is reduced, and privacy safety of information data is effectively guaranteed.
In some embodiments of the present application, the displaying of the private information is cancelled, where the displaying of the private information is cancelled includes:
canceling the display of the first icon;
when the user passes the identity authentication and the sight line of the user is matched with the first area, displaying the privacy information or an interface corresponding to the privacy information, wherein the interface comprises:
and running the application program corresponding to the first icon and displaying the user interface of the application program under the condition that the user passes the identity authentication and the sight line of the user is matched with the first area.
In this embodiment of the application, the privacy information is a first icon, where the first icon is specifically an icon of an application installed in a mobile phone, and the first icon may be preset by a system, for example, a mobile phone bank, payment software, friend-making software, or the like, or may be manually specified by a user, and any icon in an interface is specified as the first icon.
When the first icon is not displayed, the first icon may be "transparent", and the first icon is no longer visible, and a blank area is formed on the area originally displayed at the first position, which is the "first area". The displayed position of other icons adjacent to the first icon may also be "moved" into the first area in which the first icon was originally displayed, so that an unknowing third party cannot infer the hidden position of the first icon.
Further, if the user passes the identity authentication and the sight line of the user is matched with the first area, the application program corresponding to the first icon is operated, and after the application program of the first icon is started, a user interface of the application program, namely an interface for the user to use the application program, for receiving the user input and feeding back the input execution result to the user is displayed on the interface. After the user interface is displayed, the user can normally use the application program corresponding to the first icon.
It can be understood that after the user interface of the application program corresponding to the first icon is displayed, other privacy information may also be included in the user interface, and for these privacy information, the user may display the privacy information that is cancelled to be displayed in the user interface in the same manner, and the operation method is similar to the above method, and therefore is not described again.
In some embodiments of the present application, after canceling the displaying of the first icon, the method further comprises:
displaying a second icon in the first area;
the second icon is an icon adjacent to the first icon or an icon arranged at the last in the interface;
under the condition that the user passes the identity authentication and the sight line of the user is matched with the first area, the application program corresponding to the first icon is operated, and the user interface of the application program is displayed, wherein the method comprises the following steps:
running the application program corresponding to the first icon under the condition that the user passes the identity authentication and the sight line of the user is overlapped with the target gap, and displaying a user interface of the application program;
wherein the target slot is a gap between the second icon and an adjacent icon.
In the embodiment of the application, the privacy information is the first icon, and after the first icon is cancelled to be displayed, the display position of the second icon displayed in the interface is updated to the first area. Specifically, the second icon may be an icon adjacent to the first icon, or may be the last icon arranged in the interface. Through reordering the icons in the interface, an unknown third person can not deduce the first icon containing privacy in the interface, the hidden position of the first icon can not be deduced, and the threshold for checking privacy information is improved.
Further, after the second icon is moved to the first area, if the line of sight of the user is matched with a gap between the second icon and an adjacent icon adjacent to the second icon, that is, the attention area of the user is located in the gap between the second icon and the adjacent icon, it is determined that the line of sight of the user is matched with the first area, and at this time, the application program corresponding to the first icon is operated, and the user interface of the application program is displayed.
Specifically, fig. 5 shows a third schematic diagram of the private information cancellation display according to the embodiment of the present application, and as shown in fig. 5, an original first icon 500 is a black square icon, the left side of the black square icon is a third icon 502, and the right side of the black square icon is a fourth icon 504. After the first icon 500 is undisplayed, the first icon 500 is undisplayed and the fourth icon 504 is moved to the left, such that the third icon 502 and the fourth icon 504 are adjacent. At this time, if the line of sight of the user matches a target gap (as shown in fig. 5, the dashed box is only used as an illustration, and is not displayed in the actual interface) between the third icon 502 and the fourth icon 504, it represents that the current user knows the hidden position of the first icon 500 and has a need to run the application program corresponding to the first icon 500, and at this time, it is determined that the line of sight of the user matches the first area, the application program corresponding to the first icon 500 is run, and the user interface of the application program is displayed.
Fig. 6 is a fourth schematic diagram illustrating a privacy information cancellation display according to an embodiment of the present application, and as shown in fig. 6, an original first icon 500 is a black square icon, a left side of the first icon 500 is a third icon 502, and in the interface, a last icon arranged is a fifth icon 506. After the first icon 500 is dismissed, the fifth icon 506 is moved to the first area that was originally used to display the first icon 500. At this time, if the line of sight of the user matches a target gap (shown as a dashed box in fig. 6, which is only used as an illustration and is not displayed in an actual interface) between the third icon 502 and the fifth icon 506, it represents that the current user knows the hidden position of the first icon 500 and has a need to run the application program corresponding to the first icon 500, and at this time, it is determined that the line of sight of the user matches the first area, the application program corresponding to the first icon 500 is run, and a user interface of the application program is displayed.
