WO2016058484A1 - 一种屏幕敏感信息处理方法及装置 - Google Patents

一种屏幕敏感信息处理方法及装置 Download PDF

Info

Publication number
WO2016058484A1
WO2016058484A1 PCT/CN2015/091215 CN2015091215W WO2016058484A1 WO 2016058484 A1 WO2016058484 A1 WO 2016058484A1 CN 2015091215 W CN2015091215 W CN 2015091215W WO 2016058484 A1 WO2016058484 A1 WO 2016058484A1
Authority
WO
WIPO (PCT)
Prior art keywords
sensitive information
area
light intensity
threshold
screen
Prior art date
Application number
PCT/CN2015/091215
Other languages
English (en)
French (fr)
Inventor
吕鲲
Original Assignee
阿里巴巴集团控股有限公司
吕鲲
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司, 吕鲲 filed Critical 阿里巴巴集团控股有限公司
Priority to EP15850987.7A priority Critical patent/EP3208703B1/en
Priority to JP2017519890A priority patent/JP6550461B2/ja
Priority to PL15850987T priority patent/PL3208703T3/pl
Priority to SG11201702829RA priority patent/SG11201702829RA/en
Priority to ES15850987T priority patent/ES2799928T3/es
Priority to KR1020177009816A priority patent/KR102084833B1/ko
Publication of WO2016058484A1 publication Critical patent/WO2016058484A1/zh
Priority to US15/481,215 priority patent/US10424094B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • G06T11/20Drawing from basic elements, e.g. lines or circles
    • G06T11/206Drawing of charts or graphs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/017Gesture based interaction, e.g. based on a set of recognized hand gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Definitions

  • the present invention relates to the field of information processing technologies, and in particular, to a screen information processing method and apparatus.
  • the purpose of the embodiment of the present application is to provide a screen sensitive information processing method and device, so as to prevent information displayed on the screen of the electronic device from being peeked, thereby improving the security of the user's access to the information.
  • the embodiment of the present application provides a screen sensitive information processing method, including:
  • the method further includes: monitoring whether the light intensity detected by the light sensor is reduced to a second threshold, and identifying the sensitive information of the screen being shielded when the detected light intensity decreases to a second threshold Zone and remove the mask for the area where the sensitive information is located.
  • the content displayed by the area where the sensitive information is shielded includes: displaying a rectangular picture in an area where the sensitive information is located.
  • the content displayed by the area where the sensitive information is shielded includes:
  • the rendering of the rectangular picture is performed, the area where the sensitive information is located displays the rendered rectangular picture, and the rectangular picture covers the original display content in the area where the sensitive information is located.
  • the content displayed by the area where the sensitive information is masked includes: setting a background color attribute of the area where the sensitive information is located to a sensitive information color attribute.
  • the removing the shielding of the area where the sensitive information is located includes: displaying the sensitive information of the area in the area where the sensitive information is located.
  • the canceling the shielding of the area where the sensitive information is located comprises: rendering the original display content of the content displayed on the screen.
  • the removing the shielding of the area where the sensitive information is located includes: setting a background color of the area where the sensitive information is located as an original background color attribute of the area.
  • Another aspect of the present application also provides a screen sensitive information processing apparatus, the apparatus comprising:
  • a first monitoring unit configured to monitor whether the light intensity detected by the light sensor is raised to a first threshold
  • a first identifying unit configured to identify an area where the pre-defined sensitive information in the screen display content is located when the first monitoring unit detects that the light intensity increases to the first threshold
  • the first shielding unit is configured to block the content displayed by the area where the sensitive information is located after the first identifying unit identifies the area where the sensitive information is pre-defined in the screen display content.
  • the apparatus further comprises:
  • a second monitoring unit configured to monitor whether the light intensity detected by the light sensor decreases to a second threshold
  • a second identifying unit configured to identify an area where the pre-defined sensitive information in the screen display content is located when the second monitoring unit detects that the light intensity decreases to a second threshold
  • the second shielding unit is configured to cancel the shielding of the area where the sensitive information is located after the second identifying unit identifies the area where the pre-defined sensitive information in the screen display content is located.
  • the embodiment of the present application protects sensitive information by identifying an area where the pre-defined sensitive information in the content of the screen is displayed, and shielding the content displayed by the area where the sensitive information is located.
  • the role of the user is greatly improved compared to the prior art.
  • FIG. 1 is a schematic flowchart of a screen sensitive information processing method according to an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a screen sensitive information processing method according to Embodiment 1 of the present application;
  • FIG. 3 is a schematic diagram showing an initial display state of an electronic device by taking a smart phone as an example
  • FIG. 4 is a schematic diagram showing a screen state of an electronic device after shielding a sensitive information by displaying a rectangular picture
  • FIG. 5 is a schematic diagram of a state in which a user's finger presses a light sensor to generate a screen state of an electronic device after unmasking;
  • FIG. 6 is a schematic flowchart of a screen sensitive information processing method according to Embodiment 2 of the present application.
  • FIG. 7 is a schematic flowchart of a screen sensitive information processing method according to Embodiment 3 of the present application.
  • FIG. 8 is a schematic diagram of a screen sensitive information processing apparatus according to an embodiment of the present application.
  • the user information is directly presented on the screen, which is easy to cause the user information to be peeped, revealing some sensitive private information, and causing unnecessary trouble to the user.
  • the embodiment of the present application provides a screen sensitive information processing method. As shown in FIG. 1 , the method includes:
  • Step S101 monitoring whether the light intensity detected by the light sensor is raised to a first threshold
  • Step S102 When the detected light intensity is increased to the first threshold, identify an area where the pre-defined sensitive information in the screen display content is located, and block the content displayed by the area where the sensitive information is located.
  • the area where the sensitive information in the predefined screen display content is located can be identified, and the area where the sensitive information is located is blocked.
  • the content can effectively prevent the leakage of sensitive information of the user, and greatly improves the security of the user's access to information compared with the prior art.
  • FIG. 2 is a schematic flowchart diagram of a method for processing screen sensitive information according to the embodiment.
  • the screen sensitive information processing method can be applied to any electronic device capable of displaying information, such as a mobile smart phone, a tablet electronic device, a portable computer (for example, A device such as a notebook computer, a personal digital assistant (PDA), a desktop computer, or the like that can display information through a screen.
  • Applications for information displayed on the screen include, but are not limited to, social platform applications (eg, Facebook, Twitter, Weibo), mail applications, short message (SMS) applications, multimedia information (MMS) applications, and the like.
  • social platform applications eg, Facebook, Twitter, Weibo
  • SMS short message
  • MMS multimedia information
  • the screen sensitive information processing method includes the following steps:
  • Step S201 The electronic device 1 opens an application, and the screen 10 displays information of the current application page.
  • the content displayed on the screen 10 after the electronic device 1 opens the application assuming that all information displayed on the current screen 10 includes information A101, information B102, information C103, information D104, and information E105, wherein the information A101 is predefined. Sensitive information.
  • Step S202 Monitor whether the light intensity detected by the light sensor 11 is raised to a first threshold.
  • the current application can monitor the ambient light intensity by calling the light sensor API of the electronic device 1, and the light sensor can be called by the light sensor API of the electronic device 1 after the application is started, so when the application is just started in step S201
  • the initial display state of the screen 10 is a state in which the sensitive information is not shielded.
  • the electronic device light sensor API is called, if the detected light intensity is lower than the first threshold, the current page is continuously displayed, if the detected light intensity is high. When the first threshold is reached, the process proceeds to step S203.
  • Step S203 When it is detected that the light intensity is increased to the first threshold, the recognition screen 10 displays the area where the sensitive information in the content is located, and blocks the content displayed by the area where the sensitive information is located by displaying the rectangular picture 101'.
  • FIG. 4 is a schematic diagram showing the display state of the electronic device screen after the sensitive information is masked by displaying the rectangular picture.
  • the area where the pre-defined sensitive information is located is identified, and the area where the sensitive information is identified may be set by first labeling each display area, and when the light intensity increases to the first threshold event.
  • the tags are identified, the area where the sensitive information is located can be located through the tag, and the sensitive information can be shielded by using the set rectangular image 101' to cover the sensitive information in the area where the sensitive information is located, or by setting The rectangular picture 101' replaces the original sensitive information display to achieve shielding of sensitive information.
  • the area where the sensitive information is located is a rectangular space, and the rectangular space is determined by a coordinate point and an area.
  • the detected light intensity is greater than the first threshold
  • the lower left corner of the area where the sensitive information is located is first located.
  • the coordinate point starts to acquire a rectangle through the coordinate point of the lower left corner to shield the sensitive information.
  • coordinate points may also be other positions of the area where the sensitive information is located, for example, the upper left corner, the lower right corner, and the like, and may be other forms in practice, and the embodiment of the present application is not limited thereto.
  • Step S204 Monitor whether the light intensity detected by the light sensor 11 decreases to a second threshold.
  • Step S205 When the detected light intensity decreases to the second threshold, identify the area where the masked sensitive information in the screen 10 is located, and display the sensitive information in the area where the sensitive information is located, and cancel the display in the area where the sensitive information is located.
  • the rectangular picture 101' implements the masking of the area where the sensitive information is located.
  • the event that the light intensity is as low as the second threshold is caused by blocking the light sensor 11 with the finger 111, the area of the predefined sensitive information is identified, and the mask display is cancelled.
  • Sensitive information as shown in Figure 5. It should be clear to those skilled in the art that the triggering mode for reducing the light intensity monitored by the light sensor 11 to the second threshold is not limited to only one way of covering the light sensor 11 by the finger 111 in FIG. 5, and may actually be other in practice. The embodiments of the present application are not limited thereto.
  • the light intensity gradually increases.
  • the sensitive information continues to be displayed, and when the light sensor 11 detects that the light intensity is increased to the first
  • the process proceeds to step S203 to block the sensitive information.
  • the first threshold mentioned in this embodiment is greater than or equal to the second threshold.
  • the screen sensitive information processing method of the embodiment after the detected light intensity is increased to the first threshold, the area where the sensitive information is located can be located, and the sensitive information can be shielded by displaying a rectangular picture in the area where the sensitive information is located, thereby effectively preventing The user's sensitive information is leaked, and after the detected light intensity is reduced to the second threshold, the shielding of the area where the sensitive information is located can be cancelled, and the user's request for information can be satisfied, and the user's access information is greatly improved compared with the prior art. Security.
  • FIG. 6 is a schematic flowchart diagram of a screen sensitive information processing method according to an embodiment, where the screen sensitive information processing method can be applied to any electronic device capable of displaying information, such as a mobile smart phone, a tablet electronic device, a portable computer (for example, A device such as a notebook computer, a personal digital assistant (PDA), a desktop computer, or the like that can display information through a screen.
  • Applications for information displayed on the screen include, but are not limited to, social platform applications (eg, Facebook, Twitter, Weibo), mail applications, short message (SMS) applications, multimedia information (MMS) applications, and the like.
  • social platform applications eg, Facebook, Twitter, Weibo
  • SMS short message
  • MMS multimedia information
  • the screen sensitive information processing method includes the following steps:
  • Step S301 The electronic device opens the application, and the screen displays information of the current application page.
  • the content displayed on the screen after the electronic device opens the application includes information A, information B, information C, information D, and information E, wherein the information A is sensitive information.
  • Step S302 Monitor whether the light intensity detected by the light sensor is raised to a first threshold.
  • the current application can monitor the ambient light intensity by calling the light sensor API of the electronic device, and the light intensity monitoring can be performed by calling the electronic device light sensor API after the application is started, so when the application is just started in step S301, the screen The initial display content is a state in which the sensitive information is not masked.
  • the electronic device light sensor API is called, if the detected light intensity is lower than the first threshold, the current page is continuously displayed, if the detected light intensity is higher than the first When the threshold is reached, the process proceeds to step S303.
  • Step S303 When it is detected that the light intensity is increased to the first threshold, the area where the pre-defined sensitive information in the screen display content is located is identified, and the original display content is rendered on the screen display content of the area;
  • a rectangular picture is rendered, and the area where the sensitive information is located displays the rendered rectangular picture, and the rectangular picture covers the original display content in the area where the sensitive information is located.
  • identifying an area in which the pre-defined sensitive information is located may set a label for each display area in advance, and when the light intensity increases to a first threshold event, the labels are identified, and the sensitive information can be located through the label.
  • the area is rendered twice in the area where the sensitive information is located. The first time the sensitive information is rendered, all the display content is drawn on the screen, and the second time the image for the occlusion is rendered in the area where the sensitive information is located. That is to say, the image of the second rendering interface will cover the sensitive information of the first rendering, and shield the sensitive information.
  • Step S304 Monitor whether the light intensity detected by the light sensor decreases to a second threshold.
  • Step S305 When the detected light intensity decreases to the second threshold, identify an area where the masked sensitive information is located in the screen, perform rendering of the original display content for the area where the sensitive information is located, and cancel the area where the sensitive information is located. shield.
  • the triggering method for reducing the light intensity detected by the light sensor to the second threshold is not limited to one way of covering the light sensor by the finger, and may be other forms in practice. Not limited to this.
  • Step S303 blocks sensitive information.
  • the first threshold mentioned in this embodiment is greater than or equal to the second threshold.
  • the area where the sensitive information is located can be located in a predefined manner, and the sensitive information is first rendered by two interface renderings.
  • the second way of rendering the occlusion image, shielding sensitive information can effectively prevent the leakage of sensitive information of the user, and after the detected light intensity is reduced to the second threshold, the original display content is rendered, and the sensitive information can be cancelled.
  • the shielding of the area in which it is located meets the needs of users for accessing information, and greatly improves the security of user access to information compared with the prior art.
  • FIG. 7 is a schematic flowchart diagram of a screen sensitive information processing method according to an embodiment, where the screen sensitive information processing method can be applied to any electronic device capable of displaying information, such as a mobile smart phone, a tablet electronic device, a portable computer (for example, A device such as a notebook computer, a personal digital assistant (PDA), a desktop computer, or the like that can display information through a screen.
  • Applications for information displayed on the screen include, but are not limited to, social platform applications (eg, Facebook, Twitter, Weibo), mail applications, short message (SMS) applications, multimedia information (MMS) applications, and the like.
  • social platform applications eg, Facebook, Twitter, Weibo
  • SMS short message
  • MMS multimedia information
  • the screen sensitive information processing method includes the following steps:
  • Step S401 The electronic device opens the application, and the screen displays information of the current application page.
  • the content displayed on the screen after the electronic device opens the application includes information A, information B, information C, information D, and information E, wherein the information A is sensitive information.
  • Step S402 Monitor whether the light intensity detected by the light sensor is raised to a first threshold.
  • the current application can monitor the ambient light intensity by calling the light sensor API of the electronic device. Since the electronic device light sensor API can be called to monitor the light intensity after the application is started, the screen is just started when the application is started in step S401.
  • the initial display content is the state in which the sensitive information is not blocked; the electronic device light sensor API is invoked. Thereafter, if the detected light intensity is lower than the first threshold, the current page is continuously displayed, and if the detected light intensity is higher than the first threshold, the process proceeds to step S403.
  • Step S403 When the detected light intensity is increased to the first threshold, the area where the pre-defined sensitive information in the screen display content is located is identified, and the background color attribute of the area where the sensitive information is located is set as the sensitive information color attribute.
  • identifying an area in which the pre-defined sensitive information is located may set a label for each display area in advance, and when the light intensity increases to a first threshold event, the labels are identified, and the sensitive information can be located through the label.
  • the area is adjusted, and the background color attribute of the area where the sensitive information is located is adjusted to the color attribute of the sensitive information to shield the sensitive information.
  • Step S404 Monitor whether the light intensity detected by the light sensor decreases to a second threshold.
  • Step S405 When it is detected that the light intensity decreases to the second threshold, the area where the sensitive information shielded in the screen is located is identified, and the background color of the area where the sensitive information is located is set as the original background color attribute of the area.
  • the event that the light intensity is as low as the second threshold is caused by covering the light sensor with a finger, and the area where the predefined sensitive information is located is identified, and the background color of the area where the sensitive information is located is identified. The property is restored to its original state and unmasked to display sensitive information.
  • the triggering method for reducing the light intensity detected by the light sensor to the second threshold is not limited to one way of covering the light sensor by the finger, and may be other forms in practice. Not limited to this.
  • Step S403 blocks sensitive information.
  • the first threshold mentioned in this embodiment is greater than or equal to the second threshold.
  • the area where the sensitive information is located can be located, and the sensitive information can be shielded by adjusting the background color attribute of the area where the sensitive information is located. Effectively preventing the leakage of sensitive information of the user; and after detecting that the light intensity is reduced to the second threshold, restoring the background color attribute of the area where the sensitive information is located, the shielding of the area where the sensitive information is located can be cancelled, and the requirement for the user to view the information is satisfied.
  • the security of the user's access to information is greatly improved.
  • the embodiment of the present application further provides a screen sensitive information processing apparatus 800, as shown in FIG. 8, comprising: a first monitoring unit 801, a first identifying unit 802, and a first shielding unit 803, wherein the first monitoring unit 801 is used by the first monitoring unit 801. And detecting whether the light intensity detected by the light sensor is raised to a first threshold; the first identifying unit 802 is configured to identify the pre-defined sensitive information in the screen display content when the first monitoring unit 801 detects that the light intensity increases to the first threshold.
  • the first shielding unit 803 is configured to identify, after the first identification unit 802, the area where the pre-defined sensitive information in the screen display content is located The content displayed in the area where the sensitive information is located.
  • the device provided by the embodiment of the present application further includes: a second monitoring unit, a second identifying unit, and a second shielding unit, wherein the second monitoring unit is configured to monitor whether the light intensity detected by the light sensor decreases to a second threshold;
  • the second identifying unit is configured to identify an area where the pre-defined sensitive information in the screen display content is located when the second monitoring unit detects that the light intensity decreases to the second threshold;
  • the second shielding unit is configured to identify the screen in the second identifying unit The area where the sensitive information is pre-defined in the content is displayed, and the mask of the area where the sensitive information is located is canceled.
  • the screen sensitive information processing apparatus can locate the area where the sensitive information is located after the light intensity is increased to the first threshold, and can effectively display the content displayed in the area where the sensitive information is located. Preventing the leakage of sensitive information of the user, and after detecting that the light intensity decreases to the second threshold, restoring the background color attribute of the area where the sensitive information is located, the shielding of the area where the sensitive information is located may be cancelled, and the user's need for accessing information may be satisfied, and Compared with the prior art, the security of the user's access to information is greatly improved.
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • the controller can be implemented in any suitable manner, for example, the controller can take the form of, for example, a microprocessor or processor Computer readable media, logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers, and computer readable program code (eg, software or firmware) executable by the (micro)processor Embedded in the form of a microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory's control logic.
  • ARC 625D ARC 625D
  • Atmel AT91SAM Microchip PIC18F26K20
  • Silicone Labs C8051F320 Silicone Labs C8051F320
  • the controller can be logically programmed by means of logic gates, switches, ASICs, programmable logic controllers, and embedding.
  • Such a controller can therefore be considered a hardware component, and the means for implementing various functions included therein can also be considered as a structure within the hardware component.
  • a device for implementing various functions can be considered as a software module that can be both a method of implementation and a structure within a hardware component.
  • the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
  • the present application can be implemented by means of software plus a necessary general hardware platform. Based on such understanding, portions of the technical solution of the present application that contribute substantially or to the prior art may be embodied in the form of a software product.
  • the computing device includes one or more processors (CPU ), input / output interface, network interface and memory.
  • the computer software product can include instructions for causing a computer device (which can be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present application or portions of the embodiments.
  • the computer software product can be stored in a memory, which may include non-persistent memory, random access memory (RAM), and/or nonvolatile memory in a computer readable medium, such as read only memory (ROM) or Flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory.
  • PRAM phase change memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • RAM random access memory
  • ROM read only memory
  • EEPROM electrically erasable programmable read only memory
  • flash memory or other memory technology
  • compact disk read only memory CD-ROM
  • DVD digital versatile disk
  • Magnetic tape cartridges magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include transitory computer readable media, such as modulated data signals and carrier waves.
  • This application can be used in a variety of general purpose or special purpose computer system environments or configurations.
  • the application can be described in the general context of computer-executable instructions executed by a computer, such as a program module.
  • program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types.
  • the present application can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are connected through a communication network.
  • program modules can be located in both local and remote computer storage media including storage devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Controls And Circuits For Display Device (AREA)
  • Telephone Function (AREA)

Abstract

一种屏幕敏感信息处理方法和装置。该方法包括:监测光线传感器检测到的光强度是否提高至第一阈值(S101),当监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域,并屏蔽所述敏感信息所在的区域所显示的内容(S102)。利用该方法可以提高用户信息阅读的安全性。

Description

一种屏幕敏感信息处理方法及装置 技术领域
本发明涉及信息处理技术领域,尤其涉及一种屏幕信息处理方法及装置。
背景技术
随着电子技术的快速发展,手机、平板和电脑等电子设备在人们日常的学习、工作和生活中应用日益广泛,电子设备使用过程中,屏幕是人们获取各种信息的主要方式,但现有技术中,各种信息包括了一些涉及个人隐私的敏感信息,一般都直接呈现在屏幕上,很容易被旁人窥视到,造成个人信息的泄露,给人们的生活带来了不必要的麻烦。
发明内容
本申请实施例的目的是提供一种屏幕敏感信息处理方法及装置,以防止电子设备屏幕上显示的信息被窥视,提高用户查阅信息的安全性。
为实现上述目的,本申请实施例提供一种屏幕敏感信息处理方法,包括:
监测光线传感器检测到的光强度是否提高至第一阈值,当监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域,并屏蔽所述敏感信息所在的区域所显示的内容。
在一个优选的实施例中,该方法还包括:监测光线传感器检测到的光强度是否降低至第二阈值,当监测到光强度降低至第二阈值时,识别屏幕中被屏蔽的敏感信息所在的区域,并取消对该敏感信息所在的区域的屏蔽。
在一个优选的实施例中,所述屏蔽所述敏感信息所在的区域所显示的内容包括:在所述敏感信息所在的区域内显示矩形图片。
在一个优选的实施例中,所述屏蔽所述敏感信息所在的区域所显示的内容包括:
进行矩形图片的渲染,所述敏感信息所在的区域显示被渲染后的矩形图片,且所述矩形图片遮盖所述敏感信息所在区域内的原始显示内容。
在一个优选的实施例中,所述屏蔽所述敏感信息所在的区域所显示的内容包括:将所述敏感信息所在区域的背景色属性设置为敏感信息颜色属性。
在一个优选的实施例中,所述取消对该敏感信息所在区域的屏蔽包括:在所述敏感信息所在的区域内显示该区域的敏感信息。
在一个优选的实施例中,所述取消对该敏感信息所在区域的屏蔽包括:对所述屏幕显示的内容进行原始显示内容的渲染。
在一个优选的实施例中,所述取消对该敏感信息所在区域的屏蔽包括:将所述敏感信息所在区域的背景色设置为该区域原始背景色属性。
本申请另一方面还提供一种屏幕敏感信息处理装置,该装置包括:
第一监测单元,用于监测光线传感器检测到的光强度是否提高至第一阈值;
第一识别单元,用于在第一监测单元监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域;
第一屏蔽单元,用于在第一识别单元识别到屏幕显示内容中预先定义的敏感信息所在的区域后屏蔽所述敏感信息所在的区域所显示的内容。
在一个优选的实施例中,该装置还包括:
第二监测单元,用于监测光线传感器检测到的光强度是否降低至第二阈值;
第二识别单元,用于在第二监测单元监测到光强度降低至第二阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域;
第二屏蔽单元,用于在第二识别单元识别到屏幕显示内容中预先定义的敏感信息所在的区域后取消对该敏感信息所在的区域的屏蔽。
由以上本申请实施例提供的技术方案可见,本申请实施例通过识别屏幕显示内容中预先定义的敏感信息所在的区域,并屏蔽所述敏感信息所在的区域所显示的内容,达到对敏感信息保护的作用,与现有技术相比大大提高了用户查阅信息的安全性。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种屏幕敏感信息处理方法的流程示意图;
图2是本申请实施例一提供的一种屏幕敏感信息处理方法的流程示意图;
图3是以智能手机为例的电子设备初始显示状态示意图;
图4是通过显示矩形图片屏蔽敏感信息后电子设备屏幕显示状态的示意图;
图5是用户手指按住光线传感器以产生取消屏蔽后电子设备屏幕显示状态的示意图;
图6是本申请实施例二提供的一种屏幕敏感信息处理方法的流程示意图;
图7是本申请实施例三提供的一种屏幕敏感信息处理方法的流程示意图;
图8是本申请实施例提供的一种屏幕敏感信息处理装置的示意图。
具体实施方式
为了使本技术领域的人员更好地理解本申请中的技术方案,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本申请保护的范围。
目前电子设备使用的过程中,屏幕上会直接呈现用户信息,极易造成用户信息被窥视,泄露一些敏感的私密信息,给用户带来不必要的麻烦。
为解决上述问题,本申请实施例提供一种屏幕敏感信息处理方法,如图1所示,该方法包括:
步骤S101:监测光线传感器检测到的光强度是否提高至第一阈值;
步骤S102:当监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域,并屏蔽该敏感信息所在的区域所显示的内容。
由此可见,本申请实施例中,在监测到光强度提高至第一阈值以后,可识别到预先定义的屏幕显示内容中的敏感信息所在的区域,并屏蔽该敏感信息所在的区域所显示的内容,能有效防止用户敏感信息的泄露,与现有技术相比大大提高了用户查阅信息的安全性。
在实际中,上述对屏幕上显示的敏感信息进行屏蔽可以有很多种实现方式,以下以几个具体的例子详细说明本申请实施例的具体实现。
实施例一
图2为本实施例提供的屏幕敏感信息处理方法的流程示意图,该屏幕敏感信息处理方法可以应用在任何一种可以显示信息的电子设备中,例如移动智能电话、平板电子设备、便携式计算机(例如笔记本电脑等)、个人数字助理(PDA)、桌面型计算机等可以通过屏幕显示信息的设备等。而屏幕所显示信息的应用包括但不限于社交平台应用(例如Facebook、Twitter、微博)、邮件应用、短信息(SMS)应用、多媒体信息(MMS)应用等。
如图2所示,该屏幕敏感信息处理方法包括如下步骤:
步骤S201:电子设备1打开应用程序,屏幕10显示当前应用页面的信息。
如图3显示的是电子设备1打开应用程序后屏幕10显示的内容,假设当前屏幕10显示的全部信息包括信息A101、信息B102、信息C103、信息D104、信息E105,其中信息A101为预先定义的敏感信息。
步骤S202:监测光线传感器11检测到的光强度是否提高至第一阈值。
在实际中,当前应用程序可通过调用电子设备1的光传感器API监控环境光强度,由于应用程序启动后才能调用电子设备1光传感器API进行光强度的监测,所以步骤S201中刚启动应用程序时,屏幕10的初始显示状态为未对敏感信息进行屏蔽的状态,调用电子设备光传感器API后,如果检测到的光强度低于第一阈值,则继续显示当前页面,如果监测到的光强度高于第一阈值时,进入步骤S203。
步骤S203:当监测到光强度提高至第一阈值时,识别屏幕10显示内容中的敏感信息所在的区域,并通过显示矩形图片101'屏蔽该敏感信息所在的区域所显示的内容。
如图4所示的是通过显示矩形图片屏蔽敏感信息后电子设备屏幕显示状态的示意图。当发生光强度提高至第一阈值事件的时候,识别预先定义的敏感信息所在区域,识别敏感信息所在区域可通过事先对每个显示区域设定一个标签,当发生光强度提高至第一阈值事件的时候,识别这些标签,通过标签可定位该敏感信息所在的区域,并在敏感信息所在区域用设定的矩形图片101'覆盖敏感信息的方式实现对敏感信息的屏蔽,也可以通过用设定的矩形图片101'替换原有敏感信息显示的方式实现对敏感信息的屏蔽。具体的说,上述敏感信息所在的区域是一个矩形空间,该矩形空间是用一个坐标点和区域确定的,当监测到光强度大于第一阀值的时候,先定位敏感信息所在区域左下角的坐标点,再通过这个左下角的坐标点开始获取一个矩形,进行敏感信息的屏蔽。
此外,上述坐标点也可以是敏感信息所在区域的其它位置,例如左上角,右下角等,在实际中还可以是其他形式,本申请实施例并不以此为限。
步骤S204:监测光线传感器11检测到的光强度是否降低至第二阈值。
步骤S205:当监测到光强度降低至第二阈值时,识别屏幕10中被屏蔽的敏感信息所在的区域,并在该敏感信息所在的区域内显示敏感信息,取消显示在敏感信息所在的区域的矩形图片101',实现取消对该敏感信息所在的区域的屏蔽。
在如图4所示的屏幕显示状态下,具体是通过用手指111遮住光线传感器11的方式促使发生光强度低至第二阈值的事件,识别预先定义的敏感信息所在区域,并取消屏蔽显示敏感信息,如图5所示。本领域技术人员应该清楚,对于实现光线传感器11监测的光强度降低至第二阈值的触发方式不仅仅限于图5中通过手指111遮住光线传感器11的一种方式,在实际中还可以是其他形式,本申请实施例并不以此为限。
此外,当用户手指111移开光线传感器11时,光强度逐渐提高,当光线传感器11监测到光强度低于第一阈值时,继续显示敏感信息,当光线传感器11监测到光强度提高至第一阈值时,进入步骤S203屏蔽敏感信息。
进一步需要说明的是本实施例中提到的第一阈值是大于等于第二阈值的。
通过本实施例的屏幕敏感信息处理方法,在监测到光强度提高至第一阈值以后,可定位出敏感信息所在区域,并通过在敏感信息所在区域显示矩形图片方式,屏蔽敏感信息,能有效防止用户敏感信息的泄露,且在监测到光强度降低至第二阈值以后,可取消对该敏感信息所在的区域的屏蔽,满足用户查阅信息的需求,与现有技术相比大大提高了用户查阅信息的安全性。
实施例二
图6为本实施例提供的屏幕敏感信息处理方法的流程示意图,该屏幕敏感信息处理方法可以应用在任何一种可以显示信息的电子设备中,例如移动智能电话、平板电子设备、便携式计算机(例如笔记本电脑等)、个人数字助理(PDA)、桌面型计算机等可以通过屏幕显示信息的设备等。而屏幕所显示信息的应用包括但不限于社交平台应用(例如Facebook、Twitter、微博)、邮件应用、短信息(SMS)应用、多媒体信息(MMS)应用等。
如图6所示,该屏幕敏感信息处理方法包括如下步骤:
步骤S301:电子设备打开应用程序,屏幕显示当前应用页面的信息。
假设电子设备打开应用程序后屏幕显示的内容包括信息A、信息B、信息C、信息D、信息E,其中信息A为敏感信息。
步骤S302:监测光线传感器检测到的光强度是否提高至第一阈值。
在实际中,当前应用程序可通过调用电子设备的光传感器API监控环境光强度,由于应用程序启动后才能调用电子设备光传感器API进行光强度的监测,所以步骤S301中刚启动应用程序时,屏幕的初始显示内容为未对敏感信息进行屏蔽的状态,调用电子设备光传感器API后,如果检测到的光强度低于第一阈值,则继续显示当前页面,如果监测到的光强度高于第一阈值时,进入步骤S303。
步骤S303:当监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域,对该区域屏幕显示内容进行原始显示内容的渲染;
在对原始显示内容进行渲染的基础上,进行矩形图片的渲染,该敏感信息所在的区域显示被渲染后的矩形图片,且该矩形图片遮盖敏感信息所在区域内的原始显示内容。
在实际中,识别预先定义的敏感信息所在区域可通过事先对每个显示区域设定一个标签,当发生光强度提高至第一阈值事件的时候,识别这些标签,通过标签可定位该敏感信息所在的区域,在上述敏感信息所在区域进行两次界面渲染,第一次渲染敏感信息,就是在屏幕上绘制所有的显示内容,第二次在敏感信息所在区域渲染遮挡用的图片。也即第二次渲染界面的图片会遮盖第一次渲染的敏感信息,实现对敏感信息的屏蔽。
步骤S304:监测光线传感器检测到的光强度是否降低至第二阈值。
步骤S305:当监测到光强度降低至第二阈值时,识别屏幕中被屏蔽的敏感信息所在的区域,对该敏感信息所在的区域进行原始显示内容的渲染,取消对该敏感信息所在的区域的屏蔽。
在敏感信息被屏蔽的情况下,具体是通过用手指遮住光线传感器的方式促使发生光强度低至第二阈值的事件,识别预先定义的敏感信息所在区域,通过对该区域的原始敏感内容的渲染取消屏蔽显示敏感信息。本领域技术人员应该清楚,对于实现光线传感器检测的光强度降低至第二阈值的触发方式不仅仅限于通过手指遮住光线传感器的一种方式,在实际中还可以是其他形式,本申请实施例并不以此为限。
此外,当用户手指移开光线传感器时,光强度逐渐提高,当光线传感器监测到光强度低于第一阈值时,继续显示敏感信息,当光线传感器监测到光强度提高至第一阈值时,进入步骤S303屏蔽敏感信息。
进一步需要说明的是本实施例中提到的第一阈值是大于等于第二阈值的。
通过本实施例的屏幕敏感信息处理方法,在监测到光强度提高至第一阈值以后,可通过预先定义的方式定位出敏感信息所在区域,并通过两次界面渲染,第一次渲染敏感信息,第二次渲染遮挡用的图片的方式,屏蔽敏感信息,能有效防止用户敏感信息的泄露,且在监测到光强度降低至第二阈值以后,对原始显示内容进行渲染,可取消对该敏感信息所在的区域的屏蔽,满足用户查阅信息的需求,与现有技术相比大大提高了用户查阅信息的安全性。
实施例三
图7为本实施例提供的屏幕敏感信息处理方法的流程示意图,该屏幕敏感信息处理方法可以应用在任何一种可以显示信息的电子设备中,例如移动智能电话、平板电子设备、便携式计算机(例如笔记本电脑等)、个人数字助理(PDA)、桌面型计算机等可以通过屏幕显示信息的设备等。而屏幕所显示信息的应用包括但不限于社交平台应用(例如Facebook、Twitter、微博)、邮件应用、短信息(SMS)应用、多媒体信息(MMS)应用等。
如图7所示,该屏幕敏感信息处理方法包括如下步骤:
步骤S401:电子设备打开应用程序,屏幕显示当前应用页面的信息。
假设电子设备打开应用程序后屏幕显示的内容,包括信息A、信息B、信息C、信息D、信息E,其中信息A为敏感信息。
步骤S402:监测光线传感器检测到的光强度是否提高至第一阈值。
在实际中,当前应用程序可通过调用电子设备的光传感器API监控环境光强度,由于应用程序启动后才能调用电子设备光传感器API进行光强度的监测,所以步骤S401中刚启动应用程序时,屏幕的初始显示内容为未对敏感信息进行屏蔽的状态;调用电子设备光传感器API 后,如果检测到的光强度低于第一阈值,则继续显示当前页面,如果监测到的光强度高于第一阈值时,进入步骤S403。
步骤S403:当监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域,将上述敏感信息所在区域的背景色属性设置为敏感信息颜色属性。
在实际中,识别预先定义的敏感信息所在区域可通过事先对每个显示区域设定一个标签,当发生光强度提高至第一阈值事件的时候,识别这些标签,通过标签可定位该敏感信息所在的区域,并将该敏感信息所在区域的背景色属性调整为敏感信息的颜色属性,实现敏感信息的屏蔽。
步骤S404:监测光线传感器检测到的光强度是否降低至第二阈值。
步骤S405:当监测到光强度降低至第二阈值时,识别屏幕中被屏蔽的敏感信息所在的区域,将上述敏感信息所在区域的背景色设置为该区域原始背景色属性。
在敏感信息被屏蔽的情况下,具体是通过用手指遮住光线传感器的方式促使发生光强度低至第二阈值的事件,识别出预先定义的敏感信息所在区域,将敏感信息所在区域的背景色属性恢复至原始状态取消屏蔽显示敏感信息。本领域技术人员应该清楚对于实现光线传感器检测的光强度降低至第二阈值的触发方式不仅仅限于通过手指遮住光线传感器的一种方式,在实际中还可以是其他形式,本申请实施例并不以此为限。
此外,当用户手指移开光线传感器时,光强度逐渐提高,当光线传感器监测到光强度低于第一阈值时,继续显示敏感信息,当光线传感器监测到光强度提高至第一阈值时,进入步骤S403屏蔽敏感信息。
进一步需要说明的是本实施例中提到的第一阈值是大于等于第二阈值的。
通过本实施例的屏幕敏感信息处理方法,在监测到光强度提高至第一阈值以后,可定位出敏感信息所在区域,并通过调整敏感信息所在区域的背景色属性的方式,屏蔽敏感信息,能有效防止用户敏感信息的泄露;且在监测到光强度降低至第二阈值以后,恢复敏感信息所在区域的背景色属性,可取消对该敏感信息所在的区域的屏蔽,满足用户查阅信息的需求,与现有技术相比大大提高了用户查阅信息的安全性。
本申请实施例还相应提供一种屏幕敏感信息处理装置800,如图8所示,包括:第一监测单元801、第一识别单元802和第一屏蔽单元803,其中,第一监测单元801用于监测光线传感器检测到的光强度是否提高至第一阈值;第一识别单元802用于在第一监测单元801监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域;第一屏蔽单元803,用于在第一识别单元802识别到屏幕显示内容中预先定义的敏感信息所在的区域后屏 蔽该敏感信息所在的区域所显示的内容。
此外,本申请实施例提供的装置还包括:第二监测单元、第二识别单元和第二屏蔽单元,其中,第二监测单元用于监测光线传感器检测到的光强度是否降低至第二阈值;第二识别单元用于在第二监测单元监测到光强度降低至第二阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域;第二屏蔽单元用于在第二识别单元识别到屏幕显示内容中预先定义的敏感信息所在的区域后取消对该敏感信息所在的区域的屏蔽。
由此可见,本申请实施例提供的一种屏幕敏感信息处理装置在监测到光强度提高至第一阈值以后,可定位出敏感信息所在区域,并通过屏蔽敏感信息所在区域显示的内容,能有效防止用户敏感信息的泄露,且在监测到光强度降低至第二阈值以后,恢复敏感信息所在区域的背景色属性,可取消对该敏感信息所在的区域的屏蔽,满足用户查阅信息的需求,与现有技术相比大大提高了用户查阅信息的安全性。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片2。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog2。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及 存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。
本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本申请可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。该计算机软件产品可以包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例或者实施例的某些部分所述的方法。该计算机软件产品可以存储在内存中,内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括短暂电脑可读媒体(transitory media),如调制的数据信号和载波。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
本申请可用于众多通用或专用的计算机系统环境或配置中。例如:个人计算机、服务器计算机、手持设备或便携式设备、平板型设备、多处理器系统、基于微处理器的系统、置顶盒、可编程的消费电子设备、网络PC、小型计算机、大型计算机、包括以上任何系统或设备的分布式计算环境等等。
本申请可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
虽然通过实施例描绘了本申请,本领域普通技术人员知道,本申请有许多变形和变化而不脱离本申请的精神,希望所附的权利要求包括这些变形和变化而不脱离本申请的精神。

Claims (13)

  1. 一种屏幕敏感信息处理方法,其特征在于,该方法包括:
    监测光线传感器检测到的光强度是否提高至第一阈值,当监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域,并屏蔽所述敏感信息所在的区域所显示的内容。
  2. 根据权利要求1所述的方法,其特征在于,该方法还包括:
    监测光线传感器检测到的光强度是否降低至第二阈值,当监测到光强度降低至第二阈值时,识别屏幕中被屏蔽的敏感信息所在的区域,并取消对该敏感信息所在的区域的屏蔽。
  3. 根据权利要求2所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显示的内容包括:
    在所述敏感信息所在的区域内显示矩形图片。
  4. 根据权利要求3所述的方法,其特征在于,所述取消对该敏感信息所在区域的屏蔽包括:
    在所述敏感信息所在的区域内显示该区域的敏感信息。
  5. 根据权利要求2所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显示的内容包括:
    进行矩形图片的渲染,所述敏感信息所在的区域显示被渲染后的矩形图片,且所述矩形图片遮盖所述敏感信息所在区域内的原始显示内容。
  6. 根据权利要求5所述的方法,其特征在于,所述取消对该敏感信息所在区域的屏蔽包括:
    对所述屏幕显示的内容进行原始显示内容的渲染。
  7. 根据权利要求2所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显示的内容包括:
    将所述敏感信息所在区域的背景色属性设置为敏感信息颜色属性。
  8. 根据权利要求7所述的方法,其特征在于,所述取消对该敏感信息所在区域的屏蔽包括:
    将所述敏感信息所在区域的背景色设置为该区域原始背景色属性。
  9. 根据权利要求1所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显示的内容包括:
    在所述敏感信息所在的区域内显示矩形图片。
  10. 根据权利要求1所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显 示的内容包括:
    进行矩形图片的渲染,所述敏感信息所在的区域显示被渲染后的矩形图片,且所述矩形图片遮盖所述敏感信息所在区域内的原始显示内容。
  11. 根据权利要求1所述的方法,其特征在于,所述屏蔽所述敏感信息所在的区域所显示的内容包括:
    将所述敏感信息所在区域的背景色属性设置为敏感信息颜色属性。
  12. 一种屏幕敏感信息处理装置,其特征在于,该装置包括:
    第一监测单元,用于监测光线传感器检测到的光强度是否提高至第一阈值;
    第一识别单元,用于在第一监测单元监测到光强度提高至第一阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域;
    第一屏蔽单元,用于在第一识别单元识别到屏幕显示内容中预先定义的敏感信息所在的区域后屏蔽所述敏感信息所在的区域所显示的内容。
  13. 根据权利要求12所述的装置,其特征在于,该装置还包括:
    第二监测单元,用于监测光线传感器检测到的光强度是否降低至第二阈值;
    第二识别单元,用于在第二监测单元监测到光强度降低至第二阈值时,识别屏幕显示内容中预先定义的敏感信息所在的区域;
    第二屏蔽单元,用于在第二识别单元识别到屏幕显示内容中预先定义的敏感信息所在的区域后取消对该敏感信息所在的区域的屏蔽。
PCT/CN2015/091215 2014-10-14 2015-09-30 一种屏幕敏感信息处理方法及装置 WO2016058484A1 (zh)

Priority Applications (7)

Application Number Priority Date Filing Date Title
EP15850987.7A EP3208703B1 (en) 2014-10-14 2015-09-30 Method and apparatus for processing screen sensitive information
JP2017519890A JP6550461B2 (ja) 2014-10-14 2015-09-30 画面上機密情報処理方法及び装置
PL15850987T PL3208703T3 (pl) 2014-10-14 2015-09-30 Sposób i urządzenie do przetwarzania informacji wrażliwych na ekranie
SG11201702829RA SG11201702829RA (en) 2014-10-14 2015-09-30 Method and apparatus for processing screen sensitive information
ES15850987T ES2799928T3 (es) 2014-10-14 2015-09-30 Método y aparato para procesamiento de información sensible en una pantalla
KR1020177009816A KR102084833B1 (ko) 2014-10-14 2015-09-30 스크린 민감 정보를 처리하는 방법 및 장치
US15/481,215 US10424094B2 (en) 2014-10-14 2017-04-06 Processing screen sensitive information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410542077.1 2014-10-14
CN201410542077.1A CN105511751A (zh) 2014-10-14 2014-10-14 一种屏幕敏感信息处理方法及装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/481,215 Continuation US10424094B2 (en) 2014-10-14 2017-04-06 Processing screen sensitive information

Publications (1)

Publication Number Publication Date
WO2016058484A1 true WO2016058484A1 (zh) 2016-04-21

Family

ID=55719775

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/091215 WO2016058484A1 (zh) 2014-10-14 2015-09-30 一种屏幕敏感信息处理方法及装置

Country Status (10)

Country Link
US (1) US10424094B2 (zh)
EP (1) EP3208703B1 (zh)
JP (1) JP6550461B2 (zh)
KR (1) KR102084833B1 (zh)
CN (1) CN105511751A (zh)
ES (1) ES2799928T3 (zh)
HK (1) HK1222019A1 (zh)
PL (1) PL3208703T3 (zh)
SG (2) SG11201702829RA (zh)
WO (1) WO2016058484A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881116A (zh) * 2017-05-11 2018-11-23 阿里巴巴集团控股有限公司 展现敏感信息的实现方法和装置
CN109918953B (zh) * 2018-09-27 2021-02-19 用友网络科技股份有限公司 一种关键信息防窥视的显示方法及装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005107306A (ja) * 2003-09-30 2005-04-21 Sharp Corp 液晶表示構造体
CN102855453A (zh) * 2011-06-30 2013-01-02 网秦无限(北京)科技有限公司 防止偷窥移动设备屏幕显示的方法和系统
CN102902703A (zh) * 2012-07-19 2013-01-30 中国人民解放军国防科学技术大学 一种面向网络敏感信息的截图取证与锁定回访的方法
CN103077361A (zh) * 2012-12-28 2013-05-01 东莞宇龙通信科技有限公司 移动终端及其防窥视方法
CN103402001A (zh) * 2013-07-18 2013-11-20 沈阳华立德电子科技有限公司 一种基于光传感器的防盗手机及防盗方法
CN103955650A (zh) * 2014-05-04 2014-07-30 合肥联宝信息技术有限公司 一种通过调节屏幕亮度防止窥视的方法及装置

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001005787A (ja) * 1999-06-17 2001-01-12 Sharp Corp 携帯型情報機器
JP4380633B2 (ja) * 2003-12-12 2009-12-09 セイコーエプソン株式会社 表示装置、および表示制御方法
JP2010010750A (ja) * 2008-06-24 2010-01-14 Nec Saitama Ltd 携帯端末およびセキュリティロック制御方法
JP2011134137A (ja) * 2009-12-24 2011-07-07 Konica Minolta Business Technologies Inc 情報表示装置及び表示制御プログラム
KR20110084653A (ko) * 2010-01-18 2011-07-26 삼성전자주식회사 휴대단말에서 프라이버시 보호 방법 및 장치
JP2011228872A (ja) * 2010-04-19 2011-11-10 Panasonic Corp 携帯端末装置、携帯端末装置の制御方法、および携帯端末装置の制御プログラム
US9141332B2 (en) * 2010-08-09 2015-09-22 Oracle Otc Subsidiary Llc Masking sensitive information in a screen sharing session
JP5643716B2 (ja) * 2011-05-31 2014-12-17 楽天株式会社 情報処理システム、情報処理方法、情報処理装置、情報処理端末、プログラム及び記録媒体
JP2013020522A (ja) * 2011-07-13 2013-01-31 Kyocera Corp 表示装置、表示方法及びプログラム
US8872618B2 (en) * 2012-04-09 2014-10-28 Nai-Chien Chang Unlocking method for electronic device
CN105453106B (zh) * 2013-03-15 2022-01-14 英特尔公司 用于显示器隐私的动态配置的设备、方法、系统以及介质
US20140359785A1 (en) * 2013-05-30 2014-12-04 Microsoft Corporation Security for Displayed Electronic Content from Unauthorized Access During Application Idle Periods
CN103973891B (zh) * 2014-05-09 2016-06-01 平安付智能技术有限公司 用于软件界面的数据安全处理方法
CN104050422B (zh) * 2014-06-10 2018-01-05 腾讯科技(深圳)有限公司 展示信息内容的方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005107306A (ja) * 2003-09-30 2005-04-21 Sharp Corp 液晶表示構造体
CN102855453A (zh) * 2011-06-30 2013-01-02 网秦无限(北京)科技有限公司 防止偷窥移动设备屏幕显示的方法和系统
CN102902703A (zh) * 2012-07-19 2013-01-30 中国人民解放军国防科学技术大学 一种面向网络敏感信息的截图取证与锁定回访的方法
CN103077361A (zh) * 2012-12-28 2013-05-01 东莞宇龙通信科技有限公司 移动终端及其防窥视方法
CN103402001A (zh) * 2013-07-18 2013-11-20 沈阳华立德电子科技有限公司 一种基于光传感器的防盗手机及防盗方法
CN103955650A (zh) * 2014-05-04 2014-07-30 合肥联宝信息技术有限公司 一种通过调节屏幕亮度防止窥视的方法及装置

Also Published As

Publication number Publication date
EP3208703A1 (en) 2017-08-23
JP6550461B2 (ja) 2019-07-24
KR102084833B1 (ko) 2020-03-04
SG11201702829RA (en) 2017-05-30
CN105511751A (zh) 2016-04-20
JP2017538190A (ja) 2017-12-21
SG10201903135UA (en) 2019-05-30
PL3208703T3 (pl) 2020-11-02
EP3208703A4 (en) 2018-06-27
US20170213369A1 (en) 2017-07-27
KR20170070044A (ko) 2017-06-21
ES2799928T3 (es) 2020-12-22
EP3208703B1 (en) 2020-04-01
US10424094B2 (en) 2019-09-24
HK1222019A1 (zh) 2017-06-16

Similar Documents

Publication Publication Date Title
US11294560B2 (en) Method and apparatus for changing the ratio between interfaces
KR102187255B1 (ko) 전자 장치의 디스플레이 방법 및 그 전자 장치
CN107925749B (zh) 用于调整电子设备的分辨率的方法和设备
US10656823B2 (en) Method and electronic device for managing operation of applications
US20170269725A1 (en) Electronic device for touch and finger scan sensor input and control method thereof
US20180357984A1 (en) System, method, and apparatus for displaying data
US11861382B2 (en) Application starting method and apparatus, and electronic device
KR20160046099A (ko) 전자장치에서 표시 제어 방법 및 장치
US10055119B2 (en) User input method and apparatus in electronic device
EP2898403A2 (en) Interactive overlay to prevent unintentional inputs
US20150058788A1 (en) Information processing method and electronic device
US20240137438A1 (en) Information display method and electronic device
KR102071530B1 (ko) 디나이얼 발생시 대응 메뉴얼을 제안하는 전자 장치 및 방법
US20180225478A1 (en) Device display security with user-specified filtering of display contents
KR102536148B1 (ko) 전자 장치의 동작 방법 및 장치
WO2016058484A1 (zh) 一种屏幕敏感信息处理方法及装置
US11995302B2 (en) Interface information presenting method and electronic device
US20160026322A1 (en) Method for controlling function and electronic device thereof
US20240012938A1 (en) Information Display Method and Related Apparatus
US20200387253A1 (en) Method for manufacturing leads in touch screen, touch screen, and electronic device
CN111279342A (zh) 电子设备及其控制方法
EP2953058A1 (en) Method for displaying images and electronic device for implementing the same
TW201741923A (zh) 可攜式電子裝置以及其運作方法
US11146537B1 (en) Systems and methods for protecting geolocation information
US20200127696A1 (en) Portable terminal, and control method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15850987

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 11201702829R

Country of ref document: SG

REEP Request for entry into the european phase

Ref document number: 2015850987

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015850987

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20177009816

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017519890

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE