WO2016058484A1 - 一种屏幕敏感信息处理方法及装置 - Google Patents
一种屏幕敏感信息处理方法及装置 Download PDFInfo
- Publication number
- WO2016058484A1 WO2016058484A1 PCT/CN2015/091215 CN2015091215W WO2016058484A1 WO 2016058484 A1 WO2016058484 A1 WO 2016058484A1 CN 2015091215 W CN2015091215 W CN 2015091215W WO 2016058484 A1 WO2016058484 A1 WO 2016058484A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- sensitive information
- area
- light intensity
- threshold
- screen
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
- G06T11/20—Drawing from basic elements, e.g. lines or circles
- G06T11/206—Drawing of charts or graphs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/017—Gesture based interaction, e.g. based on a set of recognized hand gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
Definitions
- the present invention relates to the field of information processing technologies, and in particular, to a screen information processing method and apparatus.
- the purpose of the embodiment of the present application is to provide a screen sensitive information processing method and device, so as to prevent information displayed on the screen of the electronic device from being peeked, thereby improving the security of the user's access to the information.
- the embodiment of the present application provides a screen sensitive information processing method, including:
- the method further includes: monitoring whether the light intensity detected by the light sensor is reduced to a second threshold, and identifying the sensitive information of the screen being shielded when the detected light intensity decreases to a second threshold Zone and remove the mask for the area where the sensitive information is located.
- the content displayed by the area where the sensitive information is shielded includes: displaying a rectangular picture in an area where the sensitive information is located.
- the content displayed by the area where the sensitive information is shielded includes:
- the rendering of the rectangular picture is performed, the area where the sensitive information is located displays the rendered rectangular picture, and the rectangular picture covers the original display content in the area where the sensitive information is located.
- the content displayed by the area where the sensitive information is masked includes: setting a background color attribute of the area where the sensitive information is located to a sensitive information color attribute.
- the removing the shielding of the area where the sensitive information is located includes: displaying the sensitive information of the area in the area where the sensitive information is located.
- the canceling the shielding of the area where the sensitive information is located comprises: rendering the original display content of the content displayed on the screen.
- the removing the shielding of the area where the sensitive information is located includes: setting a background color of the area where the sensitive information is located as an original background color attribute of the area.
- Another aspect of the present application also provides a screen sensitive information processing apparatus, the apparatus comprising:
- a first monitoring unit configured to monitor whether the light intensity detected by the light sensor is raised to a first threshold
- a first identifying unit configured to identify an area where the pre-defined sensitive information in the screen display content is located when the first monitoring unit detects that the light intensity increases to the first threshold
- the first shielding unit is configured to block the content displayed by the area where the sensitive information is located after the first identifying unit identifies the area where the sensitive information is pre-defined in the screen display content.
- the apparatus further comprises:
- a second monitoring unit configured to monitor whether the light intensity detected by the light sensor decreases to a second threshold
- a second identifying unit configured to identify an area where the pre-defined sensitive information in the screen display content is located when the second monitoring unit detects that the light intensity decreases to a second threshold
- the second shielding unit is configured to cancel the shielding of the area where the sensitive information is located after the second identifying unit identifies the area where the pre-defined sensitive information in the screen display content is located.
- the embodiment of the present application protects sensitive information by identifying an area where the pre-defined sensitive information in the content of the screen is displayed, and shielding the content displayed by the area where the sensitive information is located.
- the role of the user is greatly improved compared to the prior art.
- FIG. 1 is a schematic flowchart of a screen sensitive information processing method according to an embodiment of the present application
- FIG. 2 is a schematic flowchart of a screen sensitive information processing method according to Embodiment 1 of the present application;
- FIG. 3 is a schematic diagram showing an initial display state of an electronic device by taking a smart phone as an example
- FIG. 4 is a schematic diagram showing a screen state of an electronic device after shielding a sensitive information by displaying a rectangular picture
- FIG. 5 is a schematic diagram of a state in which a user's finger presses a light sensor to generate a screen state of an electronic device after unmasking;
- FIG. 6 is a schematic flowchart of a screen sensitive information processing method according to Embodiment 2 of the present application.
- FIG. 7 is a schematic flowchart of a screen sensitive information processing method according to Embodiment 3 of the present application.
- FIG. 8 is a schematic diagram of a screen sensitive information processing apparatus according to an embodiment of the present application.
- the user information is directly presented on the screen, which is easy to cause the user information to be peeped, revealing some sensitive private information, and causing unnecessary trouble to the user.
- the embodiment of the present application provides a screen sensitive information processing method. As shown in FIG. 1 , the method includes:
- Step S101 monitoring whether the light intensity detected by the light sensor is raised to a first threshold
- Step S102 When the detected light intensity is increased to the first threshold, identify an area where the pre-defined sensitive information in the screen display content is located, and block the content displayed by the area where the sensitive information is located.
- the area where the sensitive information in the predefined screen display content is located can be identified, and the area where the sensitive information is located is blocked.
- the content can effectively prevent the leakage of sensitive information of the user, and greatly improves the security of the user's access to information compared with the prior art.
- FIG. 2 is a schematic flowchart diagram of a method for processing screen sensitive information according to the embodiment.
- the screen sensitive information processing method can be applied to any electronic device capable of displaying information, such as a mobile smart phone, a tablet electronic device, a portable computer (for example, A device such as a notebook computer, a personal digital assistant (PDA), a desktop computer, or the like that can display information through a screen.
- Applications for information displayed on the screen include, but are not limited to, social platform applications (eg, Facebook, Twitter, Weibo), mail applications, short message (SMS) applications, multimedia information (MMS) applications, and the like.
- social platform applications eg, Facebook, Twitter, Weibo
- SMS short message
- MMS multimedia information
- the screen sensitive information processing method includes the following steps:
- Step S201 The electronic device 1 opens an application, and the screen 10 displays information of the current application page.
- the content displayed on the screen 10 after the electronic device 1 opens the application assuming that all information displayed on the current screen 10 includes information A101, information B102, information C103, information D104, and information E105, wherein the information A101 is predefined. Sensitive information.
- Step S202 Monitor whether the light intensity detected by the light sensor 11 is raised to a first threshold.
- the current application can monitor the ambient light intensity by calling the light sensor API of the electronic device 1, and the light sensor can be called by the light sensor API of the electronic device 1 after the application is started, so when the application is just started in step S201
- the initial display state of the screen 10 is a state in which the sensitive information is not shielded.
- the electronic device light sensor API is called, if the detected light intensity is lower than the first threshold, the current page is continuously displayed, if the detected light intensity is high. When the first threshold is reached, the process proceeds to step S203.
- Step S203 When it is detected that the light intensity is increased to the first threshold, the recognition screen 10 displays the area where the sensitive information in the content is located, and blocks the content displayed by the area where the sensitive information is located by displaying the rectangular picture 101'.
- FIG. 4 is a schematic diagram showing the display state of the electronic device screen after the sensitive information is masked by displaying the rectangular picture.
- the area where the pre-defined sensitive information is located is identified, and the area where the sensitive information is identified may be set by first labeling each display area, and when the light intensity increases to the first threshold event.
- the tags are identified, the area where the sensitive information is located can be located through the tag, and the sensitive information can be shielded by using the set rectangular image 101' to cover the sensitive information in the area where the sensitive information is located, or by setting The rectangular picture 101' replaces the original sensitive information display to achieve shielding of sensitive information.
- the area where the sensitive information is located is a rectangular space, and the rectangular space is determined by a coordinate point and an area.
- the detected light intensity is greater than the first threshold
- the lower left corner of the area where the sensitive information is located is first located.
- the coordinate point starts to acquire a rectangle through the coordinate point of the lower left corner to shield the sensitive information.
- coordinate points may also be other positions of the area where the sensitive information is located, for example, the upper left corner, the lower right corner, and the like, and may be other forms in practice, and the embodiment of the present application is not limited thereto.
- Step S204 Monitor whether the light intensity detected by the light sensor 11 decreases to a second threshold.
- Step S205 When the detected light intensity decreases to the second threshold, identify the area where the masked sensitive information in the screen 10 is located, and display the sensitive information in the area where the sensitive information is located, and cancel the display in the area where the sensitive information is located.
- the rectangular picture 101' implements the masking of the area where the sensitive information is located.
- the event that the light intensity is as low as the second threshold is caused by blocking the light sensor 11 with the finger 111, the area of the predefined sensitive information is identified, and the mask display is cancelled.
- Sensitive information as shown in Figure 5. It should be clear to those skilled in the art that the triggering mode for reducing the light intensity monitored by the light sensor 11 to the second threshold is not limited to only one way of covering the light sensor 11 by the finger 111 in FIG. 5, and may actually be other in practice. The embodiments of the present application are not limited thereto.
- the light intensity gradually increases.
- the sensitive information continues to be displayed, and when the light sensor 11 detects that the light intensity is increased to the first
- the process proceeds to step S203 to block the sensitive information.
- the first threshold mentioned in this embodiment is greater than or equal to the second threshold.
- the screen sensitive information processing method of the embodiment after the detected light intensity is increased to the first threshold, the area where the sensitive information is located can be located, and the sensitive information can be shielded by displaying a rectangular picture in the area where the sensitive information is located, thereby effectively preventing The user's sensitive information is leaked, and after the detected light intensity is reduced to the second threshold, the shielding of the area where the sensitive information is located can be cancelled, and the user's request for information can be satisfied, and the user's access information is greatly improved compared with the prior art. Security.
- FIG. 6 is a schematic flowchart diagram of a screen sensitive information processing method according to an embodiment, where the screen sensitive information processing method can be applied to any electronic device capable of displaying information, such as a mobile smart phone, a tablet electronic device, a portable computer (for example, A device such as a notebook computer, a personal digital assistant (PDA), a desktop computer, or the like that can display information through a screen.
- Applications for information displayed on the screen include, but are not limited to, social platform applications (eg, Facebook, Twitter, Weibo), mail applications, short message (SMS) applications, multimedia information (MMS) applications, and the like.
- social platform applications eg, Facebook, Twitter, Weibo
- SMS short message
- MMS multimedia information
- the screen sensitive information processing method includes the following steps:
- Step S301 The electronic device opens the application, and the screen displays information of the current application page.
- the content displayed on the screen after the electronic device opens the application includes information A, information B, information C, information D, and information E, wherein the information A is sensitive information.
- Step S302 Monitor whether the light intensity detected by the light sensor is raised to a first threshold.
- the current application can monitor the ambient light intensity by calling the light sensor API of the electronic device, and the light intensity monitoring can be performed by calling the electronic device light sensor API after the application is started, so when the application is just started in step S301, the screen The initial display content is a state in which the sensitive information is not masked.
- the electronic device light sensor API is called, if the detected light intensity is lower than the first threshold, the current page is continuously displayed, if the detected light intensity is higher than the first When the threshold is reached, the process proceeds to step S303.
- Step S303 When it is detected that the light intensity is increased to the first threshold, the area where the pre-defined sensitive information in the screen display content is located is identified, and the original display content is rendered on the screen display content of the area;
- a rectangular picture is rendered, and the area where the sensitive information is located displays the rendered rectangular picture, and the rectangular picture covers the original display content in the area where the sensitive information is located.
- identifying an area in which the pre-defined sensitive information is located may set a label for each display area in advance, and when the light intensity increases to a first threshold event, the labels are identified, and the sensitive information can be located through the label.
- the area is rendered twice in the area where the sensitive information is located. The first time the sensitive information is rendered, all the display content is drawn on the screen, and the second time the image for the occlusion is rendered in the area where the sensitive information is located. That is to say, the image of the second rendering interface will cover the sensitive information of the first rendering, and shield the sensitive information.
- Step S304 Monitor whether the light intensity detected by the light sensor decreases to a second threshold.
- Step S305 When the detected light intensity decreases to the second threshold, identify an area where the masked sensitive information is located in the screen, perform rendering of the original display content for the area where the sensitive information is located, and cancel the area where the sensitive information is located. shield.
- the triggering method for reducing the light intensity detected by the light sensor to the second threshold is not limited to one way of covering the light sensor by the finger, and may be other forms in practice. Not limited to this.
- Step S303 blocks sensitive information.
- the first threshold mentioned in this embodiment is greater than or equal to the second threshold.
- the area where the sensitive information is located can be located in a predefined manner, and the sensitive information is first rendered by two interface renderings.
- the second way of rendering the occlusion image, shielding sensitive information can effectively prevent the leakage of sensitive information of the user, and after the detected light intensity is reduced to the second threshold, the original display content is rendered, and the sensitive information can be cancelled.
- the shielding of the area in which it is located meets the needs of users for accessing information, and greatly improves the security of user access to information compared with the prior art.
- FIG. 7 is a schematic flowchart diagram of a screen sensitive information processing method according to an embodiment, where the screen sensitive information processing method can be applied to any electronic device capable of displaying information, such as a mobile smart phone, a tablet electronic device, a portable computer (for example, A device such as a notebook computer, a personal digital assistant (PDA), a desktop computer, or the like that can display information through a screen.
- Applications for information displayed on the screen include, but are not limited to, social platform applications (eg, Facebook, Twitter, Weibo), mail applications, short message (SMS) applications, multimedia information (MMS) applications, and the like.
- social platform applications eg, Facebook, Twitter, Weibo
- SMS short message
- MMS multimedia information
- the screen sensitive information processing method includes the following steps:
- Step S401 The electronic device opens the application, and the screen displays information of the current application page.
- the content displayed on the screen after the electronic device opens the application includes information A, information B, information C, information D, and information E, wherein the information A is sensitive information.
- Step S402 Monitor whether the light intensity detected by the light sensor is raised to a first threshold.
- the current application can monitor the ambient light intensity by calling the light sensor API of the electronic device. Since the electronic device light sensor API can be called to monitor the light intensity after the application is started, the screen is just started when the application is started in step S401.
- the initial display content is the state in which the sensitive information is not blocked; the electronic device light sensor API is invoked. Thereafter, if the detected light intensity is lower than the first threshold, the current page is continuously displayed, and if the detected light intensity is higher than the first threshold, the process proceeds to step S403.
- Step S403 When the detected light intensity is increased to the first threshold, the area where the pre-defined sensitive information in the screen display content is located is identified, and the background color attribute of the area where the sensitive information is located is set as the sensitive information color attribute.
- identifying an area in which the pre-defined sensitive information is located may set a label for each display area in advance, and when the light intensity increases to a first threshold event, the labels are identified, and the sensitive information can be located through the label.
- the area is adjusted, and the background color attribute of the area where the sensitive information is located is adjusted to the color attribute of the sensitive information to shield the sensitive information.
- Step S404 Monitor whether the light intensity detected by the light sensor decreases to a second threshold.
- Step S405 When it is detected that the light intensity decreases to the second threshold, the area where the sensitive information shielded in the screen is located is identified, and the background color of the area where the sensitive information is located is set as the original background color attribute of the area.
- the event that the light intensity is as low as the second threshold is caused by covering the light sensor with a finger, and the area where the predefined sensitive information is located is identified, and the background color of the area where the sensitive information is located is identified. The property is restored to its original state and unmasked to display sensitive information.
- the triggering method for reducing the light intensity detected by the light sensor to the second threshold is not limited to one way of covering the light sensor by the finger, and may be other forms in practice. Not limited to this.
- Step S403 blocks sensitive information.
- the first threshold mentioned in this embodiment is greater than or equal to the second threshold.
- the area where the sensitive information is located can be located, and the sensitive information can be shielded by adjusting the background color attribute of the area where the sensitive information is located. Effectively preventing the leakage of sensitive information of the user; and after detecting that the light intensity is reduced to the second threshold, restoring the background color attribute of the area where the sensitive information is located, the shielding of the area where the sensitive information is located can be cancelled, and the requirement for the user to view the information is satisfied.
- the security of the user's access to information is greatly improved.
- the embodiment of the present application further provides a screen sensitive information processing apparatus 800, as shown in FIG. 8, comprising: a first monitoring unit 801, a first identifying unit 802, and a first shielding unit 803, wherein the first monitoring unit 801 is used by the first monitoring unit 801. And detecting whether the light intensity detected by the light sensor is raised to a first threshold; the first identifying unit 802 is configured to identify the pre-defined sensitive information in the screen display content when the first monitoring unit 801 detects that the light intensity increases to the first threshold.
- the first shielding unit 803 is configured to identify, after the first identification unit 802, the area where the pre-defined sensitive information in the screen display content is located The content displayed in the area where the sensitive information is located.
- the device provided by the embodiment of the present application further includes: a second monitoring unit, a second identifying unit, and a second shielding unit, wherein the second monitoring unit is configured to monitor whether the light intensity detected by the light sensor decreases to a second threshold;
- the second identifying unit is configured to identify an area where the pre-defined sensitive information in the screen display content is located when the second monitoring unit detects that the light intensity decreases to the second threshold;
- the second shielding unit is configured to identify the screen in the second identifying unit The area where the sensitive information is pre-defined in the content is displayed, and the mask of the area where the sensitive information is located is canceled.
- the screen sensitive information processing apparatus can locate the area where the sensitive information is located after the light intensity is increased to the first threshold, and can effectively display the content displayed in the area where the sensitive information is located. Preventing the leakage of sensitive information of the user, and after detecting that the light intensity decreases to the second threshold, restoring the background color attribute of the area where the sensitive information is located, the shielding of the area where the sensitive information is located may be cancelled, and the user's need for accessing information may be satisfied, and Compared with the prior art, the security of the user's access to information is greatly improved.
- PLD Programmable Logic Device
- FPGA Field Programmable Gate Array
- HDL Hardware Description Language
- the controller can be implemented in any suitable manner, for example, the controller can take the form of, for example, a microprocessor or processor Computer readable media, logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers, and computer readable program code (eg, software or firmware) executable by the (micro)processor Embedded in the form of a microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory's control logic.
- ARC 625D ARC 625D
- Atmel AT91SAM Microchip PIC18F26K20
- Silicone Labs C8051F320 Silicone Labs C8051F320
- the controller can be logically programmed by means of logic gates, switches, ASICs, programmable logic controllers, and embedding.
- Such a controller can therefore be considered a hardware component, and the means for implementing various functions included therein can also be considered as a structure within the hardware component.
- a device for implementing various functions can be considered as a software module that can be both a method of implementation and a structure within a hardware component.
- the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
- the present application can be implemented by means of software plus a necessary general hardware platform. Based on such understanding, portions of the technical solution of the present application that contribute substantially or to the prior art may be embodied in the form of a software product.
- the computing device includes one or more processors (CPU ), input / output interface, network interface and memory.
- the computer software product can include instructions for causing a computer device (which can be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present application or portions of the embodiments.
- the computer software product can be stored in a memory, which may include non-persistent memory, random access memory (RAM), and/or nonvolatile memory in a computer readable medium, such as read only memory (ROM) or Flash memory.
- RAM random access memory
- ROM read only memory
- Memory is an example of a computer readable medium.
- Computer readable media includes both permanent and non-persistent, removable and non-removable media.
- Information storage can be implemented by any method or technology.
- the information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory.
- PRAM phase change memory
- SRAM static random access memory
- DRAM dynamic random access memory
- RAM random access memory
- ROM read only memory
- EEPROM electrically erasable programmable read only memory
- flash memory or other memory technology
- compact disk read only memory CD-ROM
- DVD digital versatile disk
- Magnetic tape cartridges magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
- computer readable media does not include transitory computer readable media, such as modulated data signals and carrier waves.
- This application can be used in a variety of general purpose or special purpose computer system environments or configurations.
- the application can be described in the general context of computer-executable instructions executed by a computer, such as a program module.
- program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types.
- the present application can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are connected through a communication network.
- program modules can be located in both local and remote computer storage media including storage devices.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- User Interface Of Digital Computer (AREA)
- Controls And Circuits For Display Device (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (13)
- 一种屏幕敏感信息处理方法,其特征在于,该方法包括:监测光线传感器检测到的光强度是否提高至第一阈值,当监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域,并屏蔽所述敏感信息所在的区域所显示的内容。
- 根据权利要求1所述的方法,其特征在于,该方法还包括:监测光线传感器检测到的光强度是否降低至第二阈值,当监测到光强度降低至第二阈值时,识别屏幕中被屏蔽的敏感信息所在的区域,并取消对该敏感信息所在的区域的屏蔽。
- 根据权利要求2所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显示的内容包括:在所述敏感信息所在的区域内显示矩形图片。
- 根据权利要求3所述的方法,其特征在于,所述取消对该敏感信息所在区域的屏蔽包括:在所述敏感信息所在的区域内显示该区域的敏感信息。
- 根据权利要求2所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显示的内容包括:进行矩形图片的渲染,所述敏感信息所在的区域显示被渲染后的矩形图片,且所述矩形图片遮盖所述敏感信息所在区域内的原始显示内容。
- 根据权利要求5所述的方法,其特征在于,所述取消对该敏感信息所在区域的屏蔽包括:对所述屏幕显示的内容进行原始显示内容的渲染。
- 根据权利要求2所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显示的内容包括:将所述敏感信息所在区域的背景色属性设置为敏感信息颜色属性。
- 根据权利要求7所述的方法,其特征在于,所述取消对该敏感信息所在区域的屏蔽包括:将所述敏感信息所在区域的背景色设置为该区域原始背景色属性。
- 根据权利要求1所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显示的内容包括:在所述敏感信息所在的区域内显示矩形图片。
- 根据权利要求1所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显 示的内容包括:进行矩形图片的渲染,所述敏感信息所在的区域显示被渲染后的矩形图片,且所述矩形图片遮盖所述敏感信息所在区域内的原始显示内容。
- 根据权利要求1所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显示的内容包括:将所述敏感信息所在区域的背景色属性设置为敏感信息颜色属性。
- 一种屏幕敏感信息处理装置,其特征在于,该装置包括:第一监测单元,用于监测光线传感器检测到的光强度是否提高至第一阈值;第一识别单元,用于在第一监测单元监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域;第一屏蔽单元,用于在第一识别单元识别到屏幕显示内容中预先定义的敏感信息所在的区域后屏蔽所述敏感信息所在的区域所显示的内容。
- 根据权利要求12所述的装置,其特征在于,该装置还包括:第二监测单元,用于监测光线传感器检测到的光强度是否降低至第二阈值;第二识别单元,用于在第二监测单元监测到光强度降低至第二阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域;第二屏蔽单元,用于在第二识别单元识别到屏幕显示内容中预先定义的敏感信息所在的区域后取消对该敏感信息所在的区域的屏蔽。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP15850987.7A EP3208703B1 (en) | 2014-10-14 | 2015-09-30 | Method and apparatus for processing screen sensitive information |
JP2017519890A JP6550461B2 (ja) | 2014-10-14 | 2015-09-30 | 画面上機密情報処理方法及び装置 |
PL15850987T PL3208703T3 (pl) | 2014-10-14 | 2015-09-30 | Sposób i urządzenie do przetwarzania informacji wrażliwych na ekranie |
SG11201702829RA SG11201702829RA (en) | 2014-10-14 | 2015-09-30 | Method and apparatus for processing screen sensitive information |
ES15850987T ES2799928T3 (es) | 2014-10-14 | 2015-09-30 | Método y aparato para procesamiento de información sensible en una pantalla |
KR1020177009816A KR102084833B1 (ko) | 2014-10-14 | 2015-09-30 | 스크린 민감 정보를 처리하는 방법 및 장치 |
US15/481,215 US10424094B2 (en) | 2014-10-14 | 2017-04-06 | Processing screen sensitive information |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410542077.1 | 2014-10-14 | ||
CN201410542077.1A CN105511751A (zh) | 2014-10-14 | 2014-10-14 | 一种屏幕敏感信息处理方法及装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/481,215 Continuation US10424094B2 (en) | 2014-10-14 | 2017-04-06 | Processing screen sensitive information |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016058484A1 true WO2016058484A1 (zh) | 2016-04-21 |
Family
ID=55719775
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/091215 WO2016058484A1 (zh) | 2014-10-14 | 2015-09-30 | 一种屏幕敏感信息处理方法及装置 |
Country Status (10)
Country | Link |
---|---|
US (1) | US10424094B2 (zh) |
EP (1) | EP3208703B1 (zh) |
JP (1) | JP6550461B2 (zh) |
KR (1) | KR102084833B1 (zh) |
CN (1) | CN105511751A (zh) |
ES (1) | ES2799928T3 (zh) |
HK (1) | HK1222019A1 (zh) |
PL (1) | PL3208703T3 (zh) |
SG (2) | SG11201702829RA (zh) |
WO (1) | WO2016058484A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108881116A (zh) * | 2017-05-11 | 2018-11-23 | 阿里巴巴集团控股有限公司 | 展现敏感信息的实现方法和装置 |
CN109918953B (zh) * | 2018-09-27 | 2021-02-19 | 用友网络科技股份有限公司 | 一种关键信息防窥视的显示方法及装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005107306A (ja) * | 2003-09-30 | 2005-04-21 | Sharp Corp | 液晶表示構造体 |
CN102855453A (zh) * | 2011-06-30 | 2013-01-02 | 网秦无限(北京)科技有限公司 | 防止偷窥移动设备屏幕显示的方法和系统 |
CN102902703A (zh) * | 2012-07-19 | 2013-01-30 | 中国人民解放军国防科学技术大学 | 一种面向网络敏感信息的截图取证与锁定回访的方法 |
CN103077361A (zh) * | 2012-12-28 | 2013-05-01 | 东莞宇龙通信科技有限公司 | 移动终端及其防窥视方法 |
CN103402001A (zh) * | 2013-07-18 | 2013-11-20 | 沈阳华立德电子科技有限公司 | 一种基于光传感器的防盗手机及防盗方法 |
CN103955650A (zh) * | 2014-05-04 | 2014-07-30 | 合肥联宝信息技术有限公司 | 一种通过调节屏幕亮度防止窥视的方法及装置 |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001005787A (ja) * | 1999-06-17 | 2001-01-12 | Sharp Corp | 携帯型情報機器 |
JP4380633B2 (ja) * | 2003-12-12 | 2009-12-09 | セイコーエプソン株式会社 | 表示装置、および表示制御方法 |
JP2010010750A (ja) * | 2008-06-24 | 2010-01-14 | Nec Saitama Ltd | 携帯端末およびセキュリティロック制御方法 |
JP2011134137A (ja) * | 2009-12-24 | 2011-07-07 | Konica Minolta Business Technologies Inc | 情報表示装置及び表示制御プログラム |
KR20110084653A (ko) * | 2010-01-18 | 2011-07-26 | 삼성전자주식회사 | 휴대단말에서 프라이버시 보호 방법 및 장치 |
JP2011228872A (ja) * | 2010-04-19 | 2011-11-10 | Panasonic Corp | 携帯端末装置、携帯端末装置の制御方法、および携帯端末装置の制御プログラム |
US9141332B2 (en) * | 2010-08-09 | 2015-09-22 | Oracle Otc Subsidiary Llc | Masking sensitive information in a screen sharing session |
JP5643716B2 (ja) * | 2011-05-31 | 2014-12-17 | 楽天株式会社 | 情報処理システム、情報処理方法、情報処理装置、情報処理端末、プログラム及び記録媒体 |
JP2013020522A (ja) * | 2011-07-13 | 2013-01-31 | Kyocera Corp | 表示装置、表示方法及びプログラム |
US8872618B2 (en) * | 2012-04-09 | 2014-10-28 | Nai-Chien Chang | Unlocking method for electronic device |
CN105453106B (zh) * | 2013-03-15 | 2022-01-14 | 英特尔公司 | 用于显示器隐私的动态配置的设备、方法、系统以及介质 |
US20140359785A1 (en) * | 2013-05-30 | 2014-12-04 | Microsoft Corporation | Security for Displayed Electronic Content from Unauthorized Access During Application Idle Periods |
CN103973891B (zh) * | 2014-05-09 | 2016-06-01 | 平安付智能技术有限公司 | 用于软件界面的数据安全处理方法 |
CN104050422B (zh) * | 2014-06-10 | 2018-01-05 | 腾讯科技(深圳)有限公司 | 展示信息内容的方法及装置 |
-
2014
- 2014-10-14 CN CN201410542077.1A patent/CN105511751A/zh active Pending
-
2015
- 2015-09-30 ES ES15850987T patent/ES2799928T3/es active Active
- 2015-09-30 PL PL15850987T patent/PL3208703T3/pl unknown
- 2015-09-30 KR KR1020177009816A patent/KR102084833B1/ko active IP Right Grant
- 2015-09-30 SG SG11201702829RA patent/SG11201702829RA/en unknown
- 2015-09-30 JP JP2017519890A patent/JP6550461B2/ja active Active
- 2015-09-30 SG SG10201903135UA patent/SG10201903135UA/en unknown
- 2015-09-30 EP EP15850987.7A patent/EP3208703B1/en active Active
- 2015-09-30 WO PCT/CN2015/091215 patent/WO2016058484A1/zh active Application Filing
-
2016
- 2016-08-29 HK HK16110235.6A patent/HK1222019A1/zh unknown
-
2017
- 2017-04-06 US US15/481,215 patent/US10424094B2/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005107306A (ja) * | 2003-09-30 | 2005-04-21 | Sharp Corp | 液晶表示構造体 |
CN102855453A (zh) * | 2011-06-30 | 2013-01-02 | 网秦无限(北京)科技有限公司 | 防止偷窥移动设备屏幕显示的方法和系统 |
CN102902703A (zh) * | 2012-07-19 | 2013-01-30 | 中国人民解放军国防科学技术大学 | 一种面向网络敏感信息的截图取证与锁定回访的方法 |
CN103077361A (zh) * | 2012-12-28 | 2013-05-01 | 东莞宇龙通信科技有限公司 | 移动终端及其防窥视方法 |
CN103402001A (zh) * | 2013-07-18 | 2013-11-20 | 沈阳华立德电子科技有限公司 | 一种基于光传感器的防盗手机及防盗方法 |
CN103955650A (zh) * | 2014-05-04 | 2014-07-30 | 合肥联宝信息技术有限公司 | 一种通过调节屏幕亮度防止窥视的方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
EP3208703A1 (en) | 2017-08-23 |
JP6550461B2 (ja) | 2019-07-24 |
KR102084833B1 (ko) | 2020-03-04 |
SG11201702829RA (en) | 2017-05-30 |
CN105511751A (zh) | 2016-04-20 |
JP2017538190A (ja) | 2017-12-21 |
SG10201903135UA (en) | 2019-05-30 |
PL3208703T3 (pl) | 2020-11-02 |
EP3208703A4 (en) | 2018-06-27 |
US20170213369A1 (en) | 2017-07-27 |
KR20170070044A (ko) | 2017-06-21 |
ES2799928T3 (es) | 2020-12-22 |
EP3208703B1 (en) | 2020-04-01 |
US10424094B2 (en) | 2019-09-24 |
HK1222019A1 (zh) | 2017-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11294560B2 (en) | Method and apparatus for changing the ratio between interfaces | |
KR102187255B1 (ko) | 전자 장치의 디스플레이 방법 및 그 전자 장치 | |
CN107925749B (zh) | 用于调整电子设备的分辨率的方法和设备 | |
US10656823B2 (en) | Method and electronic device for managing operation of applications | |
US20170269725A1 (en) | Electronic device for touch and finger scan sensor input and control method thereof | |
US20180357984A1 (en) | System, method, and apparatus for displaying data | |
US11861382B2 (en) | Application starting method and apparatus, and electronic device | |
KR20160046099A (ko) | 전자장치에서 표시 제어 방법 및 장치 | |
US10055119B2 (en) | User input method and apparatus in electronic device | |
EP2898403A2 (en) | Interactive overlay to prevent unintentional inputs | |
US20150058788A1 (en) | Information processing method and electronic device | |
US20240137438A1 (en) | Information display method and electronic device | |
KR102071530B1 (ko) | 디나이얼 발생시 대응 메뉴얼을 제안하는 전자 장치 및 방법 | |
US20180225478A1 (en) | Device display security with user-specified filtering of display contents | |
KR102536148B1 (ko) | 전자 장치의 동작 방법 및 장치 | |
WO2016058484A1 (zh) | 一种屏幕敏感信息处理方法及装置 | |
US11995302B2 (en) | Interface information presenting method and electronic device | |
US20160026322A1 (en) | Method for controlling function and electronic device thereof | |
US20240012938A1 (en) | Information Display Method and Related Apparatus | |
US20200387253A1 (en) | Method for manufacturing leads in touch screen, touch screen, and electronic device | |
CN111279342A (zh) | 电子设备及其控制方法 | |
EP2953058A1 (en) | Method for displaying images and electronic device for implementing the same | |
TW201741923A (zh) | 可攜式電子裝置以及其運作方法 | |
US11146537B1 (en) | Systems and methods for protecting geolocation information | |
US20200127696A1 (en) | Portable terminal, and control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15850987 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11201702829R Country of ref document: SG |
|
REEP | Request for entry into the european phase |
Ref document number: 2015850987 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2015850987 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20177009816 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017519890 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |