CN117313175A - Peep-proof processing method and device, user equipment and storage medium - Google Patents

Peep-proof processing method and device, user equipment and storage medium Download PDF

Info

Publication number
CN117313175A
CN117313175A CN202210712389.7A CN202210712389A CN117313175A CN 117313175 A CN117313175 A CN 117313175A CN 202210712389 A CN202210712389 A CN 202210712389A CN 117313175 A CN117313175 A CN 117313175A
Authority
CN
China
Prior art keywords
screen
peep
user equipment
user
proof
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210712389.7A
Other languages
Chinese (zh)
Inventor
沈蔚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202210712389.7A priority Critical patent/CN117313175A/en
Publication of CN117313175A publication Critical patent/CN117313175A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/82Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • G06V40/19Sensors therefor

Abstract

The embodiment of the application provides a peep-proof processing method, a peep-proof processing device, user equipment and a storage medium, wherein the peep-proof processing method comprises the following steps: detecting whether a screen peeping event occurs; executing a first peep-proof operation based on the detection of the occurrence of the screen peep event; the first peep-proof operation comprises the steps of generating prompt information and/or a screen; wherein, the occurrence of the screen peeping event includes: the user equipment detects that a user executes an anti-peeping gesture; and/or the user device detecting that a particular object is in proximity to the user device; and/or the user device detects that there is an unauthenticated face looking at the screen of the user device. The embodiment of the application can effectively prevent the leakage of the privacy information.

Description

Peep-proof processing method and device, user equipment and storage medium
Technical Field
The application relates to the technical field of terminals, in particular to a peep-proof processing method, a peep-proof processing device, user equipment and a storage medium.
Background
At present, people pay attention to personal privacy, and when user equipment such as mobile phones is used under specific conditions, the screen is not hoped to be snooped by people. At present, a peep-proof means is generally to paste a peep-proof film on a screen, and the peep-proof film generally adopts a vertical grating, so that side peep can be prevented, but up-down peep cannot be prevented, and privacy information still can be leaked.
Disclosure of Invention
The embodiment of the application provides a peep-proof processing method, a peep-proof processing device, user equipment and a storage medium, which can effectively prevent leakage of private information.
A first aspect of an embodiment of the present application provides a peep-proof processing method, which is executed on a user device, and is characterized in that the method includes:
detecting whether a screen peeping event occurs;
executing a first peep-proof operation based on the detection of the occurrence of the screen peep event; the first peep-proof operation comprises the steps of generating prompt information and/or a screen extinguishing;
wherein, the occurrence of the screen peeping event includes:
the user equipment detects that a user executes an anti-peeping gesture; and/or
The user equipment detects that a specific object approaches the user equipment; and/or
The user device detects that an unauthenticated face is gazing at a screen of the user device.
A second aspect of an embodiment of the present application provides a peep-proof processing apparatus, including:
the detection unit is used for detecting whether a screen peeping event occurs;
the peep-proof processing unit is used for executing first peep-proof operation based on the detection of the occurrence of a screen peep event; the first peep-proof operation comprises the steps of generating prompt information and/or a screen extinguishing;
Wherein, the occurrence of the screen peeping event includes:
the detection unit detects that a user executes peep-proof gestures; and/or
The detection unit detects that a specific object approaches the user equipment; and/or
The detection unit detects that an unauthenticated face looks at a screen of the user equipment.
A third aspect of embodiments of the present application provides a user equipment,
comprising the following steps:
a sensor unit configured to detect whether a screen peeping event occurs;
a processor unit configured to perform a first privacy operation based on determining that a screen privacy event has occurred; the first peep-proof operation comprises the steps of generating prompt information and/or a screen extinguishing;
wherein, the occurrence of the screen peeping event includes:
the sensor unit detects that a user executes an anti-peeping gesture; and/or
The sensor unit detecting that a specific object is approaching the user equipment; and/or
The sensor unit detects that an unauthenticated face is gazing at a screen of the user equipment.
A fourth aspect of the embodiments provides a computer readable storage medium storing a computer program for electronic data exchange, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the step instructions as in the first aspect of the embodiments of the present application.
A fifth aspect of the embodiments of the present application provides a computer program product, wherein the computer program product comprises a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the step instructions as in the first aspect of the embodiments of the present application.
In the embodiment of the application, whether a screen peeping event occurs is detected; executing a first peep-proof operation based on the detection of the occurrence of the screen peep event; the first peep-proof operation comprises the steps of generating prompt information and/or a screen; wherein, the occurrence of the screen peeping event includes: the user equipment detects that a user executes an anti-peeping gesture; and/or the user device detecting that a particular object is in proximity to the user device; and/or the user device detects that there is an unauthenticated face looking at the screen of the user device. According to the peep-proof processing method, based on the fact that the screen peeping event is detected, the prompt information and/or the screen is generated, and leakage of privacy information can be effectively prevented.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a peep-proof processing method provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of another peep-proof processing method according to an embodiment of the present application;
fig. 3 is a schematic diagram of a location of a light sensor and a distance sensor in a user device according to an embodiment of the present application;
FIG. 4a is a schematic diagram of a gesture of a user blocking a user device according to an embodiment of the present application;
FIG. 4b is a schematic diagram of another gesture provided by an embodiment of the present application in which a user occludes a user device;
FIG. 4c is a schematic diagram of another user gesture provided by an embodiment of the present application;
fig. 5 is a schematic flow chart of a peep-proof processing method according to an embodiment of the present application;
fig. 6 is a schematic diagram of a pop-up window reminding screen according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a peep-proof processing device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a user equipment according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application and in the above-described figures, are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly understand that the embodiments described herein may be combined with other embodiments.
The user equipment according to the embodiment of the present application is a terminal having a display function. May be a cell phone, tablet, notebook, ultra-mobile personal computer, ultra Mobile Personal Computer (UMPC), netbook, personal digital assistant (personal digital assistant, PDA), on-board Unit (OBU), wearable device (e.g., wristwatch, bracelet, smart helmet, etc.), smart home device (e.g., electric cooker, stereo, home housekeeping device, etc.), augmented reality (augmented reality, AR)/Virtual Reality (VR) device, etc.
Referring to fig. 1, fig. 1 is a schematic flow chart of a peep-proof processing method according to an embodiment of the present application. As shown in fig. 1, the peep-proof treatment method may include the following steps.
101, the user equipment detects whether a screen peeping event occurs.
In an embodiment of the present application, the user equipment may include a display screen, where the display screen may include any one of a light-emitting diode (LED) display screen, an organic light-emitting diode (OLED) display screen, and a liquid crystal display screen (liquid crystal display, LCD).
Step 101 may be performed with the user device in a bright screen state. The bright screen state may include a screen-lock state or a non-screen-lock state. In the screen locking state, the display content can be screen locking wallpaper, a photographing preview picture entered in the screen locking state, and the like. In general, the privacy level of the display contents in the lock screen state is low. In the non-screen-locking state, the display content can be main interface content or content which can be displayed by a certain application. Such as the content of a display interface of an application, the content of a content interface of an application.
Wherein, the occurrence of the screen peeping event includes:
The user equipment detects that a user executes an anti-peeping gesture; and/or
The user equipment detects that a specific object approaches the user equipment; and/or
The user equipment detects that an unauthenticated face looks at a screen of the user equipment; and/or
The user equipment detects the probability of the screen peeping event through the artificial intelligent module, and when the probability of the screen peeping event is larger than a set probability value, the screen peeping event is considered to occur.
In this embodiment of the present application, the peep-proof gesture may be a gesture that shields a screen. Whether a gesture is blocking the screen or not can be detected through the camera, or whether a gesture is blocking the screen or not can be detected through the distance sensor and the light sensor.
In one possible embodiment, a gesture that obscures the screen may be detected by a camera, a distance sensor, and a light sensor.
When a gesture for shielding a screen is detected through the camera, the front camera can continuously shoot images in multiple frames, and whether the images shot in multiple frames contain a palm or not can be identified. When a palm-containing condition is identified, it may be considered that a peep-proof gesture is detected.
When a gesture shielding the screen is detected by the distance sensor and the light sensor, whether an object approaches or not can be detected by the distance sensor, and whether light is darkened or not can be detected by the light sensor. When an object is detected to be close and the light is darkened, the peep-proof gesture is considered to be detected.
When detecting whether a gesture shielding a screen exists through the camera, the distance sensor and the light sensor, the front camera can continuously shoot images for multiple frames, whether the images shot for multiple frames continuously contain a palm or not is recognized, whether an object is close or not is detected through the distance sensor, and whether light is darkened or not is detected through the light sensor. When the palm is recognized, an object is close, and the light is darkened, the peep-proof gesture can be considered to be detected. According to the embodiment of the application, whether the screen peeping event occurs or not can be comprehensively detected by combining the light sensor, the distance sensor and the camera, the situation that the screen peeping event is missed to be identified by judging in a single sensor or single camera-passing mode is avoided, and the accuracy of identifying the screen peeping event is improved.
The specific object may be a specific person or device, for example, the specific person may be a person set by the user who may acquire private information. Specifically, whether a specific face is close to the user device may be identified by a front camera and/or a rear camera. The user equipment can compare the face image shot by the camera with face information stored in the memory or face information stored in the server to identify a specific person.
The specific device may be a monitoring camera, a cell phone camera, etc. that may acquire private information. Whether a particular device is close to the user device may be identified by a front-facing camera and/or a rear-facing camera. The user equipment can judge whether the camera in the images containing the camera in the continuous multiframes is close to the user equipment or not under the condition that the camera is identified to shoot the images containing the camera in the continuous multiframes.
Optionally, the user device detects that the user performs the peep-proof gesture, including:
the user equipment detects that a user executes peep-proof gestures through the distance sensor and the optical sensor.
In embodiments of the present application, the user device may include a light sensor and a distance sensor. The first sensor signal detected by the light sensor may indicate the intensity of the detected light, and the second sensor signal detected by the distance sensor may indicate whether an object is in proximity to the user device. The light sensor and the distance sensor may periodically collect data and generate a sensor signal based on the collected data. A light sensor, which may also be referred to as a light sensor, an ambient light sensor, is used to detect the intensity of light.
The user device detects whether an object is approaching or not through the distance sensor, and detects whether light is darkened or not through the light sensor. When an object is detected to be close and the light is darkened, the peep-proof gesture is considered to be detected.
The light sensor and the distance sensor are typically located on the front side of the user device. Referring to fig. 3, fig. 3 is a schematic diagram illustrating a position of a light sensor and a distance sensor in a user device according to an embodiment of the present application. As shown in fig. 3, the light sensor and the distance sensor are both located on the front side of the user device, beside the earpiece of the user device, and the light sensor and the distance sensor are located very close to the user device, so that the user can easily cover the light sensor and the distance sensor while easily passing through the finger or palm.
In this embodiment of the present application, the user device may analyze whether the user gesture is a peep-proof gesture according to the first sensor signal detected by the optical sensor and the second sensor signal detected by the distance sensor. If the user autonomously recognizes peeping, the user can make a gesture for rapidly shielding the user equipment, at the moment, the light sensor monitors that the light is darkened, and meanwhile, the distance sensor monitors that an object is close, the user can consider that a screen peeping event is detected. If the light sensor and the distance sensor do not simultaneously detect that an object is approaching and the light is darkened, then it may be considered that no screen peeping event is detected.
The gesture of the user blocking the user device may be as follows:
first kind: when the user equipment is used by one hand, the thumb can be moved upwards to cover the upper half part of the screen. Referring to fig. 4a, fig. 4a is a schematic diagram of a gesture of a user blocking a user device according to an embodiment of the present application. As shown in fig. 4a, the user may cover the upper half of the screen of the user device with the thumb, thereby shielding the light sensor and the distance sensor, and may detect that an object is approaching through both the light sensor and the distance sensor, and the light is darkened, and the user device detects a screen peeping event.
Second kind: when the user equipment is used by hands or placed (flat table top, bracket support and the like), the action of shielding the upper half part of the screen by the palm can be performed. Referring to fig. 4b, fig. 4b is a schematic diagram of another gesture of a user blocking a user device according to an embodiment of the present application. As shown in fig. 4b, the user may cover the palm of the hand over the upper half of the screen of the user device, thereby shielding the light sensor and the distance sensor, and may detect that an object is approaching through both the light sensor and the distance sensor, and the light is darkened, and the user device detects a screen peeping event.
According to the method and the device, whether the user gesture is the peep-proof gesture or not can be analyzed according to the first sensor signal detected by the light sensor and the second sensor signal detected by the distance sensor, so that whether a screen peep event is detected or not is determined. The user gesture shown in fig. 4a and fig. 4b is simple, and the optical sensor and the distance sensor can easily detect whether the user gesture is a peep-proof gesture (the gesture that the user has a hand to shield the optical sensor and the distance sensor), so that the response speed is high, and the first peep-proof operation (such as a screen-extinguishing operation) can be rapidly performed.
Optionally, the user may be allowed to customize some more complex gestures, such as swipe up and down or side-to-side; or a gesture that covers more than a time threshold. Referring to fig. 4c, fig. 4c is a schematic diagram of another gesture of a user according to an embodiment of the present application. As shown in fig. 4c, the hand may be swung downward (at this time, the light intensity detected by the light sensor is weakened by intensity, the object is detected by the distance sensor to be close), and then lifted (at this time, the light intensity detected by the light sensor is weakened by intensity, and the object is detected by the distance sensor to be far away). The user gesture provided by the embodiment of the application can improve the completeness of the judgment logic, so that the false recognition rate of the user gesture (for example, the user's finger is carelessly scratched by the light sensor and the distance sensor) is reduced.
Optionally, the user equipment detects the probability of the occurrence of the peeping event through the artificial intelligence module, and considers that the occurrence of the screen peeping event occurs when the probability of the occurrence of the screen peeping event is greater than a set probability value, which may include:
the user equipment acquires current time information, current position information, current light intensity information, current equipment use frequency, currently used APP and currently displayed content, converts the current time information into a current time vector, converts the current position information into a current position vector, converts the current light intensity information into a current light intensity vector, converts the current equipment use frequency into a current equipment use frequency vector, converts the currently used APP into a current APP vector, and converts the currently displayed content into a current content vector; the method comprises the steps of inputting a current time vector, a current position vector, a current light intensity vector, a current equipment use frequency vector, a current APP vector and a current content vector into an artificial intelligent model, outputting the probability of a peeping event by the artificial intelligent model, and considering the occurrence of the peeping event when the probability of the peeping event is larger than a set probability value. The artificial intelligence model can be a probability judgment model based on a neural network, and particularly can be a neural network model with supervision training.
According to the embodiment of the application, the current position information (such as GPS positioning) of the user equipment can be combined, the current time, the current light intensity information, the current equipment use frequency, the currently used APP, the currently displayed content and the like are combined, the behavior mode of the user is comprehensively learned and summarized, a more complex and accurate artificial intelligent model is built, the current use scene can be judged, and the monitoring precision is improved. For example, on public transportation means in early rush hour, the probability of the screen being peeped is high; at night, the probability of the screen being peeped is relatively small in the own home. Through training the artificial intelligence model, the probability of the occurrence of the screen peeping event can be predicted by combining the vector input into the artificial intelligence model, the accuracy of the probability of the occurrence of the screen peeping event can be improved by the artificial intelligence model, and the accuracy of whether the screen peeping event occurs or not can be further improved.
Optionally, the artificial intelligence model determines that the probability of the occurrence of the peeping event is related to a scene in which the user equipment is currently located.
For example, the user device may have an encryption system, and if an encrypted file is opened, the artificial intelligence model determines that the weight of the peeping event is increased a little. For another example, shopping software installed on the user device may determine whether the user looks at a common product or a personal privacy illness, and if the user looks at a personal privacy illness, the artificial intelligence model may increase the weight of the peeping event by a little. The weight of the artificial intelligent model for predicting the peeping event is improved according to the privacy importance of the browsed content, so that the probability of the artificial intelligent model for predicting the peeping event is improved. For example, when the password input by the open bank APP is detected, and when the APP check balance of the open payment class is detected, the weight of the artificial intelligence model for judging the peeping event can be increased. According to the embodiment of the application, the probability of peeping events is improved under the condition that the privacy degree of the display content is higher, so that peeping prevention operation is triggered and executed more easily. On the one hand, the peep-proof operation can be executed as much as possible under the condition that the privacy degree of the display content is higher, and the display content is ensured not to peep as much as possible. On the other hand, the peep-proof operation can be prevented from being executed as much as possible under the condition that the privacy degree of the display content is low, so that the peep-proof operation is prevented from disturbing the user.
Wherein the set probability value may vary with the privacy level of the display content.
Optionally, the first threshold is inversely related to the privacy level of the display content. The higher the privacy level of the display content, the smaller the set probability value, and the lower the privacy level of the display content, the larger the set probability value. According to the embodiment of the application, the peep-proof operation can be executed only by judging that the screen peep event occurs with smaller probability under the condition that the privacy degree of the display content is higher. On the one hand, the first peep-proof operation or the second peep-proof operation can be executed as much as possible under the condition that the privacy degree of the display content is higher, so that the display content is prevented from peeping as much as possible. On the other hand, the first peep-proof operation or the second peep-proof operation can be not executed as much as possible under the condition that the privacy degree of the display content is low, so that the first peep-proof operation or the second peep-proof operation is prevented from disturbing the user.
Optionally, the user device detects that an unauthenticated face gazes at a screen of the user device, including:
the user equipment detects that an unauthenticated face looks at a screen of the user equipment through an artificial intelligence algorithm.
The camera can periodically collect images. It may be recognized by an artificial intelligence (artificial intelligence, AI) algorithm whether an unauthenticated face exists in the image and whether an eyeball of the face is recognized to be gazed at a screen of the user device when the unauthenticated face exists, and when the unauthenticated face exists in the image collected by the camera and the eyeball of the face is recognized to be gazed at the screen when the unauthenticated face exists, it may be considered that the unauthenticated face is detected to be gazed at the screen of the user device.
102, the user equipment executes a first peeping-preventing operation based on the detection of the occurrence of a screen peeping event; the first peep-proof operation comprises the generation of prompt information and/or screen extinguishing.
In the embodiment of the application, under the condition that the occurrence of a screen peeping event is detected, the first peeping-preventing operation is executed.
In one possible embodiment, the first privacy operation may include a prompt or a screen.
In one possible embodiment, the first privacy operation may include a prompt and a screen.
The prompt information may include at least one of pop-up prompt information, text prompt information, and voice prompt information.
In the embodiment of the application, based on the detection of the occurrence of the screen peeping event, the prompt information and/or the screen extinguishing can be generated, so that the disclosure of the privacy information can be effectively prevented.
The user device may detect that a user performs a privacy gesture, and the user device detects that a specific object is close to the user device, and the user device detects that an unauthenticated face gazes at a screen of the user device, the first privacy operation may include a screen-rest.
Optionally, when the light sensor detects that the light is darkened, the distance sensor detects that an object is approaching, and at the moment, the subjective peep preventing will is stronger due to the fact that the light sensor and the distance sensor of the user equipment are actively shielded by a user, so that the peep preventing operation response speed can be improved.
Optionally, when a face exists in an image acquired by the AI algorithm recognition camera and eyes of the face are recognized to watch the screen when the face exists, prompt information can be sent to prompt a user for passive detection, the user cannot suddenly stop the screen and not be prepared, and therefore the use experience of the user is improved.
Optionally, in step 102, the user equipment performs a first peep-proof operation, which may include the following steps:
And under the condition that the display content comprises streaming media content, the user equipment pauses the playing of the streaming media content and executes the screen-extinguishing operation.
In this embodiment of the present application, if an Application (APP) for playing streaming media allows background play when the streaming media is being played, if the streaming media is directly stopped, the streaming media still makes a sound, which affects the peep-proof effect. Under the condition that the display content comprises streaming media content, the playing of the streaming media content is suspended, the screen-extinguishing operation is performed, the streaming media content can still make a sound after screen extinguishing, and the peep-proof effect is improved. The streaming media content in the embodiment of the present application may be content that still emits sound after the screen is closed, and specifically, the streaming media content may include an audio stream or a video stream.
Referring to fig. 2, fig. 2 is a flow chart of another peep-proof processing method according to an embodiment of the disclosure. As shown in fig. 2, the peep-proof treatment method may include the following steps.
The user device detects 201 whether a screen peeping event has occurred.
Wherein, the occurrence of the screen peeping event includes:
the user equipment detects that a user executes an anti-peeping gesture; and/or
The user equipment detects that a specific object approaches the user equipment; and/or
The user device detects that an unauthenticated face is gazing at a screen of the user device.
202, the user equipment executes a first peeping-preventing operation based on the detection of the occurrence of a screen peeping event; the first peep-proof operation comprises the generation of prompt information and/or screen extinguishing.
203, the user equipment executes a second peeping-preventing operation based on the detection of the occurrence of the screen peeping event and the determination that the user equipment is displaying the privacy content; the second peep-proof operation comprises screen extinguishing and/or early warning information generation.
In the embodiment of the application, when the screen peeping event is detected and the user equipment is determined to be displaying the privacy content, the screen is closed and/or early warning information is generated.
The early warning information may include popup information and/or sound an early warning (alarm sound).
In the embodiment of the application, when the screen peeping event is detected and the user equipment is determined to be displaying the privacy content, the screen is closed and/or the early warning information is generated, so that the disclosure of the privacy information can be effectively prevented.
Optionally, the determining that the user equipment is displaying private content includes:
And determining that the user equipment displays the private content according to the type of the display content.
The user device may determine the privacy level of the display content according to the type of the display content. In general, the privacy degree of the display content such as the balance interface, the consumption record interface, the payment interface, the chat interface, the address book interface, the photo display interface and the like is higher, and the privacy degree is larger than the first threshold. The privacy degrees of the news content display interface and the game interface are relatively low, and the privacy degrees are smaller than a first threshold value. And determining that the user equipment displays the private content under the condition that the privacy degree of the display content is larger than a first threshold value. The first threshold may be preset and may be stored in a memory (e.g., a non-volatile memory) of the user device.
The types of display content may include: the method comprises the steps of displaying the amount (including balance and consumption record) of a bank APP, displaying the non-amount of the bank APP, displaying the amount (including balance and consumption record) of a payment APP, paying the payment APP, displaying the non-amount of the payment APP, displaying the chat of a social APP, displaying the address book of the social APP, displaying the non-chat of the social APP, displaying the video playing interface, displaying news content, displaying the content of a novel, chatting of the game APP, playing the game of the game APP and the like.
In this embodiment of the present application, the correspondence between the type and the privacy level may be preset, and may be stored in a memory (for example, a nonvolatile memory) of the user equipment. The types of display content may include: the method comprises the steps of displaying the amount (including balance and consumption record) of a bank APP, displaying the non-amount of the bank APP, displaying the amount (including balance and consumption record) of a payment APP, paying the payment APP, displaying the non-amount of the payment APP, displaying the chat of a social APP, displaying the address book of the social APP, displaying the non-chat of the social APP, displaying the video playing interface, displaying news content, displaying the content of a novel, chatting of the game APP, playing the game of the game APP and the like. Each type may correspond to a degree of privacy. For example, the privacy level corresponding to the money (including balance and consumption record) display interface of the bank APP is A1, the privacy level corresponding to the non-money display interface of the bank APP is A2, the privacy level corresponding to the money (including balance and consumption record) display interface of the payment APP is A3, the privacy level corresponding to the payment interface of the payment APP is A4, the privacy level corresponding to the non-money non-payment display interface of the payment APP is A5, the privacy level corresponding to the chat display interface of the social APP is A6, the privacy level corresponding to the address book display interface of the social APP is A7, the privacy level corresponding to the non-chat non-address book display interface of the social APP is A8, the privacy level corresponding to the video playing interface is A9, the privacy level corresponding to the news content display interface is a10, the privacy level corresponding to the novel content display interface is a11, the privacy level corresponding to the chat interface of the game APP is a12, and the privacy level corresponding to the game interface of the game APP is a13. For example, the values of A1, A3, A4, A6, A7, a12 may all be greater than the first threshold. The values of A2, A5, A8, A9, a10, a11, a13 may all be less than the first threshold.
According to the privacy degree determining method and device, the corresponding privacy degree can be determined according to the type of the display content, the privacy degree of the display content can be obtained rapidly, and then peep-proof operation (screen-extinguishing operation or prompt information sending) is performed rapidly in response, so that the peep-proof response speed is improved.
Optionally, the performing the first peep-proof operation includes:
and under the condition that the display content comprises streaming media content, suspending playing of the streaming media content, and executing screen-extinguishing operation.
In this embodiment of the present application, if an Application (APP) for playing streaming media allows background play when the streaming media is being played, if the streaming media is directly stopped, the streaming media still makes a sound, which affects the peep-proof effect. Under the condition that the display content comprises streaming media content, when the probability of peeping event is larger than a first threshold value and the privacy degree of the display content is larger than a second threshold value, the playing of the streaming media content is paused, the screen-extinguishing operation is performed, the streaming media content can be prevented from still making sound after screen-extinguishing, and the peeping prevention effect is improved. The streaming media content in the embodiment of the present application may be content that still emits sound after the screen is closed, and specifically, the streaming media content may include an audio stream or a video stream.
Optionally, the performing a second peep-proof operation includes:
and under the condition that the privacy content comprises streaming media content and the streaming media content is in a mode of disallowing watching simultaneously, suspending playing of the streaming media content and sending out prompt information.
In this embodiment of the present application, when the display content includes the streaming media content and the streaming media content is being played, if only the prompt information is sent out at this time, the streaming media content is still being played continuously, and still sound is still sent out, which affects the peep-proof effect. Under the condition that the display content comprises streaming media content, the playing of the streaming media content is suspended, the screen-extinguishing operation is performed, the streaming media content can still make a sound after screen extinguishing, and the peep-proof effect is improved. The streaming media content in the embodiment of the present application may be content that still emits sound after emitting the prompt information, and specifically, the streaming media content may include an audio stream or a video stream or an audio-video stream.
The method has the advantages that the streaming media content can be preset to be in the 'permission to watch mode' or the 'non-permission to watch mode', in the 'permission to watch mode', the peep-proof operation (screen-extinguishing operation or prompt information sending) is not executed, the streaming media content is continuously played, no pause exists, the streaming media content is in a state of no perception of a user, and the watching experience of the streaming media content of the user is not influenced. Under the 'not allowed to watch at the same time mode', under the condition that a screen peeping event is detected, the user equipment pauses the playing of the streaming media content and sends out prompt information.
And in the case that the screen peeping event is not detected, maintaining the screen of the user equipment to be in a bright screen state.
And in the case that no screen peeping event is detected, the display content comprises streaming media content and the streaming media content is in a mode allowing for watching together, the user equipment maintains playing of the streaming media content.
Under the 'permission to watch at the same time mode', even if a screen peeping event is detected, peeping prevention operation (screen extinguishing operation or prompt information sending) is not carried out, but the streaming media content is continuously played, no pause exists, and the streaming media content is in a state that a user does not feel, so that the watching experience of the streaming media content of the user is not influenced.
Optionally, when the user device detects that the user performs the peep-proof gesture, the user device performs a screen-extinguishing operation.
In this embodiment of the application, if it is that light darkens to monitor at light sensor, and distance sensor monitors that there is the object under the condition that is close simultaneously, then peep for the initiative detects, and the light sensor that shields user equipment for the user is initiative this moment and distance sensor lead to, and subjective peep prevention wish is stronger, can directly stop the screen.
Referring to fig. 5, fig. 5 is a schematic flow chart of a peep-proof processing method according to an embodiment of the present application. As shown in fig. 5, the technology of software and hardware can be combined, and the existing AI algorithm is used for identifying peeping, so that peeping monitoring and subsequent emergency treatment of the mobile phone privacy are comprehensively carried out.
1. When the mobile phone is normally used with a bright screen, if a user autonomously recognizes peeping, the user can make a gesture for rapidly shielding the mobile phone, and if a mobile phone sensor (a light sensor and a distance sensor) simultaneously monitors that an object is close and the light is darkened, the mobile phone directly stops the screen;
(1) When the mobile phone is used by one hand, the thumb can be moved upwards to cover the upper half part of the screen; see fig. 4a.
(2) When the mobile phone is used by hands or placed and used (a flat table top, a bracket support and the like), the action of shielding the upper half part of the screen by the palm can be performed; see fig. 4b.
2. When the mobile phone is normally used for lighting a screen, the front camera and AI algorithm continuously identifies whether a strange face (eye gazing) exists. If peeping is detected, corresponding actions are made according to different use scenes:
(1) Before the streaming media (with audio) is played, an option of 'whether to allow the same-view mode' is provided, if 'no', the streaming media is muted when peeping is monitored, and a full-screen reminding picture is popped up, as shown in fig. 6. If yes, continuing playing;
(2) And when other related privacy pictures (without audio) such as documents and pictures are viewed, a full-screen reminding picture is popped up when peeping is detected, as shown in fig. 6.
Referring to fig. 6, fig. 6 is a schematic diagram of a pop-up window reminding screen according to an embodiment of the present application. The popup reminding screen can provide three follow-up actions besides reminding a user that the user may be peeped:
(a) The picture can be automatically exited after a certain time, and the buffer time for the processing of the user is reserved, for example, the mobile phone is removed;
(b) Clicking to exit immediately, and keeping monitoring;
(c) The click can exit immediately and be misjudged as no longer being monitored for a period of time.
According to the technical scheme of privacy peeping prevention of the mobile phone, the mobile phone software and hardware technology is comprehensively utilized, the privacy of a user is protected, and the privacy peeping prevention method has the following advantages:
1. comprehensively: the mobile phone intelligent monitoring peeping method has the advantages that various conditions are comprehensively considered, corresponding actions can be made when the mobile phone intelligent monitoring peeping is achieved, the user can independently identify the peeping as a supplement means of AI identification precision, and the coverage is comprehensive;
2. the rapidity is as follows: the intention shielding screen for shielding the mobile phone is monitored by utilizing the light rays and the distance sensor of the mobile phone, privacy is shielded, and the operation is quick and convenient.
The foregoing description of the embodiments of the present application has been presented primarily in terms of a method-side implementation. It will be appreciated that the user equipment, in order to implement the above-described functions, comprises corresponding hardware structures and/or software modules that perform the respective functions. Those of skill in the art will readily appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied as hardware or a combination of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application may divide the functional units of the user equipment according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated in one processing unit. The integrated units may be implemented in hardware or in software functional units. It should be noted that, in the embodiment of the present application, the division of the units is schematic, which is merely a logic function division, and other division manners may be implemented in actual practice.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a peep-proof processing apparatus 700 according to an embodiment of the present application, where the peep-proof processing apparatus 700 is applied to a user equipment, and the peep-proof processing apparatus 700 may include a detection unit 701 and a peep-proof processing unit 702, where:
the detecting unit 701 is configured to detect whether a screen peeping event occurs;
the peep-proof processing unit 702 is configured to perform a first peep-proof operation based on detecting that a screen peep event occurs; the first peep-proof operation comprises the steps of generating prompt information and/or a screen extinguishing;
wherein, the occurrence of the screen peeping event includes:
The detection unit 701 detects that a user performs an anti-peeping gesture; and/or
The detection unit 701 detects that a specific object approaches the user equipment; and/or
The detection unit 701 detects that an unauthenticated face looks at a screen of the user equipment.
Optionally, the peep-proof processing unit 702 is further configured to perform a second peep-proof operation based on determining that the user equipment is displaying private content; the second peep-proof operation comprises screen extinguishing and/or early warning information generation.
Optionally, the peep-proof processing unit 702 is further configured to perform a second peep-proof operation based on detecting that a screen peep event occurs, and based on determining that the user equipment is displaying private content; the second peep-proof operation comprises screen extinguishing and/or early warning information generation.
Optionally, the peep-proof processing unit 702 performs a first peep-proof operation, including:
and under the condition that the display content comprises streaming media content, suspending playing of the streaming media content, and executing screen-extinguishing operation.
Optionally, the peep-proof processing unit 702 performs a second peep-proof operation, including:
and under the condition that the privacy content comprises streaming media content and the streaming media content is in a mode of disallowing watching simultaneously, suspending playing of the streaming media content and sending out prompt information.
Optionally, the detecting unit 701 detects that the user performs the peep-proof gesture, including:
the detection unit 701 detects that the user performs the peep-proof gesture through the distance sensor and the light sensor.
Optionally, the detecting unit 701 detects that an unauthenticated face looks at a screen of the user equipment, including:
the detection unit 701 detects that an unauthenticated face looks at a screen of the user equipment through an artificial intelligence algorithm.
Optionally, the determining that the user equipment is displaying private content includes: and determining that the user equipment displays the private content according to the type of the display content.
The detection unit 701 in the embodiment of the present application may be a sensor unit or a processor in the user equipment. The privacy processing unit 702 may be a processor in a user device.
The specific implementation of the privacy preserving apparatus 700 shown in fig. 7 can be referred to the method embodiments shown in fig. 1 and 2, and will not be described herein.
In the embodiment of the application, based on the detection of the occurrence of the screen peeping event, the prompt information and/or the screen extinguishing can be generated, so that the disclosure of the privacy information can be effectively prevented.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a ue according to an embodiment of the present application, and as shown in fig. 8, the ue 800 includes a processor 801 and a memory 802, where the processor 801 and the memory 802 may be connected to each other through a communication bus 803. The communication bus 803 may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, or the like. The communication bus 803 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 8, but not only one bus or one type of bus. The memory 802 is used for storing a computer program comprising program instructions, the processor 801 being configured to invoke the program instructions, the program comprising steps for performing part or all of the methods shown in fig. 1-2.
The processor 801 may be a general purpose central processing unit (central processing unit, CPU), microprocessor, application Specific Integrated Circuit (ASIC), or one or more integrated circuits for controlling the execution of the above-described programs.
The memory 802 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), a compact disc read-only memory (compact disc read-only memory) or other optical disk storage, a compact disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory may be stand alone and coupled to the processor via a bus. The memory may also be integrated with the processor.
The user device 800 may include a light sensor, a distance sensor, and a camera module, which may include at least one camera. The user device 800 may also include sensors such as acceleration sensors, ambient light sensors, heart rate sensors, and the like.
In addition, the user device 800 may further include a communication module, which may include a bluetooth communication module. The user device 800 may also include general components such as a communication interface, an antenna, etc., which are not described in detail herein.
The user device 800 may also include a display module, which may include a display screen, for displaying the athletic data.
In the embodiment of the application, based on the detection of the occurrence of the screen peeping event, the prompt information and/or the screen extinguishing can be generated, so that the disclosure of the privacy information can be effectively prevented.
The application implementation also provides a user equipment, including:
a sensor unit configured to detect whether a screen peeping event occurs;
a processor unit configured to perform a first privacy operation based on determining that a screen privacy event has occurred; the first peep-proof operation comprises the steps of generating prompt information and/or a screen extinguishing;
wherein, the occurrence of the screen peeping event includes:
The sensor unit detects that a user executes an anti-peeping gesture; and/or
The sensor unit detecting that a specific object is approaching the user equipment; and/or
The sensor unit detects that an unauthenticated face is gazing at a screen of the user equipment.
Wherein the sensor unit may comprise: at least one of a distance sensor, a light sensor and a camera module. The processor unit may include: a processor. Such as a CPU, application processor, etc.
Optionally, the processor unit is further configured to:
executing a second peep-proof operation based on determining that the user equipment is displaying private content; the second peep-proof operation comprises screen extinguishing and/or early warning information generation.
Optionally, in the aspect of executing the first peep-proof operation, the processor unit specifically includes: and under the condition that the display content comprises streaming media content, suspending playing of the streaming media content, and executing screen-extinguishing operation.
Optionally, in the aspect of executing the second peep-proof operation, the processor unit specifically includes: and under the condition that the privacy content comprises streaming media content and the streaming media content is in a mode of disallowing watching simultaneously, suspending playing of the streaming media content and sending out prompt information.
The sensor unit detecting that a user performs a peep-proof gesture, comprising:
the sensor unit detects that a user performs a peep-proof gesture through the distance sensor and the light sensor.
Optionally, the sensor unit detects that an unauthenticated face gazes at a screen of the user equipment, including:
the sensor unit detects that an unauthenticated face looks at a screen of the user equipment through an artificial intelligence algorithm.
Optionally, the determining that the user equipment is displaying private content includes: and determining that the user equipment displays the private content according to the type of the display content.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program for electronic data exchange, and the computer program makes a computer execute part or all of the steps of any one of the peep-prevention processing methods described in the embodiment of the method.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of action combinations, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, such as the division of the units, merely a logical function division, and there may be additional manners of dividing the actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present invention may be integrated in one processing unit, each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units described above may be implemented either in hardware or in software program modules.
The integrated units, if implemented in the form of software program modules, may be stored in a computer-readable memory for sale or use as a stand-alone product. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a memory, including several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory includes: a U-disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be implemented by a program that instructs associated hardware, and the program may be stored in a computer readable memory, which may include: flash disk, read-only memory, random access memory, magnetic or optical disk, etc.
The foregoing has outlined rather broadly the more detailed description of embodiments of the present application, wherein specific examples are provided herein to illustrate the principles and embodiments of the present application, the above examples being provided solely to assist in the understanding of the methods of the present application and the core ideas thereof; meanwhile, as those skilled in the art will have modifications in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (10)

1. A method of privacy processing performed on a user device, the method comprising:
detecting whether a screen peeping event occurs;
executing a first peep-proof operation based on the detection of the occurrence of the screen peep event; the first peep-proof operation comprises the steps of generating prompt information and/or a screen extinguishing;
wherein, the occurrence of the screen peeping event includes:
The user equipment detects that a user executes an anti-peeping gesture; and/or
The user equipment detects that a specific object approaches the user equipment; and/or
The user device detects that an unauthenticated face is gazing at a screen of the user device.
2. The method according to claim 1, wherein the method further comprises:
executing a second peep-proof operation based on determining that the user equipment is displaying private content; the second peep-proof operation comprises screen extinguishing and/or early warning information generation.
3. The method of claim 1, wherein the performing a first privacy operation comprises:
and under the condition that the display content comprises streaming media content, suspending playing of the streaming media content, and executing screen-extinguishing operation.
4. The method of claim 2, wherein the performing a second privacy operation comprises:
and under the condition that the privacy content comprises streaming media content and the streaming media content is in a mode of disallowing watching simultaneously, suspending playing of the streaming media content and sending out prompt information.
5. The method of claim 1, wherein the user device detecting that the user performs a privacy gesture comprises:
The user equipment detects that a user executes peep-proof gestures through the distance sensor and the optical sensor.
6. The method of claim 1, wherein the user device detecting that an unauthenticated face is gazing at a screen of the user device comprises:
the user equipment detects that an unauthenticated face looks at a screen of the user equipment through an artificial intelligence algorithm.
7. The method of any of claims 2-6, wherein the determining that the user device is displaying private content comprises:
and determining that the user equipment displays the private content according to the type of the display content.
8. A user device, comprising:
a sensor unit configured to detect whether a screen peeping event occurs;
a processor unit configured to perform a first privacy operation based on determining that a screen privacy event has occurred; the first peep-proof operation comprises the steps of generating prompt information and/or a screen extinguishing;
wherein, the occurrence of the screen peeping event includes:
the sensor unit detects that a user executes an anti-peeping gesture; and/or
The sensor unit detecting that a specific object is approaching the user equipment; and/or
The sensor unit detects that an unauthenticated face is gazing at a screen of the user equipment.
9. The user device of claim 8, wherein the processor unit is further configured to:
executing a second peep-proof operation based on determining that the user equipment is displaying private content; the second peep-proof operation comprises screen extinguishing and/or early warning information generation.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1-7.
CN202210712389.7A 2022-06-22 2022-06-22 Peep-proof processing method and device, user equipment and storage medium Pending CN117313175A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210712389.7A CN117313175A (en) 2022-06-22 2022-06-22 Peep-proof processing method and device, user equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210712389.7A CN117313175A (en) 2022-06-22 2022-06-22 Peep-proof processing method and device, user equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117313175A true CN117313175A (en) 2023-12-29

Family

ID=89272502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210712389.7A Pending CN117313175A (en) 2022-06-22 2022-06-22 Peep-proof processing method and device, user equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117313175A (en)

Similar Documents

Publication Publication Date Title
US20210073421A1 (en) Video-based privacy supporting system
US9600688B2 (en) Protecting display of potentially sensitive information
US20160227107A1 (en) Method and device for notification preview dismissal
US9405918B2 (en) Viewer-based device control
EP2979154B1 (en) Display device and control method thereof
CN108062490A (en) Glance prevention method, terminal and computer-readable medium
CN107783643A (en) A kind of method and device for protecting user's eyesight
CN104463041A (en) Peep prevention method and device for screen
KR101230265B1 (en) Method for displaying information of terminal by gaze recognition, and the terminal thereof
CN104715213B (en) Public for public computer user checks safety
CN105279459A (en) Terminal anti-peeping method and mobile terminal
CN109120770A (en) Terminal method for secret protection, terminal and computer readable storage medium
CN110458890A (en) Control method, device, electronic equipment and storage medium
US11010980B2 (en) Augmented interface distraction reduction
EP3641280A1 (en) Unlocking of a mobile terminal by face-recognition of a slidable camera
KR102365995B1 (en) Display device capable of automatically adjusting displayed image and method thereof
WO2021092769A1 (en) Security protection method and device, mobile terminal, and storage medium
CN117313175A (en) Peep-proof processing method and device, user equipment and storage medium
CN111931712A (en) Face recognition method and device, snapshot machine and system
CN111177770B (en) Sensitive information protection method, mobile equipment and storage device
CN110490583A (en) Method of payment and terminal device
CN107358117B (en) Switching method, electronic equipment and computer storage medium
CN110866292A (en) Interface display method and device, terminal equipment and server
US20230008255A1 (en) Privacy protection for electronic devices in public settings
CN111176501B (en) Display area adjusting method, user equipment and device with storage function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination