CN117272272A - Privacy protection method, terminal and electronic equipment - Google Patents

Privacy protection method, terminal and electronic equipment Download PDF

Info

Publication number
CN117272272A
CN117272272A CN202311245874.9A CN202311245874A CN117272272A CN 117272272 A CN117272272 A CN 117272272A CN 202311245874 A CN202311245874 A CN 202311245874A CN 117272272 A CN117272272 A CN 117272272A
Authority
CN
China
Prior art keywords
input
user
system space
transfer
window
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311245874.9A
Other languages
Chinese (zh)
Inventor
高吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202311245874.9A priority Critical patent/CN117272272A/en
Publication of CN117272272A publication Critical patent/CN117272272A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Multimedia (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a privacy protection method, a terminal and electronic equipment, and belongs to the technical field of communication. And receiving a first input of a user to a first system space, responding to the first input, carrying out identity verification on the user, and under the condition that a verification result of the identity verification is that the transfer control and the transfer input of the first object are passed and the transfer input of the user is received, transferring the first object to a second system space, wherein the use permission of the first system space is the user operating the first system space, the second system space is the space of a privacy system, and the use permission of the second system space is the user of which the user identity information is matched with the identity verification information.

Description

Privacy protection method, terminal and electronic equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to a privacy protection method, a terminal and electronic equipment.
Background
With the development of mobile communication networks and the internet, electronic devices such as mobile phones, PADs, computers, and the like have become an indispensable part of life and work of people. In order to protect user privacy, an electronic device generally includes a first system space and a second system space, where the first system space is a system space of a non-private operating system, and the second system space is a system space of a private system, and is used for storing private content to be protected in the electronic device, and the first system space and the second system space are generally used separately.
When a user uses a first system space, the user may browse some private contents to be protected, and in order to protect the browsed private contents, the private contents need to be migrated to a second system space. At present, a mode of migrating private content from a first system space to a second system space mainly comprises the steps that when a user browses the private content in the first system space, the user switches to the second system space through a designated operation path, and then the private content is selected through a migration function in the second system space, so that the private content is migrated to the second system space, and the migration mode is complex in operation and time-consuming.
Disclosure of Invention
The embodiment of the application aims to provide a privacy protection method, a terminal, electronic equipment, a readable storage medium, a chip and a program, which can solve the problems of complex and time-consuming privacy content migration operation.
In a first aspect, an embodiment of the present application provides a privacy protection method, including:
receiving a first input of a user to a first system space;
in response to the first input, authenticating the user;
under the condition that the authentication result of the identity authentication is passing and the transfer input of the user to the transfer control and the first object is received, the first object is migrated to a second system space;
The system comprises a first system space, a second system space, a privacy system and a user authentication system, wherein the use authority of the first system space is a user operating the first system space, the second system space is a space of the privacy system, and the use authority of the second system space is a user of which the user identity information is matched with the identity authentication information.
In a second aspect, an embodiment of the present application provides a terminal, including:
the receiving module is used for receiving a first input of a user to the first system space;
the verification module is used for responding to the first input and carrying out identity verification on the user;
the processing module is used for migrating the first object to the second system space under the condition that the authentication result of the identity authentication is passing and the transfer input of the user to the transfer control and the first object is received;
the use authority of the first system space is a user operating the first system space, the second system space is a space of a privacy system, and the use authority of the second system space is a user with user identity information matched with identity verification information
In some possible implementations, the processing module is further configured to:
after the privacy floating window is displayed, receiving a second input of the user to the privacy floating window;
responsive to the second input, displaying a historical object migration record for the second system space, the object migration record including a migration operation record for migration of at least one object of the first system space to the second system space;
Receiving a third input of one of the historical object migration records;
and responding to the third input, and moving the object corresponding to the migration operation record selected by the third input out of the second system space to the first system space.
In some possible implementations, the processing module is further configured to:
after the privacy suspension window is displayed, face recognition is carried out on the environment image acquired by the camera;
and hiding the privacy suspension window when the face recognition result indicates that the environment image contains the face of the user without the use permission of the second system space.
In some possible embodiments, the verification module is specifically configured to:
collecting face images of a user;
extracting biological characteristics of a user from the face image;
under the condition that the biological characteristics are matched with the prestored biological characteristics, judging that the verification result of the identity verification is passing;
in the case that the biometric characteristic does not match the pre-stored biometric characteristic, it is determined that the authentication result of the authentication is not passed.
In a third aspect, embodiments of the present application provide an electronic device comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor, implement the steps of the method as in the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium having stored thereon a program or instructions which, when executed by a processor, implement the steps of the method as in the first aspect.
In a fifth aspect, embodiments of the present application provide a chip, the chip including a processor and a communication interface, the communication interface being coupled to the processor, the processor being configured to execute programs or instructions to implement a method as in the first aspect.
In a sixth aspect, embodiments of the present application provide a computer program product stored in a storage medium, the program product being executable by at least one processor to implement a method as in the first aspect.
In some embodiments of the present application, a first input of a user to a first system space is received, authentication is performed on the user in response to the first input, and if an authentication result of the authentication is passing and a transfer input of the user to a transfer control and a first object is received, the first object is migrated to a second system space, where a use permission of the first system space is a user operating the first system space, the second system space is a space of a privacy system, and a use permission of the second system space is a user whose user identity information matches with the authentication information. According to the embodiment, the first object can be quickly migrated to the second system space in the first system space, and the migration is performed after the first system space is switched to the second system space, so that the problems of complex and time-consuming privacy content migration operation are solved.
Drawings
FIG. 1 is a flow diagram of a privacy preserving method provided by some embodiments of the present application;
FIG. 2 is a schematic illustration of a face feature entry page provided by some embodiments of the present application;
FIG. 3 is a schematic diagram of a setup page provided by some embodiments of the present application;
FIG. 4 is a schematic diagram of object migration provided by some embodiments of the present application;
FIG. 5 is a schematic diagram of object migration revocation provided by some embodiments of the present application;
FIG. 6 is a schematic diagram of object migration provided by some embodiments of the present application;
FIG. 7 is a schematic view of privacy floating window opening provided by some embodiments of the present application;
FIG. 8 is a schematic diagram of object migration provided by some embodiments of the present application;
FIG. 9 is a schematic diagram of object migration provided by some embodiments of the present application;
FIG. 10 is a schematic view of object removal provided by some embodiments of the present application;
FIG. 11 is a schematic diagram of object migration provided by some embodiments of the present application;
FIG. 12 is a schematic view of object migration provided by some embodiments of the present application;
FIG. 13 is a block diagram of a terminal provided by some embodiments of the present application;
FIG. 14 is a block diagram of an electronic device provided by some embodiments of the present application;
fig. 15 is a schematic structural diagram of an electronic device provided in some embodiments of the present application.
Detailed Description
Technical solutions in the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application are within the scope of the protection of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged, as appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the objects identified by "first," "second," etc. are generally of a type and not limited to the number of objects, e.g., the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
The privacy protection method, the privacy protection device, the electronic equipment and the storage medium provided by the embodiment of the application are described in detail below through specific embodiments and application scenes thereof with reference to the accompanying drawings.
The privacy protection method provided by the application can be applied to a privacy content migration scene, and the privacy protection method provided by the embodiment of the application is described in detail below with reference to fig. 1 to 13. It should be noted that, in the privacy protection method provided in the embodiment of the present application, the execution body may be a terminal, and the terminal may be, for example, an electronic device having a first system space and a second system space, such as a mobile phone, a computer, a tablet computer, and the like. In the embodiment of the present application, a privacy protection method is described by taking a terminal as an execution subject to execute the privacy protection method.
Referring to fig. 1, a flow chart of a privacy preserving method according to some embodiments of the present application is shown.
As shown in fig. 1, the method at least comprises the steps of: step 110 to step 130 are described in detail below.
Step 110, a first input from a user to a first system space is received.
In some embodiments of the present application, the first system space is a system space commonly used by a user in the terminal, and may include at least one desktop page, and typically, the system space entered after the terminal is started is the first system space. The use right of the first system space is a user who operates the first system space, so that the user who uses the terminal can see the first system space after the terminal is started.
Various objects can be displayed in the first system space, including but not limited to address books, short messages, instant messaging chat content, pictures, videos, files, compression packs, applications, text content, and the like, and a user can browse various objects in the first system space.
In some embodiments of the present application, the terminal further includes a second system space in addition to the first system space, where the second system space is a system space of a privacy system in the terminal, which may also be referred to as a privacy space, for storing the private content to be protected, and may also include at least one private desktop page, and objects in the second system space are migrated by a user from objects displayed in the first system space. The second system space is different from the first system space in use permission, and the use permission of the second system space is a user with the user identity information matched with the identity verification information. The identity verification information is the identity information of the user with the second system space use authority set in the terminal. The user having the second system space use right may be set by the holder of the terminal, for example, the holder of the terminal may set itself as the user having the second system space use right, or may set other users as the user having the second system space use right. Based on this, when the user of the terminal wants to use the second system space, authentication needs to be performed in the first system space first, and when it is determined that the authentication information is matched with the authentication information through authentication, the authentication result is determined to pass, so that the second system space can be used, and when it is determined that the authentication information is not matched with the authentication information through authentication, the authentication result is determined to not pass, so that the second system space cannot be used. The authentication information may be fingerprint information, face information, iris information, palmprint information, etc. of the terminal holder.
In some embodiments of the present application, the holder of the terminal sets itself as the user having the usage right of the second system space, based on which, when the user who wants to use the second system space is the terminal holder, the authentication result of authenticating it will be passed, so that it can use the second system space, and when the user who wants to use the second system space is another user than the terminal holder, the authentication result of authenticating it will be failed, so that it cannot use the second system space.
In some embodiments of the present application, when a user wants to migrate an object in a first system space into a second system space, a first input may be made to the first system space, where the first input may be a selection input for selecting the first object in the first system space that the user wants to migrate, or a start input for starting user authentication, and the first input may be a first operation. Illustratively, the first input includes, but is not limited to: the user inputs the first object in the first system space or the touch input of any interface displayed in the first system space through a touch device such as a finger or a stylus, or inputs a voice command input by the user, or inputs a specific gesture input by the user, or inputs other feasibility, and the embodiment of the invention is not limited specifically. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. Any of the interfaces displayed in the first system space may include, but is not limited to, any of the program interfaces in a desktop or any application.
In some embodiments of the present application, in a case where the first input is a selection input to the first object, the first input may be: the user inputs a long press of the first object in the first system space by a finger. The first input may be: based on the display interface of the first system space, the user sends a voice instruction which is sent to the terminal for displaying the first system space and indicates a first object in the selected display interface.
In some embodiments of the present application, the privacy protection method may be defined based on a barrier-free service of a terminal system framework, where the barrier-free service is a service provided for a user who needs a special auxiliary function, may make them use the terminal more conveniently, and may improve the usability of an application in the terminal. The terminal and the application program in the terminal can be more operable through the barrier-free service. The operating principle of the barrier-free service is to set up a service between the application and the system, through which the interface components in the application can be accessed. The user may use this service to recognize text, find controls, simulate gestures, monitor for interface events, and so forth. The service may also detect time, status changes, and inject information into the interface. Based on the barrier-free service, the terminal can acquire the input of the user to any object in the whole system range and identify the node information of any object, so that the user can migrate any object in the first system space. The method is different from the prior art that special customization is mostly carried out under special scenes of system application of the terminal, such as system photo album, system file management and the like, so that the use scene of privacy migration is effectively expanded.
In some embodiments of the present application, the first object may include at least one of: files, application icons, program interfaces, controls, etc. The file includes, but is not limited to, various formats such as short messages, instant messaging chat content, pictures, documents, videos, text content, compression packages and the like, the program interface can be any program interface of any application program, and the control can be a function control or a shortcut key of any application program.
In some embodiments of the present application, when a user browses an album program in a first system space, by long pressing a portrait picture in a program interface of the album program, the portrait picture long pressed by the user may be selected as a first object that needs to be migrated to a second system space.
In some embodiments of the present application, when a user browses a desktop of a first system space, by long pressing any application icon in the desktop, the application icon that the user long presses may be selected as a first object that needs to be migrated to a second system space.
In some embodiments of the present application, when a user uses an instant messaging application in a first system space, by pressing one contact chat interface in the instant messaging application for a long time, the contact chat interface pressed for a long time by the user can be selected as a first object that needs to be migrated to a second system space.
In some embodiments of the present application, when a user browses a desktop in a first system space, by long pressing one function control in the desktop, the long pressed function control of the user may be selected as a first object that needs to be migrated to a second system space.
In other embodiments of the present application, in the case where the first input is a start input for starting authentication, the first input may be: the user inputs a click through any one of the interfaces displayed in the first system space by a finger. The first input may be: a user inputs a long press to any one of the interfaces displayed in the first system space. The first input may be: and a voice instruction which is sent by the user to the terminal to which the first system space belongs and is used for indicating to start user authentication.
Step 120, in response to the first input, performs authentication of the user.
In some embodiments of the present application, the user may be authenticated based on authentication information stored in advance in the terminal to determine whether the user has the use right of the second system space. The authentication information stored in the terminal may be identity information of the user having the second system space use authority.
In some embodiments of the present application, the identity information of the user may include biometric information of the user, wherein the biometric information includes, but is not limited to, a face, a fingerprint, a voiceprint, an iris, a hand, a palm print, a finger vein, a retina, and the like.
In some embodiments of the present application, before the step 120, the privacy protection method provided in the present application may further include: and setting and storing identity verification information, namely the identity information of the user with the second system space use authority. The user with the second system space use authority may be specified according to practical situations, including but not limited to a terminal owner or other users.
For example, in the case that the user having the second system space usage right is the owner, the face feature of the owner may be collected in advance, and the face feature of the owner is used as the authentication information. The iris characteristics of the owner can be collected in advance, and the iris characteristics of the owner are used as identity verification information. The fingerprint of the owner can be collected in advance, and the fingerprint of the owner is used as identity verification information.
When the user is authenticated, the identity information of the user can be obtained, the identity information of the user is compared with the identity authentication information, the identity authentication result of the user is determined to be passed under the condition that the identity information of the user is matched with the identity authentication information, and the identity authentication result of the user is determined to be failed under the condition that the identity information of the user is not matched with the identity authentication information. If the user passes the authentication result, it is indicated that the user is a user with the second system space, and then step 130 may be continued. And under the condition that the authentication result of the user is failed, the user is not provided with the use authority of the second system space, and in order to ensure the safety of the second system space, the migration of the object in the first system space to the second system space can be refused.
And step 130, migrating the first object to the second system space under the condition that the authentication result of the identity authentication is passing and the transfer input of the user to the transfer control and the first object is received. The transfer control is a control for realizing an object transfer function in the first system space.
In some embodiments of the present application, when a user wants to migrate a first object in a first system space to a second system space, a transfer input may be made to the first object and a transfer control, and the terminal migrates the first object to the second system space through the transfer control in response to the transfer input. Illustratively, the transfer inputs described above may include, but are not limited to: the user inputs the click of the first object or the transfer control in the first system space through a touch device such as a finger or a stylus, or inputs a voice command input by the user, or inputs a specific gesture input by the user, or inputs other feasibility, and the embodiment of the invention is not limited and specifically can be determined according to actual use requirements. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the transfer input may be: the user drags the first object to the display area associated with the transfer control by pressing the first object long. The transfer input may be: the user presses the transition control long, and drags the transition control to the first object which the user wants to migrate.
In some embodiments of the present application, when the first object is a portrait picture in the first system space, the user may migrate the portrait picture into the second system space by dragging the portrait picture into a display area associated with the transfer control. Alternatively, the user may migrate the portrait picture into the second system space by dragging a transfer control onto the portrait picture.
In some embodiments of the present application, when the first object is an application icon in the first system space, the user may migrate the application icon into the second system space by dragging the application icon into a display area associated with the transfer control. Alternatively, the user may migrate the application icon into the second system space by dragging the transfer control over the application icon.
In some embodiments of the present application, when the first object is a contact chat interface in the first system space, the user may migrate the contact chat interface into the second system space by dragging the contact chat interface into a display area associated with the transfer control. Alternatively, the user may migrate the chat interface into the second system space by dragging a transfer control onto the chat interface.
In some embodiments of the present application, when the first object is a function control in the first system space, the user may migrate the function control into the second system space by dragging the function control into a display area associated with the transfer control. Alternatively, the user may migrate the functionality control into the second system space by dragging the transfer control onto the functionality control.
According to the privacy protection method, first input of a user to a first system space is received, identity verification is conducted on the user in response to the first input, and under the condition that a verification result of the identity verification is passing and transfer input of the user to a transfer control and a first object is received, the first object is transferred to a second system space, wherein the use permission of the first system space is the user operating the first system space, the second system space is the space of a privacy system, and the use permission of the second system space is the user with user identity information matched with the identity verification information. According to the embodiment, the objects to be migrated can be directly migrated to the second system space in the first system space, and the objects are not required to be firstly switched from the first system space to the second system space for migration, so that the operation is simple, and the problems of complex and time-consuming privacy content migration operation are solved.
In some embodiments, to avoid disturbing the user by authentication, the user may be authenticated in an authentication manner that is not perceived by the user. The non-perception authentication mode refers to a mode of authenticating a user in the background, namely, an authentication mode of completing authentication without displaying a user authentication interface and without actually physically contacting any object by the user, such as silence living body detection, iris recognition and the like. Based on this, the authentication information pre-stored in the terminal may include biometric features such as a face and an iris extracted from a face image of the user having the second system space usage right, and accordingly, the authenticating the user in step 120 may include:
collecting face images of a user;
extracting biological characteristics of a user from the face image;
under the condition that the biological characteristics are matched with the prestored biological characteristics, judging that the verification result of the identity verification is passing;
in the case that the biometric characteristic does not match the pre-stored biometric characteristic, it is determined that the authentication result of the authentication is not passed.
The prestored biological characteristics are the biological characteristics of the face, the iris and the like extracted from the face image of the user with the second system space using authority, namely the identity verification information.
In some embodiments of the present application, where the biometric is a human face, the user may be authenticated using a silent living detection method. Silence living body detection is an effective face recognition technology, can enable a user to safely identify identities under the condition that the user does not see or hear anything, cannot disturb the user in the identification process, and can realize noninductive detection. When the silence living body detection is utilized to carry out identity verification on the user, the matching between the real face of the user and the face features with the use permission of the second system space stored in advance can be detected by utilizing the visual camera and the face tracking technology in the terminal, so that whether the user has the use permission of the second system space is verified. The principle of silence living body detection is that the head posture and expression which are continuously changed are combined into a limited image expression, and the true and false judgment can be detected by carrying out face recognition algorithm processing on the image expression. Among other things, face recognition algorithms include, but are not limited to: template matching-based methods, singular value-based feature methods, subspace analysis methods, principal component analysis methods, elastic matching methods, feature face methods, artificial neural network methods, support vector machine methods, integral image-based feature methods and the like. Expression data and head pose data of the user, including but not limited to head rotation, scaling, displacement, facial expression, and the like.
When the silence living body detection is adopted for identity verification, a user can complete the identity verification without actually and physically contacting any object, so that the interference to the user is avoided, and in addition, the silence living body detection can prevent invalid identification, such as identification of an image capturing or non-natural account, so that various attack modes such as paper photographing, electronic photographing and video photographing are effectively resisted, and the safety of a second system space is ensured. The silence living body detection can work in any environment, even in a very dim room where a lamp fires, and can detect facial expressions of a user moving in any area, and can track the displacement and expression change of the face in the movement, thereby performing living body detection.
In addition, in other embodiments of the present application, where the biometric feature is an iris feature, iris recognition techniques may be employed to authenticate the user. The iris recognition technology is a biometric technology for recognizing and verifying the identity of a user, and it realizes highly accurate identity authentication based on unique iris features of each person, i.e., texture and color patterns of the iris. The principle of iris recognition technology is to capture and analyze iris images by using a special iris recognition system that acquires a high resolution image of the iris of a human eye using an image pickup device and extracts features of the iris using a computer algorithm. In some embodiments of the present application, a front camera in a terminal may be used to collect a face image of a user, then an eye image including eye image information of the user is intercepted from the face image, an iris feature of the user is obtained by performing feature on the eye image, and whether the iris feature of the user is matched with an iris feature of a user having a second system space use permission or not is determined by comparing the iris feature of the user with a prestored iris feature of the user having the second system space use permission, so as to determine whether the user has the second system space use permission or not.
The iris recognition technology is a non-contact recognition method, and does not need physical contact or touch, so that the identity verification of the user can be realized under the condition that the user is not felt. In addition, the iris recognition technology has relatively high adaptability to light change and environmental influence, and the characteristics of the iris are relatively stable under different illumination conditions, so that the iris recognition technology can effectively recognize the iris under indoor, outdoor and light change environments.
Accordingly, prior to performing step 120, the user with the second system space usage rights may be guided to perform face image entry using the interface shown in fig. 2, so as to extract the biological features of the face, iris, etc. of the user with the second system space usage rights from the entered face image.
Therefore, the user can be authenticated without disturbing the user, the user does not need to interrupt the use of the program function of the terminal, and the user is prevented from being disturbed by the authentication.
In addition, before executing step 130, the privacy preserving method provided in the embodiment of the present application may include: from among the plurality of transition controls provided by the terminal, one transition control is determined as the transition control used in step 130, for example, the transition control used in step 130 may be any one of the plurality of transition controls provided by the terminal.
In some embodiments of the present application, the transfer controls provided by the terminal include, but are not limited to: a hover ball control, a privacy hover window, an object selection control, and the like.
Illustratively, the manner of determining a transition control in the plurality of transition controls provided from the terminal includes, but is not limited to, displaying a setting page in the first system space, where the setting page includes a plurality of transition control options corresponding to the transition controls, receiving a selection input of a user to one transition control option in the setting page, and determining, in response to the selection input, a transition control corresponding to the transition control option selected by the user as the transition control used in step 130.
Here, the selection input may include, but is not limited to, a single click input, a double click input, or any number of click inputs to any one of the transition control options, and may also be a long press input, a short press input, or the like.
In some embodiments of the present application, the setting interface may be as shown in fig. 3, where three transition control options may be included, including a "floating ball", a "floating window", and an "object selection box", where the transition control corresponding to the "floating ball" is a floating ball control, the transition control corresponding to the "floating window" is a privacy floating window, and the transition control corresponding to the "object selection box" is an object selection control. The user can click one transfer control option meeting the actual requirement from a plurality of transfer control options of the setting page according to the actual requirement, so that the transfer control corresponding to the transfer control option clicked by the user is used as the transfer control used when the object is migrated in the step 130.
In some embodiments of the present application, if the user wants to use the hover ball control for object migration, as shown in fig. 3, the user may click on the "hover ball" transition control option, thereby using the hover ball control as a transition control for object migration.
In some embodiments of the present application, if the user wants to use the privacy floating window to perform object migration, the user may use the privacy floating window as a transfer control used when performing object migration by clicking on the "floating window" transfer control option.
In some embodiments of the present application, if the user wants to use the object selection control to perform object migration, the user may use the object selection control as a migration control used when performing object migration by clicking on the "object selection box" as a transition control option.
After determining the transition control to use, the transition control may be displayed in the first system space in response to the first input such that a user may make a transition input to the transition control and a first object in the first system space to migrate the first object to the second system space through the transition control.
By the method, different users can select the proper transfer control to transfer the object according to the own requirements, so that the different requirements of different users are met.
In addition, the floating ball control, the privacy floating window and the object selection control can be displayed in a floating mode in the first system space, so that the transfer control can be displayed in a floating mode in a display interface of the first system space when a user browses the first system space, and the first object and the transfer control displayed in the first system space are transferred and input, so that the first object is directly transferred to the second system space without switching from the first system space to the second system space, and the operation is simple. Moreover, when the transfer control is displayed in the first system space, the user can still operate the first system space, and normal use of the first system space by the user is not interrupted.
In some embodiments of the present application, as shown in fig. 3, the setting interface may further include a state switching control 31, where the state switching control 31 is used to switch an on state and an off state of the second system space shortcut migration function. Under the condition that the shortcut migration function of the second system space is in an on state, the terminal can perform object migration and management through the privacy protection method provided by the embodiment of the application, and under the condition that the shortcut migration function of the second system space is in an off state, the terminal cannot perform object migration and management through the privacy protection method provided by the embodiment of the application. Based on this, the user can switch the state of the second system space shortcut migration function by controlling the state switching control 31 according to the scene. For example, when the user plays a game in the first system space, the user can switch the second system space shortcut migration function to the off state through the state switching control 31, so that the transition control can be prevented from blocking the game screen. When the user searches the object to be hidden in the first system space, the user can switch the quick migration function of the second system space to the on state through the state switching control 31, so that the user can quickly migrate the browsed object to be hidden.
Through the mode, a user can decide whether to use the privacy protection method provided by the embodiment of the application according to actual requirements, so that the privacy protection method is suitable for different scenes.
In some embodiments of the present application, in the case where the transfer control used is determined to be a hover ball control, the step 130 may include the following steps:
in step 1311, if the authentication result is passed, the suspension ball control is displayed.
Here, the hover ball control may be displayed in hover over an interface in the first system space, which may be, for example, any interface displayed in the first system space, including, but not limited to, any program interface of a desktop or any application, and the hover ball control may be, for example, a spherical control displayed in hover over an interface in the first system space, where no content may be displayed.
The display area associated with the suspension ball control can be preset according to actual conditions, and the display area can comprise the area around the suspension ball control or the area inside the suspension ball.
In some embodiments of the present application, the hover ball control 41 may hover over the album interface 40 when a user browses the album interface 40 of an album application as shown in FIG. 4 in a first system space.
At step 1312, a transfer input is received from a user to move a first object in a first system space to a display area associated with a hover ball control. The transfer input is used to control the first object to move to a display area associated with the hover ball control.
Here, the transfer input may include, but is not limited to, click input of the first object by the user through a touch device such as a finger or a stylus, or a voice command input by the user, or a specific gesture input by the user, or other feasibility inputs, and may specifically be determined according to actual use requirements, which is not limited by the embodiment of the present invention. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the transfer input may be: the user drags the first object into a display area associated with the hover ball control. The transfer input may also be: the user double clicks on the first object, moving the first object into the display area associated with the hover ball control.
The display area associated with the suspension ball control can be preset according to actual conditions, and the display area can comprise the area around the suspension ball control or the area inside the suspension ball.
In some embodiments of the present application, when a user browses an album interface of an album application program in a first system space as shown in fig. 4, if a picture 401 therein is a first object that the user wants to migrate, the user may transfer and input the picture 401, so as to move the picture 401 into a display area associated with the hover ball control 41.
In response to the transfer input, the first object is migrated to the second system space, step 1313.
In some embodiments of the present application, as long as a transfer input of a user to move a first object to a display area associated with a hover ball control is received, the terminal may be controlled to respond to the transfer input to migrate the first object to a second system space, without requiring the user to perform other additional interactive operations.
In some embodiments of the present application, as shown in fig. 4, in response to a user making a transfer input to a picture 401, the picture 401 is migrated from a first system space to a second system space.
Through the mode, a user can transfer the first object into the second system space only by simply transferring and inputting the first object, the operation is simple, and in addition, the content in the second system space is not displayed in the suspension ball control, so that the whole transfer process can not display the existing content in the second system space, and privacy content leakage is effectively avoided.
After migrating the first object to the second system space through the hover ball control, the following steps may also be performed:
in step 1314, a user-input to cancel migration of the hover ball control is received.
In some embodiments of the present application, the hover ball control has a cancel function, and the migration cancel input is used to activate the cancel function of the hover ball control, where the input manner of the migration cancel input includes, but is not limited to, a single click input, a double click input, or any number of click inputs to the hover ball control, and may also be a long press input or a short press input. For example, the migration revocation input may be: double-click input by the user to hover ball control 41. The migration revocation input may be: by clicking the hover ball control 41, the user causes a dismissal control 411, as shown in fig. 5, to be displayed around the hover ball control 41, and the user can implement the migration dismissal input by clicking the dismissal control 411.
In some embodiments of the present application, after migrating the picture 401 to the second system space through the hover ball control 41, if the user wants to cancel the migration of the picture 401, the user may perform a migration cancel input on the hover ball control 41.
In response to the migration undo input, the first object is moved out of the second system space from the first system space, step 1315.
In some embodiments of the present application, the picture 401 is moved out of the second system space to the first system space in response to a user making a migration undo input to the hover ball control 41.
After the first object is moved out of the second system space, the first object may be stored in the original position in the first system space according to the original path, or the first object may be moved out to a specific storage position in the first system space, where the specific storage position may be set according to the actual situation.
Through the mode, the user can quickly withdraw the objects migrated into the second system space by performing migration withdrawal input on the suspension ball control, the user does not need to open the second system space, and the operation is convenient.
In some embodiments of the present application, when a user browses a first system space, a plurality of objects that need to be migrated to a second system space may be found, and if each object is migrated separately, migration efficiency is low, so in order to improve migration efficiency, batch migration may be performed on a plurality of objects, that is, in order to implement batch migration, in case that it is determined that a used migration control is a suspension ball control, an object transfer window may also be used as a migration control used when performing object migration, where the object transfer window is used to aggregate the objects that need to be migrated and then uniformly migrate to the second system space. Based on this, the above step 130 may include the steps of:
Step 1321, in the case that the authentication result of the authentication is passing and the first input is a selection input to the first object in the first system space, adding the first object to the object relay window, and displaying the object relay window; or, in the case that the authentication result of the authentication is passing and the first input is a start input for starting the authentication of the user, displaying an object transfer window; in the event that a user selection input is received for a first object in the first system space, the first object is added to the object relay window.
Here, the hover ball control and the object relay window may be displayed in a hover over one interface in the first system space, where the interface may be any interface displayed in the first system space, including but not limited to any program interface in a desktop or any application program, and the hover ball control may be a spherical control displayed in a hover over one interface in the first system space, where no content may be displayed in the spherical control, and the object relay window may be a window displayed in a hover over one interface in the first system space, where no object is added to the object relay window, and the object relay window may be a blank window.
In some embodiments of the present application, the user may first select the first object to be migrated and then authenticate the user. If the user selects the first object, the first input may be the user selection input of the first object, so after receiving the first input of the user to the first system space, the first object to be migrated may be directly determined according to the first input, based on this, after the authentication of the user is completed and the authentication result is passed, the first object may be added to the object transfer window first, and then the object transfer window and the hover ball control are displayed, so that the displayed object transfer window directly includes the first object.
In other embodiments of the present application, the user may be authenticated first, and after the user passes the authentication, the user selects the first object to be migrated. If the user is authenticated first, the first input may be an authentication start input, so after the first input of the user to the first system space is received, the user is authenticated first, after the authentication of the user is completed and the authentication result is passed, the object transfer window and the suspension ball control are displayed, at this time, the object to be migrated is not selected, so that the object transfer window is a blank window, after the object transfer window is displayed, the user can select and input the first object to be migrated according to the actual requirement, and the selected first object is added into the object transfer window. Illustratively, the selection input herein may include, but is not limited to, a click input, or a voice command entered for a user, or a particular gesture entered for a user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the selection input may include: and the user drags the first object into the object transfer window to realize the selection input of the first object. The selection input may further include: the user moves the first object into the object transfer window by pressing the first object for a long time, so that the selection input of the first object is realized.
Step 1322, a user selection input for a second object in the first system space is received. Here, the selection input is used to select a second object that needs to be migrated into the second system space. The selection input may include, but is not limited to, a click input, or a voice command entered by the user, or a particular gesture entered by the user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the selection input may include: and the user drags the second object into the object transfer window to realize the selection input of the second object. The selection input may further include: and the user moves the first object into the object transfer window by pressing the second object for a long time, so that the selection input of the second object is realized.
In some embodiments of the present application, after the first object is added to the object transfer window, selection input may be continuously performed on other second objects that need to be migrated, so that the second object is added to the object transfer window, and thus, the first object and the second object may be migrated simultaneously through the object transfer window.
In some embodiments of the present application, the first object and the second object may belong to the same interface. For example, the first object and the second object belong to a first interface in the first system space, the user can browse the first interface, the hover ball control and the object transfer window are displayed in a hover mode on the first interface when browsing the first interface, and after the first object in the first interface is added to the object transfer window, the user can continue to perform selection input on the second object in the first interface and select the second object as an object to be migrated to the second system space.
In other embodiments of the present application, the first object and the second object may not belong to the same interface. For example, the first object belongs to a first interface in the first system space, the second object belongs to a second interface in the first system space, the user can browse the first interface first, when browsing the first interface, the hover ball control and the object transfer window are displayed in a hover mode on the first interface, after the first object in the first interface is added to the object transfer window, the user can switch the browsed interface to the second interface, after switching to the second interface, the hover ball control and the object transfer window are displayed in a hover mode on the second interface, at this time, the user can continue to select and input the second object in the second interface, and the second object is selected as an object needing to be migrated to the second system space.
In response to the selection input, a second object is added to the object relay window, step 1323.
In some embodiments of the present application, if the first object and the second object both belong to the album interface 60 of the album application as shown in fig. 6, the first object is a picture 601 therein, the second object is a picture 602 therein, and the hover ball control 61 and the object relay window 62 are displayed in a hovering manner on the album interface 60, after the picture 601 is added to the object relay window 62, the user may continue to perform selection input on the picture 602, and in response to selection input on the picture 602, the picture 602 is also added to the object relay window 62.
At step 1324, a transfer input is received from a user to move the object transfer window to a display area associated with the hover ball control.
Here, the transition input is used to control the movement of the object relay window to the display area associated with the hover ball control, and the transition input may include, but is not limited to: click input, or voice command input by the user, or specific gesture input by the user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the transfer input may be: the user realizes the transfer input of the object transfer window 62 by dragging the object transfer window 62 into the display area associated with the hover ball control 61. The transfer input may also be: the user moves the object relay window 62 into the display area associated with the hover ball control 61 by double clicking the object relay window 62, thereby realizing transfer input to the object relay window 62.
In some embodiments of the present application, as shown in fig. 6, after both the picture 601 and the picture 602 are added to the object relay window 62, the user may perform a conversion input on the object relay window 62, and move the object relay window 62 into the associated display area of the hover ball control 61.
In some embodiments of the present application, the display area associated with the hover ball control may include an area surrounding the hover ball control.
In response to the transfer input, the first object and the second object in the object relay window are migrated to the second system space, step 1325.
In some embodiments of the present application, as long as a transfer input that a user moves an object transfer window to a display area associated with a hover ball control is received, the terminal may be controlled to respond to the transfer input to transfer all objects in the object transfer window to a second system space, without requiring the user to perform other additional interactive operations.
In some embodiments of the present application, as shown in fig. 6, in response to a user entering a transfer input of the object relay window 62, both the picture 601 and the picture 602 are migrated to the second system space.
Through the mode, a plurality of objects can be migrated into the second system space at the same time, migration efficiency is improved, and user operation is more convenient.
After displaying the hover ball control, the following steps may be performed:
receiving a fourth input to the hover ball control;
in response to the fourth input, authenticating the user;
and displaying a privacy suspension window under the condition that the authentication result of the identity authentication is passed, wherein the privacy suspension window comprises a system interface of the second system space.
In some embodiments of the present application, the hover ball control may have a function of opening a privacy hover window, where the fourth input is an initiation input for opening the privacy hover window, including but not limited to a click input of the hover ball control by a user through a touch device such as a finger or a stylus, or a voice command input by the user for initiating the privacy hover window, or a specific gesture input by the user, or other feasibility inputs, which may be specifically determined according to practical use requirements, and embodiments of the present invention are not limited. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input.
The privacy suspension window comprises a system interface of the second system space, so that information security is ensured in order to avoid information leakage in the second system space, identity verification is performed on a user before the privacy suspension window is opened and started, and the privacy suspension window is displayed again under the condition that the result of the identity verification is passed.
In some embodiments of the present application, when the user presses the hover ball control for a long time, the user may be authenticated, and in the case that the user passes the authentication, a privacy hover window is displayed.
In other examples, as shown in fig. 7, a hover ball control 71 is displayed in a hover over the album interface 70 in the first system space, and when the user clicks the hover ball control 71, an "open space" control 711 for indicating that the second system space is open may be displayed around the hover ball control 71, and when the user clicks the "open space" control 711, the user may be authenticated, and in the case that the user passes the authentication, a privacy hover window may be displayed.
The identity verification method for the user is the same as that used in step 120, and will not be repeated here.
Through the mode, the user can quickly look up the content in the second system space through the privacy suspension window by only carrying out third input on the suspension ball control, the second system space is not required to be switched from the first system space, and in addition, the content in the second system space can be prevented from being revealed through identity verification on the user.
After displaying the hover ball control, the following steps may also be performed:
monitoring whether the suspension ball control receives touch input of a user;
and closing the suspension ball control under the condition that the suspension ball control does not receive any touch input of the user within the first time period.
The first time length can be set according to actual conditions, and the value range of the first time length is 1-30 minutes.
In some embodiments of the present application, under the condition that the suspension ball control is displayed in the first system space, the suspension ball control may be monitored synchronously in the display process of the suspension ball control through a monitoring process of the terminal background, so as to determine whether touch input of the suspension ball control by a user is received, when it is determined that any touch operation of the suspension ball control by the user is not received in the first time period through the monitoring process, it may be considered that the suspension ball control is not required to be used currently, at this time, the suspension ball control may be controlled to be closed by the terminal, so that page shielding and space occupation caused by the suspension ball control are reduced.
In some embodiments of the present application, in the case where the determined transition control is a privacy hover window, the step 130 may include the following steps:
In step 1331, a privacy floating window is displayed in the event that the user is authenticated.
Similar to the manner of performing object migration by using the hover ball control, when the privacy hover window is used for performing object migration, the privacy hover window may also be displayed in a hover manner on an interface displayed in the first system space. The first interface displayed in the first system space may be any one of the interfaces in the first system space, including but not limited to any one of a desktop or an application, and the privacy floating window may be a window floating on one of the interfaces displayed in the first system space, the privacy floating window including the system interface of the second system space.
In some embodiments of the present application, the privacy hover window 81 may hover over the album interface 80 as the user browses the album interface 80 of the album application in the first system space as shown in FIG. 8.
Step 1332 receives a transfer input from a user to move a first object in a first system space into a privacy hover window.
Here, the transfer input is used to move the first object into the privacy floating window, and the transfer input may include, but is not limited to, click input of the user on the first object through a touch device such as a finger or a stylus, or a voice command input by the user, or a specific gesture input by the user, or other feasibility inputs, which may be specifically determined according to actual use requirements, and embodiments of the present invention are not limited. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the transfer input may be: the user presses the first object long and moves the first object into the privacy floating window. The transfer input may also be: the user double clicks on the first object, moving the first object into the privacy floating window.
In some embodiments of the present application, as shown in fig. 8, when the picture 801 is the first object that the user wants to migrate, the user may make a transfer input to the picture 801, so as to move the picture 801 into the privacy hover window 81.
Step 1333, responsive to the transfer input, migrates the first object to the second system space.
In some embodiments of the present application, as long as a transfer input that a user moves a first object into a privacy floating window is received, the terminal may be controlled to respond to the transfer input to migrate the first object into a second system space, without requiring the user to perform other additional interactive operations.
In some embodiments of the present application, as shown in fig. 8, a picture 801 is migrated from a first system space to a second system space in response to a user input by a transfer of the picture 801.
Through the mode, the user can migrate the first object into the second system space only by simply transferring and inputting the first object, the operation is simple, and in addition, the user can quickly view the content in the second system space through the privacy floating window in the first system space due to the fact that the privacy floating window comprises the system interface of the second system space.
In some embodiments of the present application, when a user browses a first system space, multiple objects that need to be migrated to a second system space may be found, and in order to improve migration efficiency, in a case that it is determined that a used migration control is a privacy suspension window, an object transfer window may also be used as a migration control used when performing object migration, where the object transfer window is used to aggregate objects that need to be migrated and then uniformly migrate to the second system space. Based on this, the above step 130 may include the steps of:
step 1341, adding the first object to the object transfer window and displaying the object transfer window when the authentication result of the identity authentication is passing and the first input is a selection input of the first object in the first system space; or, in the case that the authentication result of the authentication is passing and the first input is a start input for starting the authentication of the user, displaying an object transfer window; and adding the first object to an object transfer window under the condition that selection input of the user on the first object in the first system space is received.
Here, the privacy suspension window and the object relay window may be displayed in suspension on one interface in the first system space, the interface may be any one interface displayed in the first system space, any one interface may include, but is not limited to, any one program interface in a desktop or any application program, the privacy suspension window may be, for example, a spherical control displayed in suspension on one interface in the first system space, no content may be displayed in the spherical control, and the object relay window may be, for example, a window displayed in suspension on one interface in the first system space, and the object relay window may be a blank window when no object is added to the object relay window.
In some embodiments of the present application, the first object to be migrated may be selected first, and then the user may be authenticated. If the first object is selected first, the first input may be a selection input for the first object, so that after the first input is received, the first object to be migrated can be directly determined according to the first input, based on the first input, after the authentication of the user is completed and the authentication result is passed, the first object may be added into the object transfer window first, and then the object transfer window and the privacy suspension window are displayed, so that the displayed object transfer window directly contains the first object.
In other embodiments of the present application, the user may be authenticated first, and then the first object to be migrated may be selected. If the authentication is performed first, the first input may be a start input for starting the authentication, so after the first input is received, the authentication is performed on the user first, after the authentication on the user is completed and the authentication result is passed, the object transfer window and the privacy suspension window are displayed, at this time, the object transfer window is a blank window because the object to be migrated is not selected yet, after the object transfer window is displayed, the user can perform selection input on the first object to be migrated according to the actual requirement, and therefore the selected first object is added into the object transfer window. Illustratively, the selection input herein may include, but is not limited to, a click input, or a voice command entered for a user, or a particular gesture entered for a user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the selection input may include: and the user drags the first object into the object transfer window to realize the selection input of the first object. The selection input may further include: the user moves the first object into the object transfer window by pressing the first object for a long time, so that the selection input of the first object is realized.
At step 1342, a user selection input is received for a second object in the first system space.
Here, the selection input is used to select a second object that needs to be migrated into the second system space. The selection input may include, but is not limited to, a click input, or a voice command entered by the user, or a particular gesture entered by the user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the selection input may include: and the user drags the second object into the object transfer window to realize the selection input of the second object. The selection input may further include: and the user moves the second object into the object transfer window by pressing the second object for a long time, so that the selection input of the second object is realized.
In some embodiments of the present application, after the first object is added to the object transfer window, selection input may be continuously performed on other second objects that need to be migrated, so that the second object is added to the object transfer window, and thus, the first object and the second object may be migrated simultaneously through the object transfer window.
In some embodiments of the present application, the first object and the second object may belong to the same interface. For example, the first object and the second object belong to a first interface in the first system space, the user can browse the first interface, when browsing the first interface, the privacy suspension window and the object transfer window are displayed in suspension on the first interface, after the first object in the first interface is added to the object transfer window, the user can continue to perform selection input on the second object in the first interface, and select the second object as an object to be migrated to the second system space.
In other embodiments of the present application, the first object and the second object may not belong to the same interface. For example, the first object belongs to a first interface in the first system space, the second object belongs to a second interface in the first system space, and when the first interface is browsed, the privacy floating window and the object transfer window are displayed in a floating mode on the first interface, after the first object in the first interface is added to the object transfer window, the user can switch the browsed interface to the second interface, after the first object is switched to the second interface, the privacy floating window and the object transfer window are displayed in a floating mode on the second interface, at this time, the user can continue to select and input the second object in the second interface, and the second object is selected as an object to be migrated to the second system space.
In response to the selection input, a second object is added to the object relay window, step 1343.
In some embodiments of the present application, if the first object and the second object both belong to the album interface 90 as shown in fig. 9, the first object is the picture 901 therein, the second object is the picture 902 therein, and the privacy floating window 91 and the object relay window 92 are displayed in a floating manner on the album interface 90, after the picture 901 is added to the object relay window 92, the user may further perform selection input on the picture 902, so that the picture 902 is also added to the object relay window 92.
At step 1344, a transfer input is received that the user moves the object transfer window into the privacy hover window.
Here, the transfer input is used to control the object relay window to move into the privacy hover window. Transfer inputs may include, but are not limited to: click input, or voice command input by the user, or specific gesture input by the user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the transfer input may be: and the user drags the object transfer window into a display area associated with the suspension ball control to realize transfer input of the object transfer window. The transfer input may also be: and dragging the object transfer window to a display area associated with the floating ball control by double-clicking the object transfer window by a user, so that transfer input of the object transfer window is realized.
The display area associated with the privacy floating window may include an area surrounding the privacy floating window.
In some embodiments of the present application, as shown in fig. 9, after both the picture 901 and the picture 902 are added to the object relay window 92, the user can move the object relay window 92 into the privacy hover window 91 by making a transfer input to the object relay window 92.
In response to the transfer input, all objects in the object relay window are migrated to the second system space, step 1345.
In some embodiments of the present application, as shown in fig. 9, the pictures 901 and 902 are all migrated to the second system space in response to the user moving the object relay window 92 into the privacy hover window 91 through the transfer input.
In some embodiments of the present application, after the objects in the object transfer window are migrated into the second system space, the migrated objects may be deleted from the object transfer window, so that after all the objects in the object transfer window are migrated into the second system space, the object transfer window is updated to a blank window without any objects to be migrated.
In some embodiments of the present application, as shown in fig. 10, after all of the pictures 901 and 902 are migrated to the second system space, the object relay window 92 is updated to a blank window without any objects to be migrated.
Through the mode, a plurality of objects can be migrated into the second system space at the same time, migration efficiency is improved, and user operation is more convenient.
After displaying the privacy floating window, the following steps may also be performed:
at step 1346, a second input from the user to the privacy floating window is received.
In some embodiments of the present application, the privacy floating window has a function of displaying a history object migration record of the second system space, and the second input is used for controlling the terminal to display the history object migration record of the second system space, where an input manner of the second input includes, but is not limited to: click input, or voice command input by the user, or specific gesture input by the user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the second input may be: a user's long press input to the privacy hover window. The second input may also be: the user inputs a click on a control for implementing the immigrating function in the privacy floating window.
In some embodiments of the present application, as illustrated in fig. 9, after both the pictures 901 and 902 are migrated to the second system space, the user may view the migration operation records corresponding to the pictures 901 and 902 by clicking on the "migration record" control 911 for implementing the history migration record display function therein.
In response to the second input, a historical object migration record for the second system space is displayed, the object migration record including at least one migration operation record for migration of the object of the first system space to the second system space, step 1347.
In some embodiments of the present application, in response to a second input from the user to the privacy floating window, a history object migration record in a second duration may be displayed in the privacy floating window, where the second duration may be set according to an actual situation, and a value range of the second duration is between 5 minutes and 60 minutes.
In some embodiments of the present application, as shown in fig. 10, after a user migrates a picture 901 and a picture 902 to a second system space, if the user clicks the "migration record" control 911, a history object migration record 912 shown in fig. 10 may be displayed in the privacy suspension window 91, where the history object migration record includes migration operation records corresponding to each of the picture 901 and the picture 902, and the preset time may be set to 2 minutes or longer, and may be set according to the usage habit of the user.
At step 1348, a third input is received for one of the historical object migration records.
Here, the third input is for selecting an object to be migrated from the second system space, and may include, but is not limited to: click input, or voice command input by the user, or specific gesture input by the user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the third input may be: the user inputs a single click of the migration operation record corresponding to the object to be migrated. The second input may also be: and inputting the long-press input of the migration operation record corresponding to the object to be migrated by the user.
In some embodiments of the present application, as shown in fig. 10, when the user needs to migrate the picture 902 from the second system space, a third input may be made to the migration operation record of the picture 902 in the historical object migration record 912.
In step 1349, in response to the third input, the object corresponding to the migration operation record selected by the third input is moved out of the second system space to the first system space.
In some embodiments of the present application, as long as a third input of the migration operation record in the historical object migration record by the user is received, the terminal may be controlled to respond to the third input, and migrate the object corresponding to the migration operation record selected by the user from the second system space to the first system space, without performing other additional interactive operations by the user.
In some embodiments of the present application, the image 902 is migrated from the second system space to the first system space in response to a third input by the user of the migration operation of the image 902.
After the object is moved out of the second system space, the object may be stored in the original position in the first system space according to the original path, or the object may be moved out to a specific storage position in the first system space, where the specific storage position may be set according to the actual situation.
Through the mode, the user can quickly move the object which is migrated into the second system space out of the first system space through the privacy suspension window in the first system space, the first system space is not required to be switched to the second system space, and the operation is convenient.
In addition, the privacy suspension window may include a system interface in the second system space, so in order to avoid information disclosure in the second system space, after the privacy suspension window is displayed, a user without the use authority of the second system space may be further prevented from peeping the content in the privacy suspension window by a security peeping prevention policy, and specifically, after the privacy suspension window is displayed, the following steps may be further performed:
in step 13410, face recognition is performed on the environmental image acquired by the camera.
In some embodiments of the present application, when a privacy suspension window is displayed in the first system space, an environmental image of a surrounding environment of the terminal may be acquired in real time by using a front camera in the terminal, and each face in the environmental image is respectively identified, so as to determine whether the environmental image includes a face of a user who does not have the use authority of the second system space. The face recognition method is the same as the user authentication method in step 120, and is not repeated here.
In step 13411, when the face recognition result indicates that the environment image includes the face of the user who does not have the right to use the second system space, the privacy suspension window is hidden.
When the face of the user without the second system space use right is determined to be contained in the environment image through face recognition, the risk of peeping is determined to exist, and in order to avoid information leakage in the second system space, the privacy suspending window is hidden.
In some embodiments of the present application, to ensure that object migration may also be performed in the case of a human peeping, hiding the privacy floating window may include: and switching the hidden privacy floating window into a floating ball control.
By the mode, second system space information leakage caused by peeping by people can be effectively avoided.
In some embodiments of the present application, in a case where it is determined that the used transition control is the object selection control, the step 130 may include the following steps:
step 1351, displaying an object selection control to cause the object selection control to frame the first object if the authentication result of the authentication is passing and the first input is a selection input to the first object in the first system space; or, in the case that the authentication result of the authentication is passing and the first input is a start input for starting the authentication of the user, displaying an object selection control; and under the condition that the dragging input and the resizing input of the user to the object selection control are received, updating the display position and the display size of the object selection control so that the object selection control frames the first object.
Here, the object selection control may be displayed in suspension on an interface in the first system space, and the interface may be any interface displayed in the first system space, for example, any interface may include, but is not limited to, any program interface in a desktop or any application program, and the object selection control may be a frame with adjustable display size and display position. The object is migrated to the second system space when the object is selected by the object selection control box. Wherein the box selection refers to the object being displayed within the object selection control.
In some embodiments of the present application, the user may first select the first object to be migrated, and then perform authentication on the user. If the user selects the first object first, the first input may be a selection input of the user to the first object, so after receiving the first input of the user to the first system space, the first object to be migrated may be directly determined according to the first input, based on this, after the authentication of the user is completed and the authentication result is passed, when the object selection control is displayed, the display size and the display position of the object selection control may be directly set to be capable of selecting the first object in a frame, that is, the first object is displayed in the object selection control.
In other embodiments of the present application, the user may be authenticated first, and after the user passes the authentication, the user selects the first object to be migrated. If the user is authenticated first, the first input may be an authentication start input, so after the first input of the user to the first system space is received, the user is authenticated first, after the authentication of the user is completed and the authentication result is passed, the object to be migrated is not selected at this time, so that the object selection control with the default size may be displayed at the default position, and after the object selection control is displayed, the user may perform adjustment input on the object selection control according to the actual requirement, so that the object selection control may frame the first object. Illustratively, the adjustment input herein may include, but is not limited to, a click input, or a voice command entered for the user, or a particular gesture entered for the user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the adjustment input may include: and the user drags the object selection control to adjust the display position of the object selection control. The adjustment input may further include: the user selects the corner or the border of the control by dragging the object to adjust at least one of the following: the display size, the display position. The adjustment input may further include: the user modifies the corresponding size value by clicking the corner or the border of the object selection control, thereby realizing the adjustment of the size of the object selection control.
At step 1352, a user's migration control input to the object selection control is received.
Here, the migration control input is used to migrate the object framed by the object selection control to the second system space, and the migration control input may include, but is not limited to: the click input, the voice command input by the user, the specific gesture input by the user, or other feasibility inputs can be specifically determined according to actual use requirements, and the embodiment of the invention is not limited. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the migration control input may be: the user presses the object selection control long. The migration control input may also be: the user double clicks on the object selection control. The migration control input may also be: the user clicks a control for indicating migration of the object in the object selection control.
In some embodiments of the present application, when a user browses the album interface 110 of the album application as shown in fig. 11, the object selection control 111 is displayed in a floating manner on the album interface 110, as shown in fig. 11, the picture 1101 is displayed as a first object in the object selection control 111, the object selection control 111 includes a first control 1111, the first control 1111 is used for indicating that the object selected by the object selection control 111 frame is determined to be migrated to the second system space, and when the user determines to migrate the picture 1101 in the object selection control 111 to the second system space, the user may click on the first control 1111.
At step 1353, all objects framed by the object selection control are migrated to the second system space in response to the migration control input.
In some embodiments of the present application, as long as a migration control input of a user to the object selection control is received, the terminal may be controlled to respond to the migration control input, and all objects selected by the object selection control in a frame are migrated to the second system space, without requiring the user to perform other additional interactive operations.
In some embodiments of the present application, as shown in fig. 11, after the object selection control 111 boxes the picture 1101, the picture 1101 is migrated to the second system space in response to the user clicking on the first control 1111.
By the method, the first object can be quickly migrated into the second system space.
In addition, the object selection control may also have a deselect function, wherein the deselect function is used to deselect the object selection control from the box of the already box-selected object. Based on this, after the object selection control boxes the object, the method may further include the following steps:
s1354, receiving a cancel selection input of the object selection control.
Here, the deselect input is to dismiss the object selection control from the framed object, and the deselect input may include, but is not limited to: the click input, the voice command input by the user, the specific gesture input by the user, or other feasibility inputs can be specifically determined according to actual use requirements, and the embodiment of the invention is not limited. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the deselect input may be: the user presses the object selection control long. The deselect input may also be: the user double clicks on the object selection control. The deselect input may also be: the user clicks a control of the object selection controls for indicating the revocation of the selection of the object.
In some embodiments of the present application, as shown in fig. 11, the object selection control 111 further includes a second control 1112, where the second control 1112 is used to indicate that the box selection of the object that has been framed by the object selection control 111 is to be withdrawn, and in the case that the picture 1101 is selected by the object selection control 111 box, if the user wants to withdraw the box selection of the picture 1101 by the object selection control 111, the second control 1112 may be clicked.
S1355, in response to the cancel selection input, the object selection control cancels the box selection of the box-selected object.
In some embodiments of the present application, as soon as a user's selection input to the object selection control is received, the terminal may be controlled to respond to the selection input to cancel the selection of all the objects that have been selected by the object selection control, i.e. all the objects displayed in the object selection control are no longer displayed in the object selection control.
In some embodiments of the present application, as shown in fig. 11, responsive to a user clicking on second control 1112, the selection of the frame of picture 1101 by object selection control 111 is dismissed, causing picture 1101 to no longer be displayed within object selection control 111.
Through the mode, the user can cancel the selected objects, so that the migration objects can be conveniently switched.
In addition, in the case that the object selection control boxes the first object, the following steps may also be performed:
at step 1356, a preview input is received for the object selection control.
In some embodiments of the present application, the object selection control also has a function for previewing the framed object, and the preview input is used for previewing the object framed by the object selection control. Illustratively, the preview input may include, but is not limited to: click input, or voice command input by the user, or specific gesture input by the user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the preview input may include: double-click input by the user to the object selection control. The preview input may further include: a long press input of the object selection control by the user. The preview input may further include: and clicking and inputting the control for previewing the frame selected object in the object selection controls by the user.
In some embodiments of the present application, as shown in fig. 11, the object selection control 111 may further include a third control 1113, where the third control 1113 is used to preview an object framed by the object selection control 111, and when the user needs to preview the object framed by the object selection control 111, the third control 1113 may be clicked.
In response to the preview input, a preview window is displayed including preview information for the first object in step 1357.
In some embodiments of the present application, in response to a user's preview input to an object selection control, a preview window is displayed within the object selection control, the preview window containing preview information for all objects framed by the object selection control. Wherein the preview information can include attribute information, text content, etc. of the object, and the attribute information can include, but is not limited to, size, color, etc
In some embodiments of the present application, as shown in fig. 11, in the case where the object selection control 111 frames the picture 1101, after the user clicks the third control 1113, a preview window may be displayed, and preview information of the picture 1101 is included in the preview window.
At step 1358, edit input for preview information is received.
In some embodiments of the present application, the object selection control further has a function for editing the framed object, and the editing input is used for editing the framed object of the object selection control. Illustratively, editing inputs may include, but are not limited to: click input, or voice command input by the user, or specific gesture input by the user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, editing input may include: the user double-clicks input of preview information. Editing input may also include: and long-press input of preview information by a user.
In response to the edit input, the preview information is edited, step 1359.
In some embodiments of the present embodiment, in response to an editing input of the preview information by the user, an editing tool may be displayed, through which the user may edit the preview information, where the editing tool may include, but is not limited to, a control for adding content, a control for deleting content, a control for adjusting a size, a control for adjusting a color, and the like. The user can select the corresponding control from the editing tool according to the actual situation to edit the preview information.
By the method, the preview information of the object can be edited, so that the object to be migrated can be edited, and the object migrated to the second system space meets the requirements of users.
In addition, there may be multiple objects that need to be migrated to the second system space in the same interface, if each object is migrated separately, migration efficiency is low, and in order to improve migration efficiency, before receiving a migration control input of a user to an object selection control, the following steps may be further executed:
at step 13510, a user resize input to the object selection control is received.
Here, the resizing input is used to resize the display size of the object selection control, and the resizing input may include, but is not limited to, a click input, or a voice command entered for a user, or a particular gesture entered for a user, or other feasibility input, etc. The specific gesture in the embodiment of the application may be any one of a single-click gesture, a sliding gesture, a dragging gesture, a pressure recognition gesture, a long-press gesture, an area change gesture, a double-press gesture and a double-click gesture; the click input in the embodiment of the application may be single click input, double click input, or any number of click inputs, and may also be long press input or short press input. For example, the sizing input may include: and the user adjusts the size of the object selection control by dragging the corner or the border of the object selection control. The resizing input may also include: the user modifies the corresponding size value by clicking the corner or the border of the object selection control, thereby realizing the adjustment of the size of the object selection control.
In response to the resizing input, the display size of the object selection control is increased, step 13511, such that the object selection control frames a second object in the first system space.
In some embodiments of the present application, in response to a user's size adjustment input to an object selection space, a display size of an object selection control is adjusted, so that the object selection control continues to frame a second object on the basis of frame-selecting a first object, and after receiving a user's migration control input to the object selection control, the first object and the second object may be migrated to a second system space at the same time.
In some embodiments of the present application, in the case where the object selection control 111 has framed the picture 1101, the user may frame the picture 1102 as a second object by making a resizing input to the object selection control 111, so that when the user clicks the first control 1111, the picture 1101 and the picture 1102 may be migrated to the second system space simultaneously.
Through the mode, a user can transfer a plurality of objects to the second system space at the same time by simply adjusting the size of the object selection control, so that the transfer efficiency is high, and the operation is convenient.
According to the privacy protection method provided by the embodiment of the application, the related operation flow of the user on the migration of the object in the process of browsing the first system space is greatly simplified, the user can realize the convenient interaction between the first system space and the second system space without being interrupted, the privacy use scene is expanded, and the safety is enhanced.
According to the privacy protection method provided by the embodiment of the application, the execution subject can be a terminal. In the embodiment of the present application, a method for performing privacy protection by a terminal is taken as an example, and the terminal provided in the embodiment of the present application is described.
Referring to fig. 13, which is a schematic diagram of a terminal provided in this embodiment, as shown in fig. 13, the terminal 1300 may include the following modules:
a receiving module 1301, configured to receive a first input of a user to a first system space;
a verification module 1302 for authenticating a user in response to a first input;
the processing module 1303 is configured to migrate the first object to the second system space when the authentication result of the authentication is that the authentication result is passed and the transfer input of the user to the transfer control and the first object is received;
the system comprises a first system space, a second system space, a privacy system and a user authentication system, wherein the use authority of the first system space is a user operating the first system space, the second system space is a space of the privacy system, and the use authority of the second system space is a user of which the user identity information is matched with the identity authentication information.
According to the terminal provided by the embodiment of the application, the first input of the user to the first system space is received, the user is subjected to identity verification in response to the first input, and the first object is migrated to the second system space under the condition that the verification result of the identity verification is that the transfer control and the transfer input of the first object are passed and received, wherein the use permission of the first system space is the user for operating the first system space, the second system space is the space of the privacy system, and the use permission of the second system space is the user with the identity information matched with the identity verification information. According to the embodiment, the first object can be quickly migrated to the second system space in the first system space, and the migration is performed after the first system space is switched to the second system space, so that the problem of complex privacy content migration operation is solved.
In some embodiments, the first input is a selection input to a first object in the first system space, or the first input is a start input for starting user authentication.
In some embodiments, the transfer control comprises a hover ball control;
the processing module 1303 is specifically configured to:
displaying the suspension ball control when the authentication result of the identity authentication is passed;
receiving a transfer input of a user for moving a first object in a first system space to a display area associated with a hover ball control;
in response to the transfer input, the first object is migrated to the second system space.
In some embodiments, the processing module 1303 is further configured to:
after the first object is migrated to the second system space, receiving migration cancel input of a user to the suspension ball control;
in response to the migration revocation input, the first object is moved out of the second system space to the first system space.
In some embodiments, the transfer controls include a hover ball control and an object transfer window;
the processing module 1303 is specifically configured to:
if the authentication result of the authentication is passing and the first input is a selection input of the first object in the first system space, adding the first object to the object transfer window and displaying the object transfer window;
Or, in the case that the authentication result of the authentication is passing and the first input is a start input for starting the authentication of the user, displaying an object transfer window; adding the first object to the object relay window under the condition that selection input of the user on the first object in the first system space is received;
receiving a user selection input of a second object in the first system space;
responsive to the selection input, adding the second object to the object relay window;
receiving transfer input of a user for moving an object transfer window to a display area associated with a suspension ball control;
in response to the transfer input, the first object and the second object in the object transfer window are migrated to the second system space.
In some embodiments, the transfer control includes a privacy hover window that includes a system interface of the second system space;
the processing module 1303 is specifically configured to:
displaying a privacy floating window under the condition that a user passes identity verification;
receiving a transfer input of a user to move a first object in a first system space into a privacy floating window;
in response to the transfer input, the first object is migrated to the second system space.
In some embodiments, the transfer control includes an object relay window and a privacy hover window, the privacy hover window including a system interface of the second system space;
The processing module 1303 is specifically configured to:
if the authentication result of the authentication is passing and the first input is a selection input of the first object in the first system space, adding the first object to the object transfer window and displaying the object transfer window;
or, in the case that the authentication result of the authentication is passing and the first input is a start input for starting the authentication of the user, displaying an object transfer window; adding the first object to the object relay window under the condition that selection input of the user on the first object in the first system space is received;
receiving a user selection input of a second object in the first system space;
responsive to the selection input, adding the second object to the object relay window;
receiving transfer input of a user for moving an object transfer window into a privacy floating window;
in response to the transfer input, all objects in the object transfer window are migrated to the second system space.
In some embodiments, the transfer control comprises an object selection control;
the processing module 1303 is specifically configured to:
displaying an object selection control to cause the object selection control to frame the first object if the authentication result of the authentication is pass and the first input is a selection input to the first object in the first system space;
Or, in the case that the authentication result of the authentication is passing and the first input is a start input for starting the authentication of the user, displaying an object selection control; under the condition that drag input and size adjustment input of a user on the object selection control are received, updating the display position and the display size of the object selection control so that the object selection control frames a first object;
receiving migration control input of a user on an object selection control;
in response to the migration control input, all objects framed by the object selection control are migrated to the second system space.
In some embodiments, the processing module 1303 is further configured to:
before receiving migration control input of a user on an object selection control, receiving size adjustment input of the user on the object selection control;
in response to the resizing input, the display size of the object selection control is increased such that the object selection control boxes a second object in the first system space.
In some embodiments, the processing module 1303 is further configured to:
after the privacy floating window is displayed, receiving a second input of the user to the privacy floating window;
responsive to the second input, displaying a historical object migration record for the second system space, the object migration record including a migration operation record for migration of at least one object of the first system space to the second system space;
Receiving a third input of one of the historical object migration records;
and responding to the third input, and moving the object corresponding to the migration operation record selected by the third input out of the second system space to the first system space.
In some embodiments, the processing module 1303 is further configured to:
after the privacy suspension window is displayed, face recognition is carried out on the environment image acquired by the camera;
and hiding the privacy suspension window when the face recognition result indicates that the environment image contains the face of the user without the use permission of the second system space.
In some embodiments, the verification module 1302 is specifically configured to:
collecting face images of a user;
extracting biological characteristics of a user from the face image;
under the condition that the biological characteristics are matched with the prestored biological characteristics, judging that the verification result of the identity verification is passing;
in the case that the biometric characteristic does not match the pre-stored biometric characteristic, it is determined that the authentication result of the authentication is not passed.
In some embodiments, the first object comprises at least one of: files, application icons, program interfaces, controls.
The terminal provided by the embodiment of the application greatly simplifies the related operation flow of the user for the migration of the object in the process of using the first system space, and the user can realize the convenient interaction between the first system space and the second system space without being interrupted, so that the privacy use scene is expanded, and the safety is enhanced.
The terminal in the embodiment of the application may be an electronic device, or may be a component in an electronic device, for example, an integrated circuit or a chip. The electronic device may be a terminal, or may be other devices than a terminal. By way of example, the electronic device may be a mobile phone, tablet computer, notebook computer, palm computer, vehicle-mounted electronic device, mobile internet appliance (Mobile Internet Device, MID), augmented reality (augmented reality, AR)/Virtual Reality (VR) device, robot, wearable device, ultra-mobile personal computer, UMPC, netbook or personal digital assistant (personal digital assistant, PDA), etc., but may also be a server, network attached storage (Network Attached Storage, NAS), personal computer (personal computer, PC), television (TV), teller machine or self-service machine, etc., and the embodiments of the present application are not limited in particular.
The privacy preserving apparatus in the embodiment of the present application may be an apparatus having an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of the present application.
The privacy protection apparatus provided in this embodiment of the present application can implement each process implemented by the method embodiments of fig. 1 to 12, and in order to avoid repetition, a description is omitted here.
Optionally, as shown in fig. 14, the embodiment of the present application further provides an electronic device 1400, including a processor 1401 and a memory 1402, where the memory 1402 stores a program or an instruction that can be executed on the processor 1401, and the program or the instruction implement each step of the embodiment of the privacy securing method when executed by the processor 1401, and achieve the same technical effects, so that repetition is avoided and no further description is given here.
The electronic device in the embodiment of the application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 15 is a schematic hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 1500 includes, but is not limited to: radio frequency unit 1501, network module 1502, audio output unit 1503, input unit 1504, sensor 1505, display unit 1506, user input unit 1507, interface unit 1508, memory 1509, and processor 1510.
Those skilled in the art will appreciate that the electronic device 1500 may also include a power source (e.g., a battery) for powering the various components, which may be logically connected to the processor 1510 via a power management system so as to perform functions such as managing charging, discharging, and power consumption via the power management system. The electronic device structure shown in fig. 15 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown in the drawings, or may combine some components, or may be arranged in different components, which will not be described in detail herein.
Wherein, the user input unit 1507 is configured to receive a first input of a first system space from a user;
a processor 1510 for authenticating a user in response to a first input;
a user input unit 1507 for receiving a user's transfer input to the transfer control and the first object;
the processor 1510 is further configured to migrate the first object to the second system space if the authentication result of the authentication is passing and a transfer input of the transfer control and the first object by the user is received.
According to the electronic equipment provided by the embodiment of the application, the first input of the user to the first system space is received, the user is subjected to identity verification in response to the first input, and the first object is migrated to the second system space under the condition that the verification result of the identity verification is that the transfer control and the transfer input of the first object are passed and received, wherein the use permission of the first system space is the user for operating the first system space, the second system space is the space of the privacy system, and the use permission of the second system space is the user with the identity information matched with the identity verification information. According to the embodiment, the first object can be quickly migrated to the second system space in the first system space, and the migration is performed after the first system space is switched to the second system space, so that the problem of complex privacy content migration operation is solved.
Optionally, the display unit 1506 is configured to display a suspension ball control if the authentication result of the identity authentication is passed;
a user input unit 1507 for receiving a transfer input from a user to move a first object in the first system space to a display region associated with the hover ball control;
the processor 1510 is further configured to migrate the first object to the second system space in response to the transfer input.
Optionally, the user input unit 1507 is further configured to receive a migration cancel input of the user to the hover ball control after migrating the first object to the second system space;
the processor 1510 is further configured to move the first object out of the second system space to the first system space in response to the migration revocation input.
Optionally, the processor 1510 is further configured to add the first object to the object relay window if the authentication result of the authentication is passing and the first input is a selection input of the first object in the first system space, or add the first object to the object relay window if a selection input of the first object in the first system space by the user is received;
the display unit 1506 is further configured to display an object relay window if the authentication result of the authentication is passing and the first input is a selection input to the first object in the first system space;
A user input unit 1507 for receiving a user selection input of a second object in the first system space;
the processor 1510 is further configured to add a second object to the object relay window in response to the selection input;
the user input unit 1507 is further configured to receive a transfer input that a user moves the object transfer window to a display area associated with the hover ball control;
the processor 1510 is further configured to migrate the first object and the second object in the object relay window to the second system space in response to the transfer input.
Optionally, the display unit 1506 is further configured to display a privacy floating window if the user passes the authentication;
a user input unit 1507 for receiving a transfer input from a user to move a first object in a first system space into a privacy hover window;
the processor 1510 is further configured to migrate the first object to the second system space in response to the transfer input.
Optionally, the processor 1510 is further configured to add the first object to the object relay window if the authentication result of the authentication is passing and the first input is a selection input of the first object in the first system space, or add the first object to the object relay window if a selection input of the first object in the first system space by the user is received;
The display unit 1506 is further configured to display an object transfer window if the authentication result of the authentication is passing and the first input is a start input for starting the authentication of the user;
a user input unit 1507 for receiving a user selection input of a second object in the first system space;
the processor 1510 is further configured to add a second object to the object relay window in response to the selection input;
a user input unit 1507 for receiving a transfer input from a user to move the object transfer window into the privacy hover window;
the processor 1510 is further configured to migrate all objects in the object relay window to the second system space in response to the transfer input.
Optionally, the display unit 1506 is further configured to display an object selection control, so that the object selection control boxes the first object, when the authentication result of the identity authentication is passing and the first input is a selection input to the first object in the first system space;
or, in the case that the authentication result of the authentication is passing and the first input is a start input for starting the authentication of the user, displaying an object selection control;
the processor 1510 is further configured to update a display position and a display size of the object selection control to cause the object selection control to frame the first object if a drag input and a resizing input of the object selection control by the user are received;
A user input unit 1507 for receiving a migration control input of the user to the object selection control;
the processor 1510 is further configured to migrate all objects framed by the object selection control to the second system space in response to the migration control input.
Optionally, the user input unit 1507 is further configured to receive a size adjustment input of the object selection control by the user before receiving the migration control input of the object selection control by the user;
the processor 1510 is further configured to, in response to the resizing input, increase the display size of the object selection control to cause the object selection control to frame a second object in the first system space.
Optionally, the user input unit 1507 is further configured to receive, after displaying the privacy suspension window, a second input of the privacy suspension window from the user;
the display unit 1506 is further configured to display, in response to the second input, a historical object migration record of the second system space, where the object migration record includes a migration operation record of at least one object of the first system space migrated to the second system space;
a user input unit 1507 for receiving a third input of one of the historical object migration records;
The processor 1510 is further configured to, in response to the third input, move the object corresponding to the migration operation record selected by the third input out of the second system space to the first system space.
Alternatively, sensor 1505 may be a camera in this embodiment for capturing an image of the environment;
the processor 1510 is further configured to perform face recognition on the environmental image acquired by the camera;
the processor 1510 is further configured to conceal the privacy suspension window if the face recognition result indicates that the environment image includes a face of the user that does not have the right to use the second system space.
Alternatively, the sensor 1505 may be a camera in this embodiment, for collecting a face image of a user;
the processor 1510 is further configured to extract a biometric feature of the user from the face image;
the processor 1510 is further configured to determine that the authentication result of the authentication is passing in a case where the biometric feature matches a pre-stored biometric feature;
the processor 1510 is further configured to determine that the authentication result of the authentication is not passed in a case where the biometric feature does not match the pre-stored biometric feature.
The electronic device 1500 in the embodiments of the present application may be an apparatus having an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of the present application.
It should be appreciated that in embodiments of the present application, the input unit 1504 may include a graphics processor (Graphics Processing Unit, GPU) 15041 and a microphone 15042, the graphics processor 15041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The display unit 1506 may include a display panel 15061, and the display panel 15061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1507 includes at least one of a touch panel 15071 and other input devices 15072. The touch panel 15071 is also referred to as a touch screen. The touch panel 15071 may include two parts, a touch detection device and a touch controller. Other input devices 15072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not described in detail herein.
The memory 1509 may be used to store software programs as well as various data. The memory 1509 may mainly include a first memory area storing programs or instructions and a second memory area storing data, wherein the first memory area may store an operating system, application programs or instructions (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory 1509 may include volatile memory or nonvolatile memory, or the memory x09 may include both volatile and nonvolatile memory. The nonvolatile MeMory may be a Read-Only MeMory (ROM), a PrograMMable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash MeMory. The volatile MeMory may be RandoM Access MeMory (RAM), static RAM (SRAM), dynaMic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (Double Data Rate SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), and Direct RAM (DRRAM). Memory 1509 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
The processor 1510 may include one or more processing units; optionally, the processor 1510 integrates an application processor that primarily processes operations involving an operating system, user interface, application programs, and the like, and a modem processor that primarily processes wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 1510. 1510
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored, and when the program or the instruction is executed by a processor, the processes of the embodiment of the privacy protection method are implemented, and the same technical effects can be achieved, so that repetition is avoided, and no further description is given here.
Wherein the processor is a processor in the electronic device described in the above embodiment. The readable storage medium includes computer readable storage medium such as read-only memory, random access memory, magnetic disk or optical disk.
The embodiment of the application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled with the processor, and the processor is used for running a program or an instruction, so that each process of the above embodiment of the privacy protection method is implemented, and the same technical effect can be achieved, so that repetition is avoided, and no redundant description is provided here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, chip systems, or system-on-chip chips, etc.
The embodiments of the present application provide a computer program product stored in a storage medium, where the program product is executed by at least one processor to implement the respective processes of the embodiments of the privacy preserving method and achieve the same technical effects, and are not repeated herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a computer software product stored in a storage medium (e.g. RO11/RA11, magnetic disk, optical disk), comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method described in the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those of ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are also within the protection of the present application.

Claims (24)

1. A method of privacy protection, the method comprising:
receiving a first input of a user to a first system space;
authenticating the user in response to the first input;
under the condition that the authentication result of the identity authentication is passing and the transfer input of a user to the transfer control and the first object is received, the first object is migrated to a second system space;
the first system space is used by a user operating the first system space, the second system space is used by a privacy system, and the second system space is used by a user with user identity information matched with authentication information.
2. The method of claim 1, wherein the first input is a selection input to a first object in a first system space or the first input is a start input for initiating user authentication.
3. The method of claim 1, wherein the transfer control comprises a hover ball control;
and under the condition that the authentication result of the identity authentication is that the authentication result passes and the transfer input of the user to the transfer control and the first object is received, migrating the first object to a second system space, wherein the method comprises the following steps:
Displaying the suspension ball control when the authentication result of the identity authentication is passed;
receiving a transfer input of a user for moving a first object in the first system space to a display area associated with the hover ball control;
in response to the transfer input, the first object is migrated to the second system space.
4. A method according to claim 3, wherein after said migrating said first object to said second system space, said method further comprises:
receiving migration cancel input of a user to the suspension ball control;
in response to the migration revocation input, the first object is moved out of the second system space to the first system space.
5. The method of claim 1, wherein the transfer control comprises a hover ball control and an object relay window;
and under the condition that the authentication result of the identity authentication is that the authentication result passes and the transfer input of the user to the transfer control and the first object is received, migrating the first object to a second system space, wherein the method comprises the following steps:
if the authentication result of the identity authentication is passing and the first input is the selection input of the first object in the first system space, adding the first object to an object transfer window, and displaying the object transfer window;
Or displaying an object transfer window under the condition that the authentication result of the identity authentication is passing and the first input is a starting input for starting the user identity authentication; adding a first object in the first system space to the object transfer window under the condition that selection input of the first object by a user is received;
receiving a user selection input of a second object in the first system space;
in response to the selection input, adding the second object to the object relay window;
receiving transfer input of a user for moving the object transfer window to a display area associated with the suspension ball control;
and in response to the transfer input, migrating the first object and the second object in the object relay window to the second system space.
6. The method of claim 1, wherein the transfer control comprises a privacy hover window that includes a system interface of the second system space;
under the condition that the user passes identity verification and receives transfer input of the user to a transfer control and the first object, the first object is migrated to a second system space, and the method comprises the following steps:
Displaying a privacy floating window under the condition that a user passes identity verification;
receiving a transfer input of a user to move a first object in the first system space into the privacy hover window;
in response to the transfer input, the first object is migrated to the second system space.
7. The method of claim 1, wherein the transfer control comprises an object relay window and a privacy hover window, the privacy hover window comprising a system interface of the second system space;
and under the condition that the authentication result of the identity authentication is that the authentication result passes and the transfer input of the user to the transfer control and the first object is received, migrating the first object to a second system space, wherein the method comprises the following steps:
if the authentication result of the identity authentication is passing and the first input is the selection input of the first object in the first system space, adding the first object to an object transfer window, and displaying the object transfer window;
or displaying an object transfer window under the condition that the authentication result of the identity authentication is passing and the first input is a starting input for starting the user identity authentication; adding a first object in the first system space to an object transfer window under the condition that selection input of the first object by a user is received;
Receiving a user selection input of a second object in the first system space;
in response to the selection input, adding the second object to the object relay window;
receiving a transfer input that a user moves the object transfer window into the privacy floating window;
and in response to the transfer input, migrating all objects in the object transfer window to the second system space.
8. The method of claim 1, wherein the transfer control comprises an object selection control;
and under the condition that the authentication result of the identity authentication is that the authentication result passes and the transfer input of the user to the transfer control and the first object is received, migrating the first object to a second system space, wherein the method comprises the following steps:
displaying an object selection control to enable the object selection control to frame-select a first object in the first system space under the condition that a verification result of identity verification is passing and the first input is a selection input of the first object;
or displaying an object selection control under the condition that the authentication result of the identity authentication is passing and the first input is a starting input for starting the identity authentication of the user; under the condition that drag input and size adjustment input of a user on the object selection control are received, updating the display position and the display size of the object selection control so that the object selection control boxes the first object;
Receiving migration control input of a user to the object selection control;
and in response to the migration control input, migrating all objects framed by the object selection control to the second system space.
9. The method of claim 8, wherein prior to receiving a user migration control input to the object selection control, the method further comprises:
receiving a size adjustment input of a user to the object selection control;
and in response to the resizing input, increasing a display size of the object selection control to cause the object selection control to frame a second object in the first system space.
10. The method of claim 6 or 7, wherein after the displaying the privacy floating window, the method further comprises:
receiving a second input of a user to the privacy floating window;
responsive to the second input, displaying a historical object migration record for the second system space, the object migration record comprising at least one migration operation record for migration of objects of the first system space to the second system space;
receiving a third input of one of the historical object migration records;
And responding to the third input, and moving out the object corresponding to the migration operation record selected by the third input from the second system space to the first system space.
11. The method of claim 6 or 7, wherein after the displaying the privacy floating window, the method further comprises:
performing face recognition on the environment image acquired by the camera;
and hiding the privacy suspension window under the condition that the face recognition result indicates that the environment image contains the face of the user without the use authority of the second system space.
12. The method of claim 1, wherein said authenticating said user comprises:
collecting a face image of the user;
extracting biological characteristics of the user from the face image;
under the condition that the biological characteristics are matched with the biological characteristics stored in advance, judging that the verification result of the identity verification is passing;
and in the case that the biological characteristics are not matched with the prestored biological characteristics, judging that the verification result of the identity verification is not passed.
13. The method of claim 1, wherein the first object comprises at least one of: files, application icons, program interfaces, controls.
14. A terminal, the terminal comprising:
the receiving module is used for receiving a first input of a user to the first system space;
a verification module for verifying the identity of the user in response to the first input;
the processing module is used for migrating the first object to the second system space under the condition that the authentication result of the identity authentication is passing and the transfer input of the user to the transfer control and the first object is received;
the first system space is used by a user operating the first system space, the second system space is used by a privacy system, and the second system space is used by a user with user identity information matched with authentication information.
15. The terminal of claim 14, wherein the first input is a selection input to a first object in a first system space or the first input is a start input for initiating user authentication.
16. The terminal of claim 14, wherein the transfer control comprises a hover ball control;
the processing module is specifically configured to:
displaying the suspension ball control when the authentication result of the identity authentication is passed;
Receiving a transfer input of a user for moving a first object in the first system space to a display area associated with the hover ball control;
in response to the transfer input, the first object is migrated to the second system space.
17. The terminal of claim 16, wherein the processing module is further configured to:
after the first object is migrated to the second system space, receiving a migration cancel input of a user to the suspension ball control;
in response to the migration revocation input, the first object is moved out of the second system space to the first system space.
18. The terminal of claim 14, wherein the transition control comprises a hover ball control and an object relay window;
the processing module is specifically configured to:
if the authentication result of the identity authentication is passing and the first input is the selection input of the first object in the first system space, adding the first object to an object transfer window, and displaying the object transfer window;
or displaying an object transfer window under the condition that the authentication result of the identity authentication is passing and the first input is a starting input for starting the user identity authentication; adding a first object in the first system space to the object transfer window under the condition that selection input of the first object by a user is received;
Receiving a user selection input of a second object in the first system space;
in response to the selection input, adding the second object to the object relay window;
receiving transfer input of a user for moving the object transfer window to a display area associated with the suspension ball control;
and in response to the transfer input, migrating the first object and the second object in the object relay window to the second system space.
19. The terminal of claim 14, wherein the transfer control comprises a privacy hover window comprising a system interface of the second system space;
the processing module is specifically configured to:
displaying a privacy floating window under the condition that a user passes identity verification;
receiving a transfer input of a user to move a first object in the first system space into the privacy hover window;
in response to the transfer input, the first object is migrated to the second system space.
20. The terminal of claim 14, wherein the transfer control comprises an object relay window and a privacy hover window, the privacy hover window comprising a system interface of the second system space;
The processing module is specifically configured to:
if the authentication result of the identity authentication is passing and the first input is the selection input of the first object in the first system space, adding the first object to an object transfer window, and displaying the object transfer window;
or displaying an object transfer window under the condition that the authentication result of the identity authentication is passing and the first input is a starting input for starting the user identity authentication; adding a first object in the first system space to an object transfer window under the condition that selection input of the first object by a user is received;
receiving a user selection input of a second object in the first system space;
in response to the selection input, adding the second object to the object relay window;
receiving a transfer input that a user moves the object transfer window into the privacy floating window;
and in response to the transfer input, migrating all objects in the object transfer window to the second system space.
21. The terminal of claim 14, wherein the transfer control comprises an object selection control;
The processing module is specifically configured to:
displaying an object selection control to enable the object selection control to frame-select a first object in the first system space under the condition that a verification result of identity verification is passing and the first input is a selection input of the first object;
or displaying an object selection control under the condition that the authentication result of the identity authentication is passing and the first input is a starting input for starting the identity authentication of the user; under the condition that drag input and size adjustment input of a user on the object selection control are received, updating the display position and the display size of the object selection control so that the object selection control boxes the first object;
receiving migration control input of a user to the object selection control;
and in response to the migration control input, migrating all objects framed by the object selection control to the second system space.
22. The terminal of claim 21, wherein the processing module is further configured to:
before receiving the migration control input of the user to the object selection control, receiving the size adjustment input of the user to the object selection control;
And in response to the resizing input, increasing a display size of the object selection control to cause the object selection control to frame a second object in the first system space.
23. The terminal of claim 14, wherein the first object comprises at least one of: files, application icons, program interfaces, controls.
24. An electronic device comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor, implement the steps of the privacy preserving method of any of claims 1-13.
CN202311245874.9A 2023-09-22 2023-09-22 Privacy protection method, terminal and electronic equipment Pending CN117272272A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311245874.9A CN117272272A (en) 2023-09-22 2023-09-22 Privacy protection method, terminal and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311245874.9A CN117272272A (en) 2023-09-22 2023-09-22 Privacy protection method, terminal and electronic equipment

Publications (1)

Publication Number Publication Date
CN117272272A true CN117272272A (en) 2023-12-22

Family

ID=89220993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311245874.9A Pending CN117272272A (en) 2023-09-22 2023-09-22 Privacy protection method, terminal and electronic equipment

Country Status (1)

Country Link
CN (1) CN117272272A (en)

Similar Documents

Publication Publication Date Title
US20220244838A1 (en) Image data for enhanced user interactions
CN108776568B (en) Webpage display method, device, terminal and storage medium
US11194437B2 (en) Information processing device and information processing method
CN108038393B (en) Application privacy protection method and mobile terminal
CN104778416B (en) A kind of information concealing method and terminal
US8161403B2 (en) Returning passed objects in a surface based computing environment using a virtual bungee
WO2010147600A2 (en) Qualified command
US20220269800A1 (en) Privacy protection method for electronic device and electronic device
KR20140119608A (en) Method and device for providing a private page
CN106815509A (en) A kind of multimedia file guard method, device and electronic equipment
CN114779977A (en) Interface display method and device, electronic equipment and storage medium
CN116450022A (en) User input interface
CN110263515B (en) Opening method of encrypted application and terminal equipment
US20180359315A1 (en) Systems and methods for providing inter-device connectivity and interactivity
CN110908580B (en) Method and device for controlling application
WO2023198064A1 (en) Application program starting method and apparatus, and electronic device and storage medium
Schaffer Expanding continuous authentication with mobile devices
CN117272272A (en) Privacy protection method, terminal and electronic equipment
CN114245017A (en) Shooting method and device and electronic equipment
CN107169333A (en) File management method, mobile terminal and storage medium based on fingerprint
KR20150029251A (en) Method for securing object of electronic device and the electronic device therefor
CN116842539A (en) File management method and terminal thereof
CN114637563B (en) Information input method and device
CN117540400A (en) File processing method, device, electronic equipment and readable storage medium
CN114205319B (en) Instant messaging method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination