WO2012094931A1 - 一种安全类软件的窗体显示方法及装置 - Google Patents
一种安全类软件的窗体显示方法及装置 Download PDFInfo
- Publication number
- WO2012094931A1 WO2012094931A1 PCT/CN2011/083404 CN2011083404W WO2012094931A1 WO 2012094931 A1 WO2012094931 A1 WO 2012094931A1 CN 2011083404 W CN2011083404 W CN 2011083404W WO 2012094931 A1 WO2012094931 A1 WO 2012094931A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- style
- security
- detection result
- software
- processing
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Definitions
- the present invention relates to computer technology, and more particularly to a window display method and apparatus for security software. Background technique
- Skinning technology is the product of a diversified software user.
- the user's long-term exposure to a style of software display form will be annoying, so I hope to change the style of the software, and skinning technology came into being.
- the software developer provides several sets of form styles for the user to select.
- the displayed form is the default form style. After that, the user can specify several sets of form styles. The selection is made, and after receiving the user's selection, it is displayed, and the skinning is completed; the next time the main program is entered, the displayed form is the style of the skin after the skinning, that is, the form style selected by the user.
- the displayed form when entering the main program for the first time, is the default form style. After that, the user can set the personalized form style according to the color, pattern or pattern that he likes, in the form style. Add user-defined form style, then the user can choose between the form style and the custom form style that comes with the software. After receiving the user's choice, it will be displayed and finished skinning; next time after entering the main program , the displayed form is the skin style after skinning, that is, the user selects Choose the style of the form.
- the main object of the present invention is to provide a window display method and apparatus for security software, which can perform smart skin resurfacing in combination with the characteristics of the security software.
- a form display method for a security software comprising: processing a form based on a selected form style according to a security type software detection result of a processing device security state, and displaying a form corresponding to the detection result.
- the detecting result of the security state of the processing device according to the security software is processed according to the selected form style, and the method includes: the security software detects the security state of the processing device, and is based on the selected form according to the detection result. Style handles the form.
- the processing the form according to the selected form style according to the detection result includes: when the detection result is safe to run, the form is processed as a form displayed when the security is run based on the selected form style;
- the form is processed as a form displayed when there is a security risk based on the selected form style
- the form is treated as a form that is displayed when the virus is infected.
- the processing of the form based on the selected form style according to the detection result includes:
- the security class software performs corresponding processing on the form according to the set rule according to the selected form style according to the detection result.
- the detection result of the security state of the processing device according to the security software is based on the selected form
- the method further includes: presetting a form corresponding to the detection result based on each of the alternative form styles; and processing the form according to the selected form style according to the detection result, including : Calls the corresponding form based on the selected form style based on the detection result.
- the method further includes: selecting a form style of the security software according to the input information of the received user.
- the form style of the selected security software is specifically: a form style provided in the security software, or a custom form style, or a form style and a custom form provided by the security software.
- the style of the form is selected in the style.
- a form display device for security software comprising:
- the detecting unit is located in the security software for detecting the security state of the processing device; the processing unit is configured to process the window based on the selected form style according to the detection result obtained by the detecting unit;
- a display unit for displaying a form corresponding to the detection result.
- the apparatus further includes: a selecting unit configured to select a form style of the security software according to the received input information of the user.
- the apparatus further includes: a custom unit configured to generate input user-defined form styles for the received user input information.
- the solution of the invention combines the characteristics of the security software, and proposes a scheme that can display different forms according to the detection result of the processing device in a form style, so that the user can intuitively feel the processing through the intelligent display form.
- the current security status of the device so that the skinning technology of the security software can intuitively and vividly inform the user whether the processing device used is safe or dangerous.
- the processing device is not safe, the user is reminded to solve the security risk or kill the virus at any time, and the human-computer interaction is very friendly.
- the solution of the present invention is intelligently displayed according to different detection states of the security state of the processing device Different forms are displayed based on the display to inform the user of the current security status of the device. It is not only suitable for general users, but also suitable for users with low vision, poor reading ability and pursuit of fashion personalization.
- 1 is a schematic diagram of an existing principle of implementing a skinning technique
- FIG. 2 is a schematic diagram showing the implementation principle of another existing skinning technology
- FIG. 3 is a schematic flowchart of implementing a security software form display in the present invention.
- FIG. 4 is a schematic diagram of a principle for processing a window in the present invention.
- FIG. 5 is a schematic structural diagram of a security software form display device according to the present invention
- FIG. 6 is a schematic diagram of a display window during a secure operation according to the present invention
- FIG. 7 is a schematic diagram of a display window when there is a security risk in the present invention.
- Fig. 8 is a schematic view showing a form of a virus in the present invention. detailed description
- the window is processed based on the selected form style, and a form corresponding to the detection result is displayed.
- the processing device may specifically be a processing device such as a computer, a mobile terminal, or a personal digital assistant (PDA).
- the detection results include information such as operational safety, security risks, infections, and the like indicating the security status of the processing device.
- FIG. 3 is a schematic flowchart of implementing a security software form display according to the present invention. As shown in FIG. 3, the process of implementing the security software form display includes:
- Step 301 Select the form style of the security software.
- the user triggers the skinning mechanism and selects the form style of the security software.
- Users can choose a form style in the form style of the security software, or the custom form style, or the form style and custom form style that comes with the security software.
- the security software selects the form style based on the user's input information.
- Step 302 After receiving the input information of the form style selected by the user, the security software detects the security state of the processing device, and processes the window according to the selected form style according to the detection result, that is, proceeds to step 303. Or step 304, or step 305.
- the security software After receiving the input information of the user-selected form style, the security software triggers the detection of the security status of the processing device.
- the security software detects the security status of the processing device in exactly the same way as the existing security software. It is not mentioned here.
- Step 303 When the test results are safe to run, based on the selected form style, the form is processed as a form that is displayed when the security is run.
- the security software When the security software detects the security status of the processing device and the detection result is running security, the security software processes the form as a form displayed when running security based on the selected form style.
- Step 304 When the detection result is a security risk, the form is processed as a form displayed when there is a security risk based on the selected form style.
- the security software detects the security status of the processing device.
- the security software processes the form as a form that is displayed when there is a security risk based on the selected form style.
- the security risk may be a software patch or a vulnerability.
- Step 305 When the detection result is infected, based on the selected form style, the form is processed as a form that is displayed when the virus is infected.
- the security software When the security software detects the security status of the processing device and the detection result is infected with a virus, the security software processes the form as a form displayed when the virus is infected based on the selected form style.
- Step 306 Display the corresponding form.
- the security class software displays the corresponding form, which is the form corresponding to the detection result. According to the above description, the security software can intuitively and vividly inform the user to process the processing by intelligently displaying the corresponding form to the user according to the detection result, combining the characteristics of the security software.
- the current security status is prepared, so that when the processing device is unsafe, the user is reminded to release the security risk or kill the virus at any time, and the human-computer interaction is very friendly.
- the window is processed according to the selected form style, and specifically: the security software is based on the selected form style, and the window body is correspondingly processed according to the detection result according to the detection result.
- the setting rule is: When the detection result is safe operation of the processing device, the elements of the form, the control style, the font color, the font size and the like are not processed; the detection result is that the processing device has a security risk, and the form is Lightly render one or more of the pattern, control style, font color, font size, etc., such as appropriately enlarging part of the pattern in the form, and/or appropriately darkening the font color, and/or magnifying the font appropriately
- the detection result is that the processing device is infected with a virus, and the one or more elements of the form, the control style, the font color, the font size, and the like are heavily rendered, for example, highlighting some patterns in the form, and / Or change the font color to the deepest, and / or enlarge the font to very obvious, etc
- the form repainting mechanism When you need to lightly render or re-render one or more elements of the form's pattern, control style, font color, font size, etc., specifically, the form repainting mechanism will be triggered on the form's pattern and control style. Repaint one or more of the font color, font size, and so on.
- the above described processing the form based on the selected form style according to the detection result may be: based on each selectable form style, a form corresponding to the detection result is preset, that is, based on each set
- the skinning style of the form is set to three different levels of security.
- the detection result may be safe running, security risks, and virus infection.
- the security form For each selectable form style, set the security form, hidden form, and virus respectively.
- the form corresponds to the detection result--safe operation, safety hazard, virus infection, and after the detection result is obtained, the corresponding form is called according to the selected form style according to the detection result, that is, the detection result is processed.
- the safe form in the selected form style is called; when the detection result is a security risk in the processing device, the call is selected.
- the hidden form in the form style; the result of the test is to call the virus form in the selected form style when the processing device is infected with a virus.
- all the form styles can be placed in the form style container, and a mapping mechanism is established for each form style, that is, each form style is set with a window corresponding to the detection result.
- the body such as the form style 1 includes a security form, a hidden form, and a dangerous form, so that the skinning process can be dynamically performed according to the detection result in the subsequent processing, that is, dynamically displayed according to the detection result of the security state of the processing device by the security software.
- Each form is a combination of a series of form patterns, control styles, font colors, and font sizes. These elements can be set automatically by the user's manual or security software through the form configuration style.
- FIG. 5 is a schematic structural diagram of a security software form display device according to the present invention.
- the device includes: a detecting unit, a processing unit, and a display unit, wherein the detecting unit is located in a security software for processing The safety state of the device is detected, and the detection result is provided to the processing unit; the processing unit is configured to process the window according to the selected form style according to the detection result obtained by the detecting unit; the display unit is configured to display the corresponding detection result Form.
- the processing unit can be located in either the security software or the security software.
- the device further includes: a selecting unit, configured to select a form style of the security software according to the received input information of the user.
- the selected form style can be a form style that comes with the security software, it can also be a user-defined form style.
- the device is also The method includes: a custom unit, configured to generate a user-defined form style according to the input information of the received user.
- the user's input information can be the color, pattern or pattern selected by the user.
- Figure 6 to Figure 8 is a schematic diagram of the form of the security software based on the above scheme. It can be seen from FIG. 6 to FIG.
- the ecological protection if the detection result is safe operation of the processing device, there is no shark in the displayed form, reflecting a kind A harmonious atmosphere to inform the user that the current security status of the processing device is good; if the detection result is a security risk in the processing device, there is a shark that is cruising in the displayed form, reflecting a crisis atmosphere, to remind the user to handle at any time. The device will be threatened at any time, and it is necessary to eliminate security risks. If the detection result is that the processing device is infected with viruses, the displayed form has an oncoming shark, which reflects an atmosphere of being attacked, so as to remind the user to handle the device at any time.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
- Digital Computer Display Output (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BR112013013906A BR112013013906A2 (pt) | 2011-01-11 | 2011-12-02 | método para exibir uma janela do software da classe de segurança e dispositivo para exibir uma janela do software da classe de segurança |
US13/900,638 US20130254702A1 (en) | 2011-01-11 | 2013-05-23 | Method and Device for Displaying Window of Security Class Software |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110004615.8A CN102591626B (zh) | 2011-01-11 | 2011-01-11 | 一种安全类软件的窗体显示方法及装置 |
CN201110004615.8 | 2011-01-11 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/900,638 Continuation US20130254702A1 (en) | 2011-01-11 | 2013-05-23 | Method and Device for Displaying Window of Security Class Software |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012094931A1 true WO2012094931A1 (zh) | 2012-07-19 |
Family
ID=46480359
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2011/083404 WO2012094931A1 (zh) | 2011-01-11 | 2011-12-02 | 一种安全类软件的窗体显示方法及装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20130254702A1 (zh) |
CN (1) | CN102591626B (zh) |
BR (1) | BR112013013906A2 (zh) |
WO (1) | WO2012094931A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9699295B2 (en) | 2013-04-24 | 2017-07-04 | Xiaomi Inc. | Method for displaying an icon and terminal device thereof |
CN103226430B (zh) * | 2013-04-24 | 2016-09-28 | 小米科技有限责任公司 | 一种图标显示的方法及装置 |
CN106940774B (zh) * | 2017-03-22 | 2020-03-17 | 北京小米移动软件有限公司 | 病毒扫描方法和装置 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1755639A (zh) * | 2004-09-30 | 2006-04-05 | 微软公司 | 安全状态监控器 |
CN101359291A (zh) * | 2008-09-08 | 2009-02-04 | 深圳华为通信技术有限公司 | 一种更换界面风格的方法与设备 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6535227B1 (en) * | 2000-02-08 | 2003-03-18 | Harris Corporation | System and method for assessing the security posture of a network and having a graphical user interface |
US7373505B2 (en) * | 2004-04-15 | 2008-05-13 | Microsoft Corporation | Displaying a security element with a browser window |
US7996045B1 (en) * | 2007-11-09 | 2011-08-09 | Google Inc. | Providing interactive alert information |
US9237166B2 (en) * | 2008-05-13 | 2016-01-12 | Rpx Corporation | Internet search engine preventing virus exchange |
US8624731B2 (en) * | 2010-04-27 | 2014-01-07 | Dell Products L.P. | Information handling system status alert system |
JP2012068955A (ja) * | 2010-09-24 | 2012-04-05 | Nec Corp | 表示画面管理モジュール、情報処理端末および表示画面管理方法 |
US9854024B2 (en) * | 2011-06-28 | 2017-12-26 | Hewlett-Packard Development Company, L.P. | Display of operating status information of a client in a remote desktop session |
-
2011
- 2011-01-11 CN CN201110004615.8A patent/CN102591626B/zh active Active
- 2011-12-02 WO PCT/CN2011/083404 patent/WO2012094931A1/zh active Application Filing
- 2011-12-02 BR BR112013013906A patent/BR112013013906A2/pt not_active Application Discontinuation
-
2013
- 2013-05-23 US US13/900,638 patent/US20130254702A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1755639A (zh) * | 2004-09-30 | 2006-04-05 | 微软公司 | 安全状态监控器 |
CN101359291A (zh) * | 2008-09-08 | 2009-02-04 | 深圳华为通信技术有限公司 | 一种更换界面风格的方法与设备 |
Also Published As
Publication number | Publication date |
---|---|
CN102591626B (zh) | 2015-11-25 |
US20130254702A1 (en) | 2013-09-26 |
BR112013013906A2 (pt) | 2016-09-13 |
CN102591626A (zh) | 2012-07-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3349424B1 (en) | Method for protecting privacy information and terminal device | |
CN107715454B (zh) | 信息处理方法、装置、电子设备及存储介质 | |
US9104299B2 (en) | Method and corresponding apparatus for displaying arc menu index | |
US9360953B2 (en) | Method and system for unlocking a device having a touch screen | |
EP3549089A1 (en) | Generating and displaying customized avatars in electronic messages | |
CN106201733A (zh) | 用于处理装置之间的输入的方法及其电子装置 | |
KR20150128303A (ko) | 복수의 디스플레이들을 제어하는 방법 및 장치 | |
WO2017113821A1 (zh) | 一种智能手机操作方法、装置及智能手机 | |
CN105335633B (zh) | 一种移动终端防偷窥方法及移动终端 | |
CN104123097B (zh) | 控制应用执行方法及装置 | |
CN105487794B (zh) | 未读信息的数量处理方法及装置和终端 | |
US20230117161A1 (en) | Method and system for controlling a floating window | |
WO2014206324A1 (zh) | 软键盘的显示方法和终端 | |
CN106155317A (zh) | 一种终端屏幕控制方法和终端 | |
CN105159557B (zh) | 一种解锁密码的生成方法及移动终端 | |
CN106775647A (zh) | 一种移动终端的控制方法、控制装置及移动终端 | |
US20230152956A1 (en) | Wallpaper display control method and apparatus and electronic device | |
WO2012094931A1 (zh) | 一种安全类软件的窗体显示方法及装置 | |
CN107682665B (zh) | 一种监控方法及移动终端 | |
CN105892664B (zh) | 一种信息处理方法及电子设备 | |
US9435801B2 (en) | Systems and methods to manage zooming | |
WO2022148499A1 (zh) | 空调器及其控制方法、存储介质、控制装置 | |
US8543942B1 (en) | Method and system for touch-friendly user interfaces | |
CN107526821A (zh) | 一种链接查看方法及装置、终端和可读存储介质 | |
WO2015161775A1 (en) | Gui display method and apparatus, and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11855344 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112013013906 Country of ref document: BR |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 17/09/2013) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11855344 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 112013013906 Country of ref document: BR Kind code of ref document: A2 Effective date: 20130605 |