According to the embodiment of the application, the threshold for checking the privacy information is improved, so that a third person who does not know the privacy information condition can not check the privacy information, the risk of privacy leakage is reduced, and the privacy safety of information data is effectively guaranteed.
In some embodiments of the present application, before running the application corresponding to the first icon, the method further includes:
playing prompt information;
and responding to the confirmation input of the prompt message, running the application program corresponding to the first icon, and displaying the user interface of the application program.
In the embodiment of the application, if the privacy information is the first icon of the program or the function, the prompt information is played first before the application program corresponding to the first icon is run. The prompt message may be a confirmation message such as "whether to start XX program", or may be a name of a program or function corresponding to the icon to be directly played. Further, the user may input a corresponding confirmation output for the played prompt information, and after receiving the confirmation input, open an application interface of the program or function corresponding to the icon.
The confirmation input may be a touch input, a voice input, or a preset input mode such as a double-click power key, which is not limited in the embodiment of the present application.
Specifically, the prompt information may be displayed in the current mobile phone interface, for example, a window of the corresponding prompt information may be popped up and displayed, such as "whether to open an XX application program" or "whether to display XX information", if the user performs the confirmation input, the corresponding application interface is opened, or the corresponding information is displayed, that is, the privacy information is displayed to the user according to the user requirement is achieved, so that a threshold for viewing the privacy information is raised, a third party who does not know the privacy information condition cannot view the privacy information, the risk of privacy leakage is reduced, and the privacy safety of the information data is effectively ensured.
The prompt message can also be sent to a second electronic device which is in communication connection with the current first electronic device, so that the prompt message can be displayed through the second electronic device.
Specifically, the first electronic device, that is, the mobile phone operated by the current user, and the second electronic device may be wearable devices such as a smart watch and smart glasses. When the focus position that detects the user matches with privacy information, then generate corresponding prompt information, if "open XX application" or "whether show XX information", can show this prompt information through the display screen of second electronic equipment, if when second electronic equipment is intelligent wrist-watch or intelligent glasses, can control the cell-phone and send prompt information to wrist-watch or intelligent glasses, show through the display screen of wrist-watch or intelligent glasses, because the screen of wrist-watch is less relatively, the display screen of intelligent glasses only has current user to see, so the privacy is better, can effectively reduce the risk that the privacy was revealed.
In some embodiments of the present application, the private information is also text information, and when the user passes the identity authentication and the line of sight of the user is matched with the first area, the displaying the private information or an interface corresponding to the private information includes:
displaying text information under the condition that the user passes identity authentication and the sight line of the user is matched with the first area; and/or
And under the condition that the user passes the identity authentication, the sight line of the user is matched with the first area and the earphone is connected, the audio corresponding to the text information is played through the earphone.
In the embodiment of the application, when the privacy information is text information, such as a telephone number, an account password or other privacy texts, the identity of the current user is verified, and when the sight line of the user is matched with the first area, the text information can be directly displayed. Specifically, for example, if the private information is located in a first area in the display interface and is in a state of canceling display, the text information canceled to be displayed is redisplayed in the first area.
In other embodiments, if the mobile phone is connected to an earphone, the Text-to-Speech (TTS) system may convert the Text information into corresponding audio, and play the audio through the earphone. The earphone device with better privacy is used for playing the prompt information related to the privacy information, so that the risk of privacy leakage is further reduced, and the privacy safety of information data is effectively guaranteed.
In some embodiments of the present application, a display device is provided, and fig. 7 shows a block diagram of a display device according to an embodiment of the present application, and as shown in fig. 7, a display device 600 includes:
a cancellation module 602, configured to cancel displaying the privacy information when the display content of the interface includes the privacy information;
the display module 604 is configured to display the private information or an interface corresponding to the private information when the user passes the identity authentication and the user is matched with the first area;
the first area is a display area before the privacy information is cancelled and displayed.
In some embodiments of the present application, the display device 600 further comprises:
an updating module 606, configured to update a display area of a target content in the display content to a first area;
the user's gaze is matched to the first region, including:
the line of sight of the user coincides with the first area or the line of sight of the user coincides with the second area;
the second area is an area between the target content and the adjacent content.
In some embodiments of the present application, the private information is a first icon, and the cancellation module 602 is further configured to cancel displaying the first icon;
the display module 604 is further configured to run the application program corresponding to the first icon and display a user interface of the application program when the user passes the identity authentication and the line of sight of the user matches the first area.
In some embodiments of the present application, the display module 604 is further configured to:
displaying a second icon in the first area;
the second icon is an icon adjacent to the first icon or an icon arranged at the last in the interface;
running the application program corresponding to the first icon under the condition that the user passes the identity authentication and the sight line of the user is overlapped with the target gap, and displaying a user interface of the application program;
wherein the target slot is a gap between the second icon and an adjacent icon.
In some embodiments of the present application, the display module 604 is further configured to: displaying text information under the condition that the user passes identity authentication and the sight line of the user is matched with the first area; and/or
The display device 600 further includes:
the playing module 608 is configured to play audio corresponding to the text information through the earphone when the user passes the identity authentication and the line of sight of the user is matched with the first area and the earphone is connected.
The display device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The display device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android operating system (Android), an iOS operating system, or other possible operating systems, which is not specifically limited in the embodiments of the present application.
The display device provided in the embodiment of the present application can implement each process implemented by the above method embodiment, and is not described here again to avoid repetition.
Optionally, an electronic device 700 is further provided in an embodiment of the present application, and fig. 8 shows a block diagram of a structure of the electronic device according to the embodiment of the present application, as shown in fig. 8, the electronic device includes a processor 702, a memory 704, and a program or an instruction stored in the memory 704 and executable on the processor 702, and when the program or the instruction is executed by the processor 702, the process of the embodiment of the method is implemented, and the same technical effect can be achieved, and details are not repeated here to avoid repetition.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic device and the non-mobile electronic device described above.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 2000 includes, but is not limited to: a radio frequency unit 2001, a network module 2002, an audio output unit 2003, an input unit 2004, a sensor 2005, a display unit 2006, a user input unit 2007, an interface unit 2008, a memory 2009, and a processor 2010.
Those skilled in the art will appreciate that the electronic device 2000 may further include a power source 2011 (e.g., a battery) for supplying power to various components, and the power source 2011 may be logically connected to the processor 2010 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
The processor 2010 is configured to cancel displaying the privacy information when the display content of the interface includes the privacy information;
the display unit 2006 is configured to display the privacy information or an interface corresponding to the privacy information when the user passes the identity authentication and the sight line of the user is matched with the first area; the first area is a display area before the privacy information is cancelled and displayed.
Optionally, the display unit 2006 is further configured to update a display area of target content in the display content to the first area;
the processor 2010 is further configured to determine that the user's gaze coincides with the first area or the user's gaze coincides with the second area; the second area is an area between the target content and the adjacent content.
Optionally, the display unit 2006 is further configured to cancel displaying the first icon;
the processor 2010 is further configured to run the application program corresponding to the first icon and display a user interface of the application program when the user passes the identity authentication and the line of sight of the user matches the first area.
Optionally, the display unit 2006 is further configured to display a second icon in the first area; the second icon is an icon adjacent to the first icon or an icon arranged at the last in the interface;
the processor 2010 is further configured to run the application program corresponding to the first icon and display a user interface of the application program when the user passes the identity authentication and the sight line of the user is overlapped with the target gap; wherein the target gap is a gap between the second icon and the adjacent icon.
Optionally, the display unit 2006 is further configured to display text information when the user passes the identity authentication and the sight line of the user is matched with the first area;
the processor 2010 is further configured to play audio corresponding to the text message through the headset when the user passes the identity authentication and the line of sight of the user is matched with the first area and the headset is connected.
According to the embodiment of the application, the privacy information is cancelled and displayed, the sight line information of the current legal user is acquired, whether the current user has the requirement for checking or acquiring the privacy information is judged according to the sight line information, and the privacy information is displayed for the user according to the user requirement, so that the threshold for checking the privacy information is improved, a third person who does not know the privacy information condition can not check the privacy information, the risk of privacy leakage is reduced, and the privacy safety of information data is effectively guaranteed.
It should be understood that in the embodiment of the present application, the input Unit 2004 may include a Graphics Processing Unit (GPU) 5082 and a microphone 5084, and the Graphics processor 5082 processes image data of still pictures or videos obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode.
The display unit 2006 may include a display panel 5122, and the display panel 5122 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 2007 includes a touch panel 5142 and other input devices 5144. A touch panel 5142 is also referred to as a touch screen. The touch panel 5142 may include two parts of a touch detection device and a touch controller. Other input devices 5144 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 2009 may be used to store software programs as well as various data, including but not limited to applications and operating systems. Processor 2010 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc. and a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 2010.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements the processes of the foregoing method embodiments, and can achieve the same technical effects, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device in the above embodiment. Readable storage media, including computer-readable storage media, such as Read-Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, etc.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the foregoing method embodiment, and the same technical effect can be achieved.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method of the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (11)

1. A method of displaying, the method comprising:
under the condition that the display content of the interface comprises the privacy information, canceling to display the privacy information;
displaying the privacy information or an interface corresponding to the privacy information under the condition that the user passes identity authentication and the sight line of the user is matched with a first area;
the first area is a display area before the privacy information is cancelled and displayed.
2. The display method according to claim 1, wherein after the canceling of the display of the private information, the method further comprises:
updating a display area of target content in the display content to the first area;
the user's gaze is matched to a first region, comprising:
the user's gaze coincides with the first region or the user's gaze coincides with a second region;
the second area is an area between the target content and an adjacent content.
3. The display method according to claim 1, wherein the private information is a first icon, and the canceling of the display of the private information includes:
canceling the display of the first icon;
the displaying the private information or the interface corresponding to the private information under the condition that the user passes the identity authentication and the sight line of the user is matched with the first area comprises the following steps:
and running the application program corresponding to the first icon and displaying the user interface of the application program under the condition that the user passes the identity authentication and the sight line of the user is matched with the first area.
4. The display method according to claim 3, wherein after the canceling of the display of the first icon, the method further comprises:
displaying a second icon in the first area;
the second icon is an icon adjacent to the first icon or an icon arranged at the last in the interface;
the running of the application program corresponding to the first icon and the displaying of the user interface of the application program under the condition that the user passes the identity authentication and the sight line of the user is matched with the first area comprises the following steps:
running an application program corresponding to the first icon under the condition that the user passes identity authentication and the sight line of the user is overlapped with the target gap, and displaying a user interface of the application program;
wherein the target gap is a gap between the second icon and an adjacent icon.
5. The display method according to claim 1, wherein the private information is text information, and the displaying the private information or the interface corresponding to the private information when the user passes identity authentication and the line of sight of the user is matched with the first area comprises:
displaying the text information under the condition that the user passes identity authentication and the sight line of the user is matched with the first area; and/or
And under the condition that the user passes identity authentication, the sight line of the user is matched with the first area, and an earphone is connected, playing the audio corresponding to the text information through the earphone.
6. A display device, comprising:
the cancellation module is used for canceling the display of the privacy information under the condition that the display content of the interface comprises the privacy information;
the display module is used for displaying the private information or an interface corresponding to the private information under the condition that a user passes identity authentication and the user is matched with a first area;
the first area is a display area before the privacy information is cancelled and displayed.
7. The display device according to claim 6, further comprising:
the updating module is used for updating a display area of target content in the display content to the first area;
the user's gaze is matched to a first region, comprising:
the user's gaze coincides with the first region or the user's gaze coincides with a second region;
the second area is an area between the target content and an adjacent content.
8. The display device according to claim 6, wherein the private information is a first icon, and the cancellation module is further configured to cancel displaying the first icon;
the display module is further used for running the application program corresponding to the first icon and displaying the user interface of the application program under the condition that the user passes identity authentication and the sight line of the user is matched with the first area.
9. The display device of claim 8, wherein the display module is further configured to:
displaying a second icon in the first area;
the second icon is an icon adjacent to the first icon or an icon arranged at the last in the interface;
running an application program corresponding to the first icon under the condition that the user passes identity authentication and the sight line of the user is overlapped with the target gap, and displaying a user interface of the application program;
wherein the target vacancy is a gap between the second icon and an adjacent icon.
10. The display device according to claim 6, wherein the private information is text information;
the display module is further configured to: displaying the text information under the condition that the user passes identity authentication and the sight line of the user is matched with the first area; and/or
The display device further includes:
and the playing module is used for playing the audio corresponding to the text information through the earphone under the condition that the user passes the identity authentication, the sight line of the user is matched with the first area, and the earphone is connected.
11. An electronic device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the method according to any one of claims 1 to 5.
CN202110632589.7A 2021-06-07 2021-06-07 Display method, display device and electronic equipment Active CN113282364B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110632589.7A CN113282364B (en) 2021-06-07 2021-06-07 Display method, display device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110632589.7A CN113282364B (en) 2021-06-07 2021-06-07 Display method, display device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113282364A true CN113282364A (en) 2021-08-20
CN113282364B CN113282364B (en) 2023-10-10

Family

ID=77283532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110632589.7A Active CN113282364B (en) 2021-06-07 2021-06-07 Display method, display device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113282364B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022446A (en) * 2021-10-09 2022-09-06 荣耀终端有限公司 User interface management method and terminal equipment
WO2024022310A1 (en) * 2022-07-26 2024-02-01 华为技术有限公司 Device security processing method and electronic devices

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104809417A (en) * 2014-01-29 2015-07-29 北京三星通信技术研究有限公司 Method and device for shielding information on display screen and equipment
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device
CN105338192A (en) * 2015-11-25 2016-02-17 努比亚技术有限公司 Mobile terminal and operation processing method thereof
CN108804898A (en) * 2018-05-25 2018-11-13 维沃移动通信有限公司 A kind of message playback method and mobile terminal
CN109120788A (en) * 2018-08-22 2019-01-01 北京小米智能科技有限公司 Playback method, device and the computer readable storage medium of message
CN110162178A (en) * 2019-05-22 2019-08-23 努比亚技术有限公司 Illustrate the methods of exhibiting, wearable device and storage medium of information
CN110795759A (en) * 2019-10-24 2020-02-14 广州心语心伴互联网信息服务有限公司 Privacy protection method and system
CN110825226A (en) * 2019-10-30 2020-02-21 维沃移动通信有限公司 Message viewing method and terminal
WO2020108133A1 (en) * 2018-11-30 2020-06-04 华为技术有限公司 Biological recognition interaction method, graphical interaction interface, and related apparatus

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104809417A (en) * 2014-01-29 2015-07-29 北京三星通信技术研究有限公司 Method and device for shielding information on display screen and equipment
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device
CN105338192A (en) * 2015-11-25 2016-02-17 努比亚技术有限公司 Mobile terminal and operation processing method thereof
CN108804898A (en) * 2018-05-25 2018-11-13 维沃移动通信有限公司 A kind of message playback method and mobile terminal
CN109120788A (en) * 2018-08-22 2019-01-01 北京小米智能科技有限公司 Playback method, device and the computer readable storage medium of message
WO2020108133A1 (en) * 2018-11-30 2020-06-04 华为技术有限公司 Biological recognition interaction method, graphical interaction interface, and related apparatus
CN110162178A (en) * 2019-05-22 2019-08-23 努比亚技术有限公司 Illustrate the methods of exhibiting, wearable device and storage medium of information
CN110795759A (en) * 2019-10-24 2020-02-14 广州心语心伴互联网信息服务有限公司 Privacy protection method and system
CN110825226A (en) * 2019-10-30 2020-02-21 维沃移动通信有限公司 Message viewing method and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022446A (en) * 2021-10-09 2022-09-06 荣耀终端有限公司 User interface management method and terminal equipment
WO2024022310A1 (en) * 2022-07-26 2024-02-01 华为技术有限公司 Device security processing method and electronic devices

Also Published As

Publication number Publication date
CN113282364B (en) 2023-10-10

Similar Documents

Publication Publication Date Title
US11882221B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN112099705B (en) Screen projection method and device and electronic equipment
CN112804445B (en) Display method and device and electronic equipment
JP2012073724A (en) Portable terminal, user authentication method and program
US11004163B2 (en) Terminal-implemented method, server-implemented method and terminal for acquiring certification document
RU2636686C2 (en) Method and device for sending information in voice service
CN113282364B (en) Display method, display device and electronic equipment
CN103970422A (en) Screen transparency automatic changing method of mobile terminal and mobile terminal
CN107562180A (en) A kind of method for information display and terminal
CN112311795B (en) Account management method and device and electronic equipment
US20230385426A1 (en) Encryption Method and Apparatus, Electronic Device, and Medium
CN111857464A (en) Information display method and device, electronic equipment and readable storage medium
CN106874787B (en) Image viewing method and mobile terminal
WO2017193645A1 (en) Method and apparatus for displaying data, and terminal
JP2022002103A (en) Privacy protecting method and protecting device for mobile terminal and mobile terminal
CN113238691B (en) Application icon management method and device and electronic equipment
CN116156050A (en) Display method and device
CN115344884A (en) Display method, device and terminal
CN111797383A (en) Password verification method and device and electronic equipment
CN109165535A (en) screen protection method, device and storage medium
CN114637563B (en) Information input method and device
CN115437735A (en) Equipment control method and device thereof
CN115933945A (en) Screen locking interface display method and device and electronic equipment
CN113360938A (en) Data transmission method and device and electronic equipment
CN113987576A (en) Reminding method, device and equipment for image acquisition and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant