WO2019062115A1 - 应用界面的显示方法及装置 - Google Patents

应用界面的显示方法及装置 Download PDF

Info

Publication number
WO2019062115A1
WO2019062115A1 PCT/CN2018/085008 CN2018085008W WO2019062115A1 WO 2019062115 A1 WO2019062115 A1 WO 2019062115A1 CN 2018085008 W CN2018085008 W CN 2018085008W WO 2019062115 A1 WO2019062115 A1 WO 2019062115A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
terminal
specified
application interface
interface
Prior art date
Application number
PCT/CN2018/085008
Other languages
English (en)
French (fr)
Inventor
王柯
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to JP2018568379A priority Critical patent/JP6892878B2/ja
Priority to KR1020197007294A priority patent/KR102244436B1/ko
Priority to RU2018137223A priority patent/RU2710662C1/ru
Publication of WO2019062115A1 publication Critical patent/WO2019062115A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72469User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1454Digital output to display device ; Cooperation and interconnection of the display device with other functional units involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays, e.g. teledisplay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/032Protect output to user by software means
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G2354/00Aspects of interface with display user
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G2358/00Arrangements for display data security
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G2370/00Aspects of data communication
    • G09G2370/04Exchange of auxiliary data, i.e. other than image data, between monitor and graphics controller
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G2370/00Aspects of data communication
    • G09G2370/06Consumer Electronics Control, i.e. control of another device by a display or vice versa
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G2370/00Aspects of data communication
    • G09G2370/16Use of wireless transmission of display information

Definitions

  • the present disclosure relates to the field of Internet technologies, and in particular, to a display method and apparatus for an application interface.
  • the first terminal establishes a network connection with the second terminal; based on the established network connection
  • the second terminal sends the application interface data of the specified application to the first terminal.
  • the first terminal When receiving the application interface data of the specified application, the first terminal generates an application interface of the specified application according to the application interface data, and displays the application interface.
  • the present disclosure provides a display method and apparatus for an application interface.
  • a display method of an application interface comprising:
  • the specified application is a confidential application, obtaining an encrypted display manner of the specified application
  • the determining whether the specified application is a confidential application comprises:
  • the application identifier is the same as the application identifier of the pre-set confidential application, it is determined that the specified application is a confidential application.
  • the obtaining an encrypted display manner of the specified application includes:
  • the method further includes:
  • the method before the determining whether the specified application is a classified application, the method further includes:
  • the current mode is the privacy protection mode, performing the step of determining whether the specified application is a confidential application.
  • a display method of an application interface comprising:
  • the application interface is displayed according to the encrypted display mode.
  • the method further includes:
  • a display device for an application interface comprising:
  • a determining module configured to determine whether the specified application is a classified application when an open operation on the specified application is detected
  • An obtaining module configured to acquire an encrypted display manner of the specified application if the specified application is a classified application
  • a sending module configured to send, according to a network connection established in advance with the first terminal, the application interface data of the specified application and the encrypted display manner to the first terminal, where the application interface data is used for the first
  • the terminal generates an application interface of the specified application, where the encrypted display mode is used by the first terminal to perform encrypted display on the application interface.
  • the determining module is configured to acquire an application identifier of the specified application; if the application identifier is the same as an application identifier of a preset confidential application, determining that the specified application is Confidential application.
  • the acquiring module is configured to acquire an application identifier of the specified application, and obtain an encrypted display manner corresponding to the application identifier from the encrypted database according to the application identifier,
  • the encrypted database stores the correspondence between the application identifier of the encrypted application and the encrypted display mode.
  • the acquiring module is further configured to acquire a sliding area of the sliding operation when the sliding operation is detected on the application interface during the displaying process of the application interface;
  • the sending module is further configured to send the sliding area to the first terminal, and the first terminal displays an application interface content in the sliding area.
  • the apparatus further includes:
  • a detecting module configured to detect whether the current mode is a privacy protection mode
  • the determining module is configured to determine whether the specified application is a classified application if the current mode is a privacy protection mode.
  • a display device for an application interface comprising:
  • the receiving module is configured to receive, according to a network connection established in advance with the second terminal, an application interface data and an encrypted display mode of the specified application sent by the second terminal, where the specified application is an application currently opened by the second terminal ;
  • An interface generating module configured to generate an application interface of the specified application according to the application interface data
  • the interface display module is configured to display the application interface according to the encrypted display mode.
  • the receiving module is configured to receive a sliding area sent by the second terminal, where the sliding area is determined according to a sliding operation detected by the second terminal on the application interface. ;
  • the interface display module is configured to display application interface content in the sliding area.
  • a display device for an application interface including:
  • a memory configured to store instructions executable by the processor
  • processor is configured to:
  • the specified application is a confidential application, obtaining an encrypted display manner of the specified application
  • a display device for an application interface including:
  • a memory configured to store instructions executable by the processor
  • processor is configured to:
  • the application interface is displayed according to the encrypted display mode.
  • a non-transitory computer readable storage medium having stored therein at least one instruction loaded by a processor and executed to implement the first aspect The display method of the application interface.
  • a non-transitory computer readable storage medium having stored therein at least one instruction loaded by a processor and executed to implement the second aspect The display method of the application interface.
  • the second terminal sends the application interface data of the specified application together with the encrypted display mode by determining whether the specified application is a classified application before the specified application is projected to the first terminal, and when the specified application is a classified application.
  • the first terminal enables the first terminal to display the application interface according to the encrypted display manner, thereby providing a new display manner of the application interface, thereby effectively avoiding the user's privacy leakage.
  • FIG. 1 is an implementation environment involved in a display method of an application interface according to an exemplary embodiment
  • FIG. 2 is a flowchart of a display method of an application interface according to an exemplary embodiment
  • FIG. 3 is a flowchart of a display method of another application interface according to an exemplary embodiment
  • FIG. 4 is a flowchart of still another display method of an application interface according to an exemplary embodiment
  • FIG. 5 is a schematic diagram of a terminal interface according to an exemplary embodiment
  • FIG. 6 is a schematic diagram of a terminal interface according to an exemplary embodiment
  • FIG. 7 is a block diagram of a display device of an application interface according to an exemplary embodiment
  • FIG. 8 is a block diagram of a display device of another application interface according to an exemplary embodiment
  • FIG. 9 is a block diagram of a display device of an application interface, according to an exemplary embodiment.
  • FIG. 1 is an implementation environment involved in a display method of an application interface according to an exemplary embodiment.
  • the implementation environment includes: a first terminal 101 and a second terminal 102.
  • the first terminal 101 can be a large screen device such as a projector or a smart TV.
  • the second terminal 102 can be a small screen device such as a smart phone or a tablet.
  • the second terminal 102 is installed with multiple types of applications, including a navigation application, a shopping application, a reading application, an audio playing application, a video playing application, a social application, a short message application, etc., depending on whether the user is involved.
  • the privacy of these applications can be divided into classified applications (such as shopping applications, social applications, short message applications, etc.) and non-confidential applications (such as navigation applications, reading applications, audio playback applications, video playback applications, etc.).
  • the first terminal 101 and the second terminal 102 each have a network connection function. Based on the network connection function, the first terminal 101 and the second terminal 102 can establish a network connection through a wired network or a wireless network, thereby performing data transmission.
  • FIG. 2 is a flowchart of a display method of an application interface according to an exemplary embodiment. As shown in FIG. 2, a display method of an application interface is used in a second terminal, and includes the following steps.
  • step S201 when an open operation for the specified application is detected, it is determined whether the specified application is a classified application.
  • step S202 if the specified application is a confidential application, the encrypted display mode of the specified application is obtained.
  • step S203 the application interface data and the encrypted display mode of the specified application are sent to the first terminal based on the network connection established in advance with the first terminal.
  • the application interface data is used by the first terminal to generate an application interface of the specified application
  • the encrypted display mode is used for the first terminal to perform encrypted display on the application interface
  • the method provided by the embodiment of the present disclosure before the second terminal projects the application interface of the specified application to the first terminal, determines whether the specified application is a classified application, and specifies the application of the application when the specified application is a classified application.
  • the interface data and the encrypted display mode are sent to the first terminal, so that the first terminal can display the application interface according to the encrypted display manner, thereby providing a new display manner of the application interface, thereby effectively avoiding the user's privacy leakage.
  • determining whether the specified application is a confidential application includes:
  • the application identifier is the same as the application identifier of the pre-set secret application, it is determined that the specified application is a confidential application.
  • obtaining an encrypted display manner of the specified application includes:
  • the encrypted display manner corresponding to the application identifier is obtained from the encrypted database, and the correspondence relationship between the application identifier of the encrypted application and the encrypted display mode is stored in the encryption database.
  • the method further includes:
  • the sliding area is sent to the first terminal, and the first terminal displays the content of the application interface in the sliding area.
  • the method before determining whether the specified application is a classified application, the method further includes:
  • the current mode is the privacy protection mode
  • a step of determining whether the specified application is a classified application is performed.
  • FIG. 3 is a flowchart of a display method of another application interface according to an exemplary embodiment. As shown in FIG. 3, a display method of an application interface is used in a first terminal, and includes the following steps.
  • step S301 based on the network connection established in advance with the second terminal, the application interface data and the encrypted display mode of the specified application sent by the second terminal are received.
  • the specified application is an application that is currently opened by the second terminal.
  • step S302 an application interface of the specified application is generated according to the application interface data.
  • step S303 the application interface is displayed according to the encrypted display mode.
  • the method provided by the embodiment of the present disclosure provides a new display mode of the application interface by receiving the application interface data and the encrypted display mode of the specified application sent by the second terminal, and displaying the application interface according to the encrypted display mode. Effectively avoiding user privacy leaks.
  • the method further includes:
  • FIG. 4 is a flowchart of a display method of another application interface according to an exemplary embodiment. As shown in FIG. 4, the display method of the application interface is used in the first terminal and the second terminal, and includes the following steps.
  • step S401 the first terminal establishes a network connection with the second terminal.
  • the first terminal and the second terminal have a network connection function, and the first terminal establishes a network connection with the second terminal based on the network connection function, including but not limited to the following:
  • the first terminal and the second terminal start a WiFi (Wireless Fidelity) function, after which the first terminal broadcasts a WiFi signal, and when receiving the WiFi signal, the first terminal and the second terminal pass the WiFi signal. Establish a network connection.
  • WiFi Wireless Fidelity
  • the first terminal and the second terminal enable the Bluetooth function, and discover each other in the device discovery phase.
  • the first terminal broadcasts a Bluetooth signal
  • the second terminal receives the Bluetooth signal according to the received
  • the Bluetooth signal establishes a network connection with the first terminal.
  • the first terminal and the second terminal enable NFC (Near Field Communication) function, and the first terminal and the second terminal establish an NFC data channel by sending a data packet, and then according to the established NFC data channel, Establish a network connection between them.
  • NFC Near Field Communication
  • the first terminal and the second terminal turn on the infrared function, and discover each other in the device discovery phase, after which the first terminal sends an infrared signal, and the second terminal receives the infrared signal sent by the first terminal, according to the received
  • the infrared signal establishes a network connection with the first terminal.
  • the first terminal establishes a network connection with the second terminal
  • other manners may be used, and the embodiments of the present disclosure are not described one by one.
  • step S402 when an open operation for the specified application is detected, the second terminal determines whether the specified application is a classified application.
  • the second terminal has two modes, one is a privacy protection mode, and the other is a non-privacy protection mode.
  • the privacy protection mode the second terminal determines whether the currently opened application is a classified application, and obtains an encrypted display mode when the currently opened application is a classified application, and sends the application interface data and the encrypted display manner to the first The first terminal enables the first terminal to display the application interface according to the encrypted display mode, thereby effectively protecting the privacy of the user; in the non-privacy protection mode, the second terminal sends the application interface data to the first terminal for display, Protect the privacy of users.
  • the second terminal since the second terminal is in different display modes, the first terminal displays the application interface differently. Therefore, when the opening operation for the specified application is detected, the second terminal needs to detect whether the current mode is For the privacy protection mode, if the current mode is the privacy protection mode, it is determined whether the specified application is a confidential application.
  • Step 4021 The second terminal acquires an application identifier of the specified application.
  • the application identifier is used to uniquely identify an application, including an application name, an application version, and the like.
  • Step 4022 If the application identifier is the same as the application identifier of the preset confidential application, the second terminal determines that the specified application is a classified application.
  • the second terminal maintains an encrypted application database, where the encrypted application database stores the correspondence between the application identifier of the encrypted application and the encrypted display mode, and the encrypted display mode is used for encrypting and displaying the application interface of the encrypted application by the first terminal.
  • the encrypted display mode includes a frosted glass effect and the like.
  • the process of establishing the encrypted application database is: the second terminal provides an encryption application setting interface, and the encryption application setting interface displays an encryption application setting option and an encryption display mode setting option, and the user can encrypt according to whether each application is confidential or not. Apply setting options to set the application that involves user privacy as a confidential application, and set the options according to the encrypted display mode to set the encrypted display mode for each confidential application.
  • the user sets the encrypted display mode for each confidential application all the encrypted applications can be set to the same encrypted display mode, and different encryption can be set for each confidential application according to the confidentiality degree of each classified application.
  • the second terminal obtains the encrypted application set by the user and the corresponding encrypted display mode by detecting the setting operation of the user on the encrypted application setting interface, and establishes an encrypted application database according to the setting.
  • the second terminal determines whether the application identifier of the specified application is the same as the application identifier of the preset application according to the established encrypted application database. If the application identifier is the same as the application identifier of the preset confidential application, the specified identifier is determined. The application is a confidential application. If the application identifier is different from the application identifier of the preset confidential application, the specified application is determined to be a non-confidential application, and the application interface data of the specified application is directly sent to the first terminal. The terminal displays.
  • step S403 if the designated application is a confidential application, the second terminal acquires an encrypted display manner of the specified application.
  • the second terminal When it is determined that the specified application is a confidential application, the second terminal further obtains an encrypted display manner corresponding to the application identifier from the pre-established encrypted database according to the application identifier of the specified application.
  • step S404 the second terminal sends the application interface data and the encrypted display mode of the specified application to the first terminal.
  • the second terminal When the encrypted display mode of the specified application is obtained, the second terminal sends the application interface data and the encrypted display mode of the specified application to the first terminal based on the network connection established in advance with the first terminal, so that the first terminal performs display.
  • the application interface of the second terminal can only be viewed by the second terminal side user, other users cannot view it, and thus the second terminal can normally display the application interface of the specified application.
  • step S405 when receiving the application interface data and the encrypted display mode of the specified application sent by the second terminal, the first terminal generates an application interface of the specified application according to the application interface data.
  • the drawing form of the interface elements to be drawn may be determined, and therefore, based on the acquired application interface data,
  • the terminal can draw a graphic element corresponding to the interface element, and then draw an application interface of the specified application.
  • the graphic element may be a button, an icon, or the like, and the embodiment of the present disclosure does not specifically limit the graphic element.
  • step S406 the first terminal displays the application interface according to the encrypted display mode.
  • the first terminal displays the application interface of the specified application according to the encrypted display mode. For example, if the encrypted display mode is a frosted glass effect, the frosted glass effect is used to display the application interface of the specified application.
  • the second terminal normally displays an application interface of the specified application, and the first terminal side displays the application interface of the specified application by using a frosted glass effect.
  • the second terminal may acquire the sliding area of the sliding operation, and send the sliding area to the first a terminal, when receiving the sliding area sent by the second terminal, the first terminal displays the content of the application interface in the sliding area, so that the first terminal side user can view the content that is not classified on the application interface, thereby achieving information sharing. purpose.
  • the second terminal acquires a sliding area of the sliding operation of the user, and sends the sliding area to the first terminal.
  • the first terminal cancels The frosted glass effect in the sliding area displays the application interface content located in the sliding area in a normal display manner, so that the first terminal side user can view the application interface content in the sliding area.
  • the method provided by the embodiment of the present disclosure does not directly display the application interface of the classified application, but displays the application interface by using the encrypted display mode, thereby effectively protecting the user. If the user does not operate the confidential application by mistake, the user can display the content of the application interface in the sliding area by sliding the application interface, so that the content on the application interface is selectively presented to the user.
  • the method provided by the embodiment of the present disclosure before the second terminal projects the application interface of the specified application to the first terminal, determines whether the specified application is a classified application, and specifies the application of the application when the specified application is a classified application.
  • the interface data and the encrypted display mode are sent to the first terminal, so that the first terminal can display the application interface according to the encrypted display manner, thereby providing a new display manner of the application interface, thereby effectively avoiding the user's privacy leakage.
  • FIG. 7 is a block diagram of a display device of an application interface, according to an exemplary embodiment.
  • the apparatus includes: a determining module 701, an obtaining module 702, and a sending module 703.
  • the determining module 701 is configured to determine whether the specified application is a classified application when detecting an open operation on the specified application;
  • the obtaining module 702 is configured to acquire an encrypted display mode of the specified application if the specified application is a confidential application;
  • the sending module 703 is configured to send the application interface data and the encrypted display mode of the specified application to the first terminal according to the network connection established in advance with the first terminal, where the application interface data is used by the first terminal to generate an application interface of the specified application.
  • the encrypted display mode is used for encrypting and displaying the application interface by the first terminal.
  • the determining module 701 is configured to acquire an application identifier of the specified application; if the application identifier is the same as the application identifier of the preset confidential application, it is determined that the specified application is a classified application.
  • the obtaining module 702 is configured to acquire an application identifier of the specified application, and obtain an encrypted display manner corresponding to the application identifier from the encrypted database according to the application identifier, where the encrypted database stores the encrypted application. Correspondence between the application identifier and the encrypted display mode.
  • the obtaining module 702 is configured to acquire a sliding area of the sliding operation when the sliding operation is detected on the application interface during the display process of the application interface;
  • the sending module 703 is configured to send the sliding area to the first terminal, and the first terminal displays the application interface content in the sliding area.
  • the apparatus further includes: a detection module.
  • the detecting module is configured to detect whether the current mode is a privacy protection mode
  • the determining module 701 is configured to determine whether the specified application is a classified application if the current mode is a privacy protection mode.
  • the device provided by the embodiment of the present disclosure, after the second terminal projects the application interface of the specified application to the first terminal, determines whether the specified application is a classified application, and specifies the application of the application when the specified application is a classified application.
  • the interface data and the encrypted display mode are sent to the first terminal, so that the first terminal can display the application interface according to the encrypted display manner, thereby providing a new display manner of the application interface, thereby effectively avoiding the user's privacy leakage.
  • FIG. 8 is a block diagram of a display device of another application interface according to an exemplary embodiment.
  • the device includes: a receiving module 801, an interface generating module 802, and an interface display module 803.
  • the receiving module 801 is configured to receive, according to a network connection established in advance with the second terminal, application interface data and an encrypted display mode of the specified application sent by the second terminal, where the specified application is an application currently opened by the second terminal;
  • the interface generation module 802 is configured to generate an application interface of the specified application according to the application interface data
  • the interface display module 803 is configured to display an application interface according to an encrypted display manner.
  • the receiving module 801 is configured to receive a sliding area sent by the second terminal, where the sliding area is determined according to a sliding operation detected by the second terminal on the application interface;
  • the interface display module 803 is configured to display application interface content within the sliding area.
  • the device provided by the embodiment of the present disclosure provides a new display mode of the application interface by receiving the application interface data and the encrypted display mode of the specified application sent by the second terminal, and displaying the application interface according to the encrypted display mode. Effectively avoiding user privacy leaks.
  • FIG. 9 is a block diagram of a display device 900 of an application interface, according to an exemplary embodiment.
  • display device 900 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
  • display device 900 can include one or more of the following components: processing component 902, memory 904, power component 906, multimedia component 908, audio component 910, input/output (I/O) interface 912, sensor component 914, And a communication component 916.
  • Processing component 902 typically controls the overall operation of display device 900, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 902 can include one or more processors 920 to execute instructions to perform all or part of the steps described above.
  • processing component 902 can include one or more modules to facilitate interaction between component 902 and other components.
  • processing component 902 can include a multimedia module to facilitate interaction between multimedia component 908 and processing component 902.
  • the memory 904 is configured to store various types of data to support operation at the display device 900. Examples of such data include instructions for any application or method operating on display device 900, contact data, phone book data, messages, pictures, videos, and the like.
  • the memory 904 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM erasable Programmable read only memory
  • PROM programmable read only memory
  • ROM read only memory
  • magnetic memory flash memory
  • flash memory magnetic or optical disk.
  • Power component 906 provides power to various components of display device 900.
  • Power component 906 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for display device 900.
  • the multimedia component 908 includes a screen of an output interface provided between the display device 900 and a user.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 908 includes a front camera and/or a rear camera. When the display device 900 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 910 is configured to output and/or input an audio signal.
  • the audio component 910 includes a microphone (MIC) that is configured to receive an external audio signal when the display device 900 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 904 or transmitted via communication component 916.
  • the audio component 810 also includes a speaker configured to output an audio signal.
  • the I/O interface 912 provides an interface between the processing component 902 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
  • Sensor assembly 914 includes one or more sensors configured to provide various aspects of status assessment for display device 900.
  • sensor component 914 can detect an open/closed state of display device 900, relative positioning of components, such as the display and keypad of display device 900, and sensor component 914 can also detect display device 900 or display device 900. The position of the component changes, the presence or absence of contact of the user with the display device 900, the orientation of the display device 900 or the acceleration/deceleration and the temperature of the display device 900.
  • Sensor assembly 914 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor component 914 can also include a light sensor, such as a CMOS or CCD image sensor, configured for use in imaging applications.
  • the sensor component 914 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 916 is configured to facilitate wired or wireless communication between display device 900 and other devices.
  • the display device 900 can access a wireless network based on a communication standard such as WiFi, 2G or 3G, or a combination thereof.
  • communication component 916 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
  • the communication component 916 also includes a near field communication (NFC) module to facilitate short range communication.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra wideband
  • Bluetooth Bluetooth
  • display device 900 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), A programming gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation configured to perform the above methods.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA programming gate array
  • controller microcontroller, microprocessor, or other electronic component implementation configured to perform the above methods.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 904 comprising instructions executable by processor 920 of display device 900 to perform the above method.
  • the non-transitory computer readable storage medium may be a ROM, a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, or the like.
  • a non-transitory computer readable storage medium that, when executed by a processor of a mobile terminal, enables the mobile terminal to perform display of an application interface as shown in FIG. 2, FIG. 3 or FIG. method.
  • the non-transitory computer readable storage medium provided by the embodiment of the present disclosure, before the second terminal terminates the application interface of the specified application to the first terminal, by determining whether the specified application is a classified application, and the designated application is a classified application.
  • the application interface data and the encrypted display mode of the specified application are sent to the first terminal together, so that the first terminal can display the application interface according to the encrypted display mode, thereby providing a new display mode of the application interface, effectively Avoid user privacy leaks.
  • the second terminal determines whether the specified application is a classified application, and specifies that the application is a confidential application before projecting the application interface of the specified application to the first terminal.
  • the application interface data and the encrypted display mode of the specified application are sent to the first terminal together, so that the first terminal can display the application interface according to the encrypted display mode, thereby providing a new display mode of the application interface, effectively Avoid user privacy leaks.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

本公开是关于一种应用界面的显示方法及装置,所述方法包括:当检测到对指定应用的打开操作时,判断指定应用是否为涉密应用;如果指定应用为涉密应用,获取指定应用的加密显示方式;将指定应用的应用界面数据及加密显示方式发送至第一终端,由第一终端对应用界面进行加密显示。

Description

应用界面的显示方法及装置
相关申请和交叉引用
本申请基于申请号为201710888224.4、申请日为2017年09月27日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本公开涉及互联网技术领域,尤其涉及一种应用界面的显示方法及装置。
背景技术
随着互联网技术的发展,为了更好地进行信息共享,很多用户会将智能手机、平板电脑等小屏幕终端的应用界面投射到投影仪、智能电视等大屏幕终端上,由大屏幕终端进行显示。
以大屏幕终端为第一终端,小屏幕终端为第二终端为例,相关技术对应用界面进行显示时,主要采用如下方法:第一终端与第二终端建立网络连接;基于所建立的网络连接,第二终端将指定应用的应用界面数据发送至第一终端;当接收到指定应用的应用界面数据时,第一终端根据应用界面数据,生成指定应用的应用界面,并显示该应用界面。
发明内容
本公开提供一种应用界面的显示方法及装置。
根据本公开实施例的第一方面,提供一种应用界面的显示方法,所述方法包括:
当检测到对指定应用的打开操作时,判断所述指定应用是否为涉密应用;
如果所述指定应用为涉密应用,获取所述指定应用的加密显示方式;
基于预先与第一终端建立的网络连接,将所述指定应用的应用界面数据及所述加密显示方式发送至所述第一终端,所述应用界面数据用于所述第一终端生成所述指定应用的应用界面,所述加密显示方式用于所述第一终端对所述应用界面进行加密显示。
在本公开的另一个实施例中,所述判断所述指定应用是否为涉密应用,包括:
获取所述指定应用的应用标识;
如果所述应用标识与预先设置的涉密应用的应用标识相同,则确定所述指定应用为涉密应用。
在本公开的另一个实施例中,所述获取所述指定应用的加密显示方式,包括:
获取所述指定应用的应用标识;
根据所述应用标识,从加密数据库中,获取所述应用标识对应的加密显示方式,所述加密数据库中存储有加密应用的应用标识与加密显示方式之间的对应关系。
在本公开的另一个实施例中,所述将所述指定应用的应用界面数据及所述加密显示方式发送至所述第一终端之后,还包括:
在所述应用界面的显示过程中,当在所述应用界面上检测到滑动操作时,获取滑动操作的滑动区域;
将所述滑动区域发送至所述第一终端,由所述第一终端显示所述滑动区域内的应用界面内容。
在本公开的另一个实施例中,所述判断所述指定应用是否为涉密应用 之前,还包括:
检测当前模式是否为隐私保护模式;
如果当前模式为隐私保护模式,则执行所述判断所述指定应用是否为涉密应用的步骤。
根据本公开实施例的第二方面,提供一种应用界面的显示方法,所述方法包括:
基于预先与第二终端建立的网络连接,接收所述第二终端发送的指定应用的应用界面数据及加密显示方式,所述指定应用为所述第二终端当前所打开的应用;
根据所述应用界面数据,生成所述指定应用的应用界面;
根据所述加密显示方式,显示所述应用界面。
在本公开的另一个实施例中,所述根据所述加密显示方式,显示所述应用界面之后,还包括:
接收所述第二终端发送的滑动区域,所述滑动区域根据所述第二终端在所述应用界面上检测到的滑动操作确定;
显示所述滑动区域内的应用界面内容。
根据本公开实施例的第三方面,提供一种应用界面的显示装置,所述装置包括:
判断模块,配置为当检测到对指定应用的打开操作时,判断所述指定应用是否为涉密应用;
获取模块,配置为如果所述指定应用为涉密应用,获取所述指定应用的加密显示方式;
发送模块,配置为基于预先与第一终端建立的网络连接,将所述指定应用的应用界面数据及所述加密显示方式发送至所述第一终端,所述应用界面数据用于所述第一终端生成所述指定应用的应用界面,所述加密显示 方式用于所述第一终端对所述应用界面进行加密显示。
在本公开的另一个实施例中,所述判断模块,配置为获取所述指定应用的应用标识;如果所述应用标识与预先设置的涉密应用的应用标识相同,则确定所述指定应用为涉密应用。
在本公开的另一个实施例中,所述获取模块,配置为获取所述指定应用的应用标识;根据所述应用标识,从加密数据库中,获取所述应用标识对应的加密显示方式,所述加密数据库中存储有加密应用的应用标识与加密显示方式之间的对应关系。
在本公开的另一个实施例中,所述获取模块,还配置为在所述应用界面的显示过程中,当在所述应用界面上检测到滑动操作时,获取滑动操作的滑动区域;
所述发送模块,还配置为将所述滑动区域发送至所述第一终端,由所述第一终端显示所述滑动区域内的应用界面内容。
在本公开的另一个实施例中,所述装置还包括:
检测模块,配置为检测当前模式是否为隐私保护模式;
所述判断模块,配置为如果当前模式为隐私保护模式,判断所述指定应用是否为涉密应用。
根据本公开实施例的第四方面,提供一种应用界面的显示装置,所述装置包括:
接收模块,配置为基于预先与第二终端建立的网络连接,接收所述第二终端发送的指定应用的应用界面数据及加密显示方式,所述指定应用为所述第二终端当前所打开的应用;
界面生成模块,配置为根据所述应用界面数据,生成所述指定应用的应用界面;
界面显示模块,配置为根据所述加密显示方式,显示所述应用界面。
在本公开的另一个实施例中,所述接收模块,配置为接收所述第二终端发送的滑动区域,所述滑动区域根据所述第二终端在所述应用界面上检测到的滑动操作确定;
所述界面显示模块,配置为显示所述滑动区域内的应用界面内容。
根据本公开实施例的第五方面,提供一种应用界面的显示装置,包括:
处理器;
配置为存储处理器可执行的指令的存储器;
其中,所述处理器被配置为:
当检测到对指定应用的打开操作时,判断所述指定应用是否为涉密应用;
如果所述指定应用为涉密应用,获取所述指定应用的加密显示方式;
基于预先与第一终端建立的网络连接,将所述指定应用的应用界面数据及所述加密显示方式发送至所述第一终端,所述应用界面数据用于所述第一终端生成所述指定应用的应用界面,所述加密显示方式用于所述第一终端对所述应用界面进行加密显示。
根据本公开实施例的第六方面,提供一种应用界面的显示装置,包括:
处理器;
配置为存储处理器可执行的指令的存储器;
其中,所述处理器被配置为:
基于预先与第二终端建立的网络连接,接收所述第二终端发送的指定应用的应用界面数据及加密显示方式,所述指定应用为所述第二终端当前所打开的应用;
根据所述应用界面数据,生成所述指定应用的应用界面;
根据所述加密显示方式,显示所述应用界面。
根据本公开实施例的第七方面,提供一种非临时性计算机可读存储介 质,所述存储介质中存储有至少一条指令,所述至少一条指令由处理器加载并执行以实现第一方面所述的应用界面的显示方法。
根据本公开实施例的第八方面,提供一种非临时性计算机可读存储介质,所述存储介质中存储有至少一条指令,所述至少一条指令由处理器加载并执行以实现第二方面所述的应用界面的显示方法。
本公开的实施例提供的技术方案可以包括以下有益效果:
第二终端在将指定应用的应用界面投射到第一终端之前,通过判断指定应用是否为涉密应用,并在指定应用为涉密应用时,将指定应用的应用界面数据及加密显示方式一同发送至第一终端,使得第一终端能够按照加密显示方式对应用界面进行显示,从而提供了一种新的应用界面的显示方式,有效地避免了用户的隐私泄露。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1是根据一示例性实施例示出的一种应用界面的显示方法所涉及的实施环境;
图2是根据一示例性实施例示出的一种应用界面的显示方法的流程图;
图3是根据一示例性实施例示出的另一种应用界面的显示方法的流程图;
图4是根据一示例性实施例示出的再一种应用界面的显示方法的流程图;
图5是根据一示例性实施例示出的一种终端界面示意图;
图6是根据一示例性实施例示出的一种终端界面示意图;
图7是根据一示例性实施例示出的一种应用界面的显示装置的框图;
图8是根据一示例性实施例示出的另一种应用界面的显示装置的框图;
图9是根据一示例性实施例示出的一种应用界面的显示装置的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。
图1是根据一示例性实施例示出的一种应用界面的显示方法所涉及的实施环境,参见图1,该实施环境包括:第一终端101和第二终端102。
其中,第一终端101可以为投影仪、智能电视等大屏幕设备。
第二终端102可以为智能手机、平板电脑等小屏幕设备。为了满足用户的使用需求,第二终端102中安装有多种类型的应用,包括导航应用、购物应用、阅读应用、音频播放应用、视频播放应用、社交应用、短信息应用等,根据是否涉及用户的隐私,可将这些应用分为涉密应用(例如购物应用、社交应用、短信息应用等)和非涉密应用(例如导航应用、阅读应用、音频播放应用、视频播放应用等)。
该第一终端101和第二终端102均具有网络连接功能,基于该网络连接功能,第一终端101和第二终端102可通过有线网络或无线网络建立网络连接,从而进行数据的传输。
图2是根据一示例性实施例示出的一种应用界面的显示方法的流程图,如图2所示,应用界面的显示方法用于第二终端中,包括以下步骤。
在步骤S201中,当检测到对指定应用的打开操作时,判断指定应用是否为涉密应用。
在步骤S202中,如果指定应用为涉密应用,获取指定应用的加密显示方式。
在步骤S203中,基于预先与第一终端建立的网络连接,将指定应用的应用界面数据及加密显示方式发送至第一终端。
其中,应用界面数据用于第一终端生成指定应用的应用界面,加密显示方式用于第一终端对应用界面进行加密显示。
本公开实施例提供的方法,第二终端在将指定应用的应用界面投射到第一终端之前,通过判断指定应用是否为涉密应用,并在指定应用为涉密应用时,将指定应用的应用界面数据及加密显示方式一同发送至第一终端,使得第一终端能够按照加密显示方式对应用界面进行显示,从而提供了一种新的应用界面的显示方式,有效地避免了用户的隐私泄露。
在本公开的另一个实施例中,判断指定应用是否为涉密应用,包括:
获取指定应用的应用标识;
如果应用标识与预先设置的涉密应用的应用标识相同,则确定指定应用为涉密应用。
在本公开的另一个实施例中,获取指定应用的加密显示方式,包括:
获取指定应用的应用标识;
根据应用标识,从加密数据库中,获取应用标识对应的加密显示方式,加密数据库中存储有加密应用的应用标识与加密显示方式之间的对应关系。
在本公开的另一个实施例中,将指定应用的应用界面数据及加密显示方式发送至第一终端之后,还包括:
在应用界面的显示过程中,当在应用界面上检测到滑动操作时,获取滑动操作的滑动区域;
将滑动区域发送至第一终端,由第一终端显示滑动区域内的应用界面 内容。
在本公开的另一个实施例中,判断指定应用是否为涉密应用之前,还包括:
检测当前模式是否为隐私保护模式;
如果当前模式为隐私保护模式,则执行判断指定应用是否为涉密应用的步骤。
上述所有可选技术方案,可以采用任意结合形成本公开的可选实施例,在此不再一一赘述。
图3是根据一示例性实施例示出的另一种应用界面的显示方法的流程图,如图3所示,应用界面的显示方法用于第一终端中,包括以下步骤。
在步骤S301中,基于预先与第二终端建立的网络连接,接收第二终端发送的指定应用的应用界面数据及加密显示方式。
其中,指定应用为第二终端当前所打开的应用。
在步骤S302中,根据应用界面数据,生成指定应用的应用界面。
在步骤S303中,根据加密显示方式,显示应用界面。
本公开实施例提供的方法,通过接收第二终端发送的指定应用的应用界面数据及加密显示方式,并按照加密显示方式对应用界面进行显示,从而提供了一种新的应用界面的显示方式,有效地避免了用户的隐私泄露。
在本公开的另一个实施例中,根据加密显示方式,显示应用界面之后,还包括:
接收第二终端发送的滑动区域,滑动区域根据第二终端在应用界面上检测到的滑动操作确定;
显示滑动区域内的应用界面内容。
上述所有可选技术方案,可以采用任意结合形成本公开的可选实施例,在此不再一一赘述。
图4是根据一示例性实施例示出的再一种应用界面的显示方法的流程图,如图4所示,应用界面的显示方法用于第一终端及第二终端中,包括以下步骤。
在步骤S401中,第一终端与第二终端建立网络连接。
由于本公开实施例中,第一终端和第二终端具有网络连接功能,基于网络连接功能,第一终端与第二终端建立网络连接时,包括但不限于如下几种:
第一种方式、第一终端与第二终端启动WiFi(Wireless Fidelity,无线保真)功能,之后,第一终端广播WiFi信号,当接收到WiFi信号时,第一终端与第二终端通过WiFi信号建立网络连接。
第二种方式、第一终端与第二终端开启蓝牙功能,并在设备发现阶段彼此发现,之后,第一终端广播蓝牙信号,第二终端接收到第一终端广播的蓝牙信号后,根据接收到的蓝牙信号与第一终端建立网络连接。
第三种方式、第一终端与第二终端开启NFC(Near Field Communication,近距离无线通信)功能,第一终端与第二终端通过发送数据包建立NFC数据通道,进而根据建立的NFC数据通道彼此之间建立网络连接。
第四种方式、第一终端与第二终端开启红外功能,并在设备发现阶段彼此发现,之后,第一终端发送红外信号,第二终端接收到第一终端发送的红外信号,根据接收到的红外信号与第一终端建立网络连接。
当然,第一终端与第二终端建立网络连接时,还可采用其他方式,本公开实施例不再一一说明。
在步骤S402中,当检测到对指定应用的打开操作时,第二终端判断指定应用是否为涉密应用。
在本公开实施例中,第二终端具有两种模式,一种为隐私保护模式, 一种为非隐私保护模式。在隐私保护模式下,第二终端会判断当前打开的应用是否为涉密应用,并在当前打开的应用为涉密应用时,获取加密显示方式,并将应用界面数据及加密显示方式发送至第一终端,使得第一终端按照加密显示方式对应用界面进行显示,从而有效地保护了用户的隐私;在非隐私保护模式下,第二终端将应用界面数据发送至第一终端进行显示,不会对用户的隐私进行保护。
在本公开实施例中,由于第二终端处于不同的显示模式,第一终端对应用界面的显示方式是不同的,因而当检测到对指定应用的打开操作时,第二终端需要检测当前模式是否为隐私保护模式,如果当前模式为隐私保护模式,则判断指定应用是否为涉密应用。
具体地,第二终端在判断指定应用是否为涉密应用时,可采用如下步骤:
步骤4021、第二终端获取指定应用的应用标识。
其中,应用标识用于唯一标识一个应用,包括应用名称、应用版本等等。
步骤4022、如果应用标识与预先设置的涉密应用的应用标识相同,则第二终端确定指定应用为涉密应用。
第二终端维护一个加密应用数据库,该加密应用数据库中存储有加密应用的应用标识与加密显示方式之间的对应关系,该加密显示方式用于第一终端对加密应用的应用界面进行加密显示,该加密显示方式包括毛玻璃效果等。
其中,加密应用数据库的建立过程为:第二终端提供加密应用设置界面,该加密应用设置界面上显示有加密应用设置选项和加密显示方式设置选项,用户可根据每个应用是否涉密,通过加密应用设置选项,将涉及用户隐私的应用设置为涉密应用,并根据加密显示方式设置选项,为每个涉 密应用设置加密显示方式。用户在为每个涉密应用设置加密显示方式时,可将所有的加密应用设置相同的加密显示方式,还可根据每个涉密应用的涉密程度,为每个涉密应用设置不同的加密显示方式,第二终端通过检测用户在加密应用设置界面上的设置操作,获取用户所设置的加密应用及对应的加密显示方式,并据此建立加密应用数据库。
基于所建立的加密应用数据库,第二终端判断该指定应用的应用标识是否与预先设置的涉密应用的应用标识相同,如果该应用标识与预先设置的涉密应用的应用标识相同,则确定指定应用为涉密应用,如果应用标识与预先设置的涉密应用的应用标识不同,则确定指定应用为非涉密应用,并将该指定应用的应用界面数据直接发送至第一终端,由第一终端进行显示。
在步骤S403中,如果指定应用为涉密应用,第二终端获取指定应用的加密显示方式。
当确定指定应用为涉密应用,第二终端还将根据指定应用的应用标识,从预先建立的加密数据库中,获取应用标识对应的加密显示方式。
在步骤S404中,第二终端将指定应用的应用界面数据及加密显示方式发送至第一终端。
当获取到指定应用的加密显示方式,第二终端基于预先与第一终端所建立的网络连接,将指定应用的应用界面数据及加密显示方式发送至第一终端,从而由第一终端进行显示。当然,由于第二终端的应用界面通常只能由第二终端侧用户观看到,其他用户无法观看到,因而第二终端可正常显示指定应用的应用界面。
在步骤S405中,当接收到第二终端发送的指定应用的应用界面数据及加密显示方式,第一终端根据应用界面数据,生成指定应用的应用界面。
由于应用界面数据中具有需要绘制的应用界面的界面元素及界面元素 的显示参数,且根据应用界面数据的显示参数,可以确定需要绘制的界面元素的绘制形式,因此,基于获取到应用界面数据,终端可绘制界面元素对应的图形元素,进而绘制出指定应用的应用界面。其中,图形元素可以是按钮、图标等,本公开实施例不对图形元素作具体的限定。
在步骤S406中,第一终端根据加密显示方式,显示应用界面。
由于指定应用为涉密应用,因而为了避免用户的隐私泄露,当绘制出指定应用的应用界面后,第一终端将按照加密显示方式,对指定应用的应用界面进行显示。例如,加密显示方式为毛玻璃效果,则采用毛玻璃效果显示指定应用的应用界面。参见图5,第二终端正常显示指定应用的应用界面,第一终端侧采用毛玻璃效果显示指定应用的应用界面。
在本公开的另一个实施例中,在应用界面的显示过程中,当第二终端在应用界面上检测到滑动操作时,第二终端可获取滑动操作的滑动区域,并将滑动区域发送至第一终端,当接收到第二终端发送的滑动区域,第一终端显示滑动区域内的应用界面内容,从而使得第一终端侧用户能够观看到应用界面上未涉密的内容,从而达到信息分享的目的。
参见图6,当在应用界面上检测到用户的滑动操作时,第二终端获取用户滑动操作的滑动区域,并将该滑动区域发送至第一终端,当接收到滑动区域时,第一终端取消该滑动区域内的毛玻璃效果,采用正常的显示方式显示位于该滑动区域内的应用界面内容,从而使得第一终端侧用户可观看到滑动区域内的应用界面内容。
如果用户因误操作打开了涉密应用,本公开实施例提供的方法并不会直接将涉密应用的应用界面展示出来,而是采用加密显示方式对应用界面进行显示,从而有效地保护了用户的隐私;如果用户不是误操作打开了涉密应用,用户通过在应用界面上进行滑动操作,可将滑动区域内的应用界面内容显示出来,从而将应用界面上的内容有选择地呈现给用户。
本公开实施例提供的方法,第二终端在将指定应用的应用界面投射到第一终端之前,通过判断指定应用是否为涉密应用,并在指定应用为涉密应用时,将指定应用的应用界面数据及加密显示方式一同发送至第一终端,使得第一终端能够按照加密显示方式对应用界面进行显示,从而提供了一种新的应用界面的显示方式,有效地避免了用户的隐私泄露。
图7是根据一示例性实施例示出的一种应用界面的显示装置的框图。参照图7,该装置包括:判断模块701、获取模块702及发送模块703。
该判断模块701被配置为当检测到对指定应用的打开操作时,判断指定应用是否为涉密应用;
该获取模块702被配置为如果指定应用为涉密应用,获取指定应用的加密显示方式;
该发送模块703被配置为基于预先与第一终端建立的网络连接,将指定应用的应用界面数据及加密显示方式发送至第一终端,该应用界面数据用于第一终端生成指定应用的应用界面,该加密显示方式用于第一终端对应用界面进行加密显示。
在本公开的另一个实施例中,该判断模块701被配置为获取指定应用的应用标识;如果应用标识与预先设置的涉密应用的应用标识相同,则确定指定应用为涉密应用。
在本公开的另一个实施例中,该获取模块702被配置为获取指定应用的应用标识;根据应用标识,从加密数据库中,获取应用标识对应的加密显示方式,该加密数据库中存储有加密应用的应用标识与加密显示方式之间的对应关系。
在本公开的另一个实施例中,该获取模块702被配置为在应用界面的显示过程中,当在应用界面上检测到滑动操作时,获取滑动操作的滑动区域;
该发送模块703被配置为将滑动区域发送至第一终端,由第一终端显示滑动区域内的应用界面内容。
在本公开的另一个实施例中,该装置还包括:检测模块。
该检测模块被配置为检测当前模式是否为隐私保护模式;
该判断模块701被配置为如果当前模式为隐私保护模式,判断指定应用是否为涉密应用。
本公开实施例提供的装置,第二终端在将指定应用的应用界面投射到第一终端之前,通过判断指定应用是否为涉密应用,并在指定应用为涉密应用时,将指定应用的应用界面数据及加密显示方式一同发送至第一终端,使得第一终端能够按照加密显示方式对应用界面进行显示,从而提供了一种新的应用界面的显示方式,有效地避免了用户的隐私泄露。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
图8是根据一示例性实施例示出的另一种应用界面的显示装置的框图。参照图8,该装置包括:接收模块801、界面生成模块802及界面显示模块803。
该接收模块801被配置为基于预先与第二终端建立的网络连接,接收第二终端发送的指定应用的应用界面数据及加密显示方式,该指定应用为第二终端当前所打开的应用;
该界面生成模块802被配置为根据应用界面数据,生成指定应用的应用界面;
该界面显示模块803被配置为根据加密显示方式,显示应用界面。
在本公开的另一个实施例中,该接收模块801被配置为接收第二终端发送的滑动区域,该滑动区域根据第二终端在应用界面上检测到的滑动操作确定;
该界面显示模块803被配置为显示滑动区域内的应用界面内容。
本公开实施例提供的装置,通过接收第二终端发送的指定应用的应用界面数据及加密显示方式,并按照加密显示方式对应用界面进行显示,从而提供了一种新的应用界面的显示方式,有效地避免了用户的隐私泄露。
图9是根据一示例性实施例示出的一种应用界面的显示装置900的框图。例如,显示装置900可以是移动电话、计算机、数字广播终端、消息收发设备、游戏控制台、平板设备、医疗设备、健身设备、个人数字助理等。
参照图9,显示装置900可以包括以下一个或多个组件:处理组件902,存储器904,电源组件906,多媒体组件908,音频组件910,输入/输出(I/O)接口912,传感器组件914,以及通信组件916。
处理组件902通常控制显示装置900的整体操作,诸如与显示、电话呼叫、数据通信、相机操作和记录操作相关联的操作。处理组件902可以包括一个或多个处理器920来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件902可以包括一个或多个模块,便于处理组件902和其他组件之间的交互。例如,处理组件902可以包括多媒体模块,以方便多媒体组件908和处理组件902之间的交互。
存储器904被配置为存储各种类型的数据以支持在显示装置900的操作。这些数据的示例包括用于在显示装置900上操作的任何应用程序或方法的指令、联系人数据、电话簿数据、消息、图片、视频等。存储器904可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM)、电可擦除可编程只读存储器(EEPROM)、可擦除可编程只读存储器(EPROM)、可编程只读存储器(PROM)、只读存储器(ROM)、磁存储器、快闪存储器、磁盘或光盘。
电源组件906为显示装置900的各种组件提供电力。电源组件906可 以包括电源管理系统,一个或多个电源,及其他与为显示装置900生成、管理和分配电力相关联的组件。
多媒体组件908包括在所述显示装置900和用户之间提供的一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件908包括一个前置摄像头和/或后置摄像头。当显示装置900处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件910被配置为输出和/或输入音频信号。例如,音频组件910包括一个麦克风(MIC),当显示装置900处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器904或经由通信组件916发送。在一些实施例中,音频组件810还包括一个扬声器,配置为输出音频信号。
I/O接口912为处理组件902和外围接口模块之间提供接口,上述外围接口模块可以是键盘、点击轮、按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件914包括一个或多个传感器,配置为为显示装置900提供各个方面的状态评估。例如,传感器组件914可以检测到显示装置900的打开/关闭状态,组件的相对定位,例如所述组件为显示装置900的显示器和小键盘,传感器组件914还可以检测显示装置900或显示装置900一个组件的位置改变,用户与显示装置900接触的存在或不存在,显示装置900 方位或加速/减速和显示装置900的温度变化。传感器组件914可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件914还可以包括光传感器,如CMOS或CCD图像传感器,配置为在成像应用中使用。在一些实施例中,该传感器组件914还可以包括加速度传感器、陀螺仪传感器、磁传感器、压力传感器或温度传感器。
通信组件916被配置为便于显示装置900和其他设备之间有线或无线方式的通信。显示装置900可以接入基于通信标准的无线网络,如WiFi、2G或3G,或它们的组合。在一个示例性实施例中,通信组件916经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件916还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术、红外数据协会(IrDA)技术、超宽带(UWB)技术、蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,显示装置900可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,配置为执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器904,上述指令可由显示装置900的处理器920执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、CD-ROM、磁带、软盘和光数据存储设备等。
一种非临时性计算机可读存储介质,当所述存储介质中的指令由移动终端的处理器执行时,使得移动终端能够执行图2、图3或图4所示的一种应用界面的显示方法。
本公开实施例提供的非临时性计算机可读存储介质,第二终端在将指 定应用的应用界面投射到第一终端之前,通过判断指定应用是否为涉密应用,并在指定应用为涉密应用时,将指定应用的应用界面数据及加密显示方式一同发送至第一终端,使得第一终端能够按照加密显示方式对应用界面进行显示,从而提供了一种新的应用界面的显示方式,有效地避免了用户的隐私泄露。
本领域技术人员在考虑说明书及实践这里公开的实施例公开后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开实施例的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开实施例的一般性原理并包括本公开实施例未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。
工业实用性
本公开的实施例提供的技术方案可以包括以下有益效果:第二终端在将指定应用的应用界面投射到第一终端之前,通过判断指定应用是否为涉密应用,并在指定应用为涉密应用时,将指定应用的应用界面数据及加密显示方式一同发送至第一终端,使得第一终端能够按照加密显示方式对应用界面进行显示,从而提供了一种新的应用界面的显示方式,有效地避免了用户的隐私泄露。

Claims (18)

  1. 一种应用界面的显示方法,所述方法包括:
    当检测到对指定应用的打开操作时,判断所述指定应用是否为涉密应用;
    如果所述指定应用为涉密应用,获取所述指定应用的加密显示方式;
    基于预先与第一终端建立的网络连接,将所述指定应用的应用界面数据及所述加密显示方式发送至所述第一终端,所述应用界面数据用于所述第一终端生成所述指定应用的应用界面,所述加密显示方式用于所述第一终端对所述应用界面进行加密显示。
  2. 根据权利要求1所述的方法,其中,所述判断所述指定应用是否为涉密应用,包括:
    获取所述指定应用的应用标识;
    如果所述应用标识与预先设置的涉密应用的应用标识相同,则确定所述指定应用为涉密应用。
  3. 根据权利要求1所述的方法,其中,所述获取所述指定应用的加密显示方式,包括:
    获取所述指定应用的应用标识;
    根据所述应用标识,从加密数据库中,获取所述应用标识对应的加密显示方式,所述加密数据库中存储有加密应用的应用标识与加密显示方式之间的对应关系。
  4. 根据权利要求1至3中任一项所述的方法,其中,所述将所述指定应用的应用界面数据及所述加密显示方式发送至所述第一终端之后,还包括:
    在所述应用界面的显示过程中,当在所述应用界面上检测到滑动操作时,获取滑动操作的滑动区域;
    将所述滑动区域发送至所述第一终端,由所述第一终端显示所述滑动区域内的应用界面内容。
  5. 根据权利要求1所述的方法,其中,所述判断所述指定应用是否为涉密应用之前,还包括:
    检测当前模式是否为隐私保护模式;
    如果当前模式为隐私保护模式,则执行所述判断所述指定应用是否为涉密应用的步骤。
  6. 一种应用界面的显示方法,所述方法包括:
    基于预先与第二终端建立的网络连接,接收所述第二终端发送的指定应用的应用界面数据及加密显示方式,所述指定应用为所述第二终端当前所打开的应用;
    根据所述应用界面数据,生成所述指定应用的应用界面;
    根据所述加密显示方式,显示所述应用界面。
  7. 根据权利要求6所述的方法,其中,所述根据所述加密显示方式,显示所述应用界面之后,还包括:
    接收所述第二终端发送的滑动区域,所述滑动区域根据所述第二终端在所述应用界面上检测到的滑动操作确定;
    显示所述滑动区域内的应用界面内容。
  8. 一种应用界面的显示装置,所述装置包括:
    判断模块,配置为当检测到对指定应用的打开操作时,判断所述指定应用是否为涉密应用;
    获取模块,配置为如果所述指定应用为涉密应用,获取所述指定应用的加密显示方式;
    发送模块,配置为基于预先与第一终端建立的网络连接,将所述指定应用的应用界面数据及所述加密显示方式发送至所述第一终端,所述应用 界面数据用于所述第一终端生成所述指定应用的应用界面,所述加密显示方式用于所述第一终端对所述应用界面进行加密显示。
  9. 根据权利要求8所述的装置,其中,所述判断模块,配置为获取所述指定应用的应用标识;如果所述应用标识与预先设置的涉密应用的应用标识相同,则确定所述指定应用为涉密应用。
  10. 根据权利要求8所述的装置,其中,所述获取模块,配置为获取所述指定应用的应用标识;根据所述应用标识,从加密数据库中,获取所述应用标识对应的加密显示方式,所述加密数据库中存储有加密应用的应用标识与加密显示方式之间的对应关系。
  11. 根据权利要求8至10中任一项所述的装置,其中,所述获取模块,还配置为在所述应用界面的显示过程中,当在所述应用界面上检测到滑动操作时,获取滑动操作的滑动区域;
    所述发送模块,还配置为将所述滑动区域发送至所述第一终端,由所述第一终端显示所述滑动区域内的应用界面内容。
  12. 根据权利要求8所述的装置,其中,所述装置还包括:
    检测模块,配置为检测当前模式是否为隐私保护模式;
    所述判断模块,配置为如果当前模式为隐私保护模式,判断所述指定应用是否为涉密应用。
  13. 一种应用界面的显示装置,所述装置包括:
    接收模块,配置为基于预先与第二终端建立的网络连接,接收所述第二终端发送的指定应用的应用界面数据及加密显示方式,所述指定应用为所述第二终端当前所打开的应用;
    界面生成模块,配置为根据所述应用界面数据,生成所述指定应用的应用界面;
    界面显示模块,配置为根据所述加密显示方式,显示所述应用界面。
  14. 根据权利要求13所述的装置,其中,
    所述接收模块,配置为接收所述第二终端发送的滑动区域,所述滑动区域根据所述第二终端在所述应用界面上检测到的滑动操作确定;
    所述界面显示模块,配置为显示所述滑动区域内的应用界面内容。
  15. 一种应用界面的显示装置,包括:
    处理器;
    配置为存储处理器可执行的指令的存储器;
    其中,所述处理器被配置为:
    当检测到对指定应用的打开操作时,判断所述指定应用是否为涉密应用;
    如果所述指定应用为涉密应用,获取所述指定应用的加密显示方式;
    基于预先与第一终端建立的网络连接,将所述指定应用的应用界面数据及所述加密显示方式发送至所述第一终端,所述应用界面数据用于所述第一终端生成所述指定应用的应用界面,所述加密显示方式用于所述第一终端对所述应用界面进行加密显示。
  16. 一种应用界面的显示装置,包括:
    处理器;
    配置为存储处理器可执行的指令的存储器;
    其中,所述处理器被配置为:
    基于预先与第二终端建立的网络连接,接收所述第二终端发送的指定应用的应用界面数据及加密显示方式,所述指定应用为所述第二终端当前所打开的应用;
    根据所述应用界面数据,生成所述指定应用的应用界面;
    根据所述加密显示方式,显示所述应用界面。
  17. 一种非临时性计算机可读存储介质,所述存储介质中存储有至少 一条指令,所述至少一条指令由处理器加载并执行以实现如权利要求1至5中任一项所述的应用界面的显示方法。
  18. 一种非临时性计算机可读存储介质,所述存储介质中存储有至少一条指令,所述至少一条指令由处理器加载并执行以实现如权利要求6或7所述的应用界面的显示方法。
PCT/CN2018/085008 2017-09-27 2018-04-28 应用界面的显示方法及装置 WO2019062115A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2018568379A JP6892878B2 (ja) 2017-09-27 2018-04-28 アプリケーションインターフェースの表示方法、及び装置
KR1020197007294A KR102244436B1 (ko) 2017-09-27 2018-04-28 애플리케이션 인터페이스의 디스플레이 방법, 장치 및 컴퓨터 판독가능 저장매체
RU2018137223A RU2710662C1 (ru) 2017-09-27 2018-04-28 Способ и устройство для отображения интерфейса приложения

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710888224.4A CN107682538A (zh) 2017-09-27 2017-09-27 应用界面的显示方法及装置
CN201710888224.4 2017-09-27

Publications (1)

Publication Number Publication Date
WO2019062115A1 true WO2019062115A1 (zh) 2019-04-04

Family

ID=61137419

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/085008 WO2019062115A1 (zh) 2017-09-27 2018-04-28 应用界面的显示方法及装置

Country Status (7)

Country Link
US (1) US10922444B2 (zh)
EP (1) EP3462367B1 (zh)
JP (1) JP6892878B2 (zh)
KR (1) KR102244436B1 (zh)
CN (1) CN107682538A (zh)
RU (1) RU2710662C1 (zh)
WO (1) WO2019062115A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107682538A (zh) 2017-09-27 2018-02-09 北京小米移动软件有限公司 应用界面的显示方法及装置
CN109558749B (zh) * 2018-11-28 2021-06-01 Oppo广东移动通信有限公司 一种数据的存储方法、终端及计算机存储介质
CN109857310B (zh) * 2019-02-01 2021-11-12 网易(杭州)网络有限公司 电子系统中的信息处理方法与装置、存储介质、电子设备
CN115981582B (zh) * 2020-09-10 2024-05-14 华为技术有限公司 显示方法及电子设备
JP7444197B2 (ja) 2022-06-27 2024-03-06 大日本印刷株式会社 電子情報記憶媒体、暗号演算方式選択方法、及びプログラム

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080034435A1 (en) * 2006-08-03 2008-02-07 Ibm Corporation Methods and arrangements for detecting and managing viewability of screens, windows and like media
CN104317620A (zh) * 2014-10-24 2015-01-28 中兴通讯股份有限公司 基于多屏分享的应用管理方法及装置
CN105956486A (zh) * 2016-04-29 2016-09-21 北京小米移动软件有限公司 远程控制方法及装置
CN106331331A (zh) * 2016-08-18 2017-01-11 中国联合网络通信集团有限公司 终端信息的显示方法、生成方法、显示装置及服务器
CN106657651A (zh) * 2016-12-29 2017-05-10 努比亚技术有限公司 一种投射处理方法、装置及终端
CN107682538A (zh) * 2017-09-27 2018-02-09 北京小米移动软件有限公司 应用界面的显示方法及装置

Family Cites Families (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002163212A (ja) * 2000-11-28 2002-06-07 Canon Inc 通信システム及びその制御方法、及び媒体
US7475260B2 (en) * 2002-05-09 2009-01-06 International Business Machines Corporation Method and apparatus for protecting sensitive information in a log file
US8190913B2 (en) * 2004-04-30 2012-05-29 Research In Motion Limited System and method for content protection on a computing device
US7797750B2 (en) * 2004-08-10 2010-09-14 Newport Scientific Research Llc Data security system
US7765483B2 (en) * 2005-09-12 2010-07-27 Microsoft Corporation Filtering obscured data from a remote client display
US7685238B2 (en) * 2005-12-12 2010-03-23 Nokia Corporation Privacy protection on application sharing and data projector connectivity
EP2345977B1 (en) * 2008-11-28 2017-04-05 International Business Machines Corporation Client computer for protecting confidential file, server computer therefor, method therefor, and computer program
US8488783B2 (en) * 2010-02-19 2013-07-16 Nokia Method and apparatus for applying recipient criteria in identity-based encryption
US9025767B2 (en) * 2010-03-24 2015-05-05 Nokia Corporation Method and apparatus for querying content protected by identity-based encryption
US8499341B2 (en) * 2011-02-01 2013-07-30 Microsoft Corporation Resumable private browsing session
JP2012203889A (ja) * 2011-03-28 2012-10-22 Fujitsu Ltd 画面共有方法、画面共有装置、及びプログラム
US8910297B2 (en) * 2012-01-05 2014-12-09 Vmware, Inc. Securing user data in cloud computing environments
JP5966505B2 (ja) * 2012-03-28 2016-08-10 日本電気株式会社 サーバ装置、クライアント装置、リクエスト処理方法、サーバ応答処理方法、リクエスト処理プログラム、および、応答処理プログラム
US9699271B2 (en) * 2013-01-29 2017-07-04 Blackberry Limited Method and apparatus for suspending screen sharing during confidential data entry
CN104217169B (zh) * 2013-06-05 2016-08-10 腾讯科技(深圳)有限公司 一种加密推荐方法及装置、终端
JP6205886B2 (ja) * 2013-06-18 2017-10-04 船井電機株式会社 情報装置及び配信システム
US20160205082A1 (en) * 2013-08-12 2016-07-14 Graphite Software Corporation Secure authentication and switching to encrypted domains
US9350714B2 (en) * 2013-11-19 2016-05-24 Globalfoundries Inc. Data encryption at the client and server level
US9361469B2 (en) 2014-03-26 2016-06-07 Amazon Technologies, Inc. Electronic communication with secure screen sharing of sensitive information
US9998914B2 (en) * 2014-04-16 2018-06-12 Jamf Software, Llc Using a mobile device to restrict focus and perform operations at another mobile device
US9406157B2 (en) 2014-04-21 2016-08-02 Airwatch Llc Concealing sensitive information on a display
US20150302218A1 (en) * 2014-04-22 2015-10-22 Pacid Technologies, Llc Method and system for file hiding
JP6037461B2 (ja) * 2014-05-09 2016-12-07 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation 機密情報に応じた表示を行う装置、システム、方法およびプログラム
CN104021350B (zh) * 2014-05-13 2016-07-06 小米科技有限责任公司 隐私信息隐藏方法及装置
US9584492B2 (en) * 2014-06-23 2017-02-28 Vmware, Inc. Cryptographic proxy service
US9635011B1 (en) * 2014-08-27 2017-04-25 Jonetix Corporation Encryption and decryption techniques using shuffle function
FR3026207B1 (fr) * 2014-09-22 2018-08-17 Prove & Run Terminal a affichage securise
TWI520051B (zh) * 2014-11-05 2016-02-01 奇揚網科股份有限公司 鏡射顯示系統與鏡射顯示方法
US9967320B2 (en) * 2014-12-18 2018-05-08 Google Llc Methods, systems, and media for controlling information used to present content on a public display device
SG11201703525SA (en) * 2014-12-29 2017-05-30 Visa Int Service Ass Over-the-air provisioning of application library
US20160241530A1 (en) * 2015-02-12 2016-08-18 Vonage Network Llc Systems and methods for managing access to message content
US9565176B2 (en) * 2015-03-10 2017-02-07 Citrix Systems, Inc. Multiscreen secure content access
CN104811639B (zh) * 2015-04-28 2019-04-26 联想(北京)有限公司 信息处理方法及电子设备
JP5906344B1 (ja) * 2015-07-06 2016-04-20 ヤフー株式会社 情報処理装置、情報表示プログラムおよび情報表示方法
US9830474B2 (en) * 2015-10-30 2017-11-28 International Business Machines Corporation Concealing sensitive content from unauthorized users
CN105912258B (zh) * 2016-04-13 2019-12-13 北京小米移动软件有限公司 操作处理方法及装置
US10805286B2 (en) * 2016-09-29 2020-10-13 Intel Corporation Mirrored communication devices in carrier networks
US20180330118A1 (en) * 2017-05-09 2018-11-15 Ping Kwan Leung Methods and systems for intelligently conducting encryption in chat room communications
US10306299B2 (en) * 2017-05-24 2019-05-28 Google Llc Methods, systems, and media for transferring playback of media content

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080034435A1 (en) * 2006-08-03 2008-02-07 Ibm Corporation Methods and arrangements for detecting and managing viewability of screens, windows and like media
CN104317620A (zh) * 2014-10-24 2015-01-28 中兴通讯股份有限公司 基于多屏分享的应用管理方法及装置
CN105956486A (zh) * 2016-04-29 2016-09-21 北京小米移动软件有限公司 远程控制方法及装置
CN106331331A (zh) * 2016-08-18 2017-01-11 中国联合网络通信集团有限公司 终端信息的显示方法、生成方法、显示装置及服务器
CN106657651A (zh) * 2016-12-29 2017-05-10 努比亚技术有限公司 一种投射处理方法、装置及终端
CN107682538A (zh) * 2017-09-27 2018-02-09 北京小米移动软件有限公司 应用界面的显示方法及装置

Also Published As

Publication number Publication date
US20190095654A1 (en) 2019-03-28
KR102244436B1 (ko) 2021-04-27
JP6892878B2 (ja) 2021-06-23
EP3462367B1 (en) 2021-02-24
EP3462367A1 (en) 2019-04-03
US10922444B2 (en) 2021-02-16
KR20190042612A (ko) 2019-04-24
JP2020501207A (ja) 2020-01-16
RU2710662C1 (ru) 2019-12-30
CN107682538A (zh) 2018-02-09

Similar Documents

Publication Publication Date Title
JP6220993B2 (ja) スマート・ハードウェアデバイスの制御方法、装置、プログラム及び記録媒体
US9769667B2 (en) Methods for controlling smart device
WO2019062115A1 (zh) 应用界面的显示方法及装置
WO2016050037A1 (zh) 操作授权方法及装置
CN106453052B (zh) 消息交互方法及装置
WO2016155306A1 (zh) 网络接入方法及装置
WO2016045280A1 (zh) 信息交互方法及装置、电子设备
WO2016192323A1 (zh) 视频通信方法及装置
WO2017045311A1 (zh) 短信读取方法及装置
WO2016155231A1 (zh) 网络接入方法及装置
WO2017035994A1 (zh) 外接设备的连接方法及装置
WO2016134600A1 (zh) 智能设备检测方法和装置
WO2017020413A1 (zh) 网络接入方法、设备及系统
US9723486B2 (en) Method and apparatus for accessing network
WO2016015403A1 (zh) 一种接入wi-fi网络的方法及装置
US20170171794A1 (en) Method and apparatus for acquiring routing information
WO2016155304A1 (zh) 无线访问接入点的控制方法及装置
WO2018000710A1 (zh) WiFi信号图标的展示方法、装置和移动终端
US20220294624A1 (en) Encryption method and device, electronic apparatus and storage medium
WO2022205906A1 (zh) 数据加密方法、装置、电子设备及存储介质
US9674768B2 (en) Method and device for accessing wireless network
WO2017024739A1 (zh) 发送文件的方法及装置
WO2018018636A1 (zh) 信息写入方法及装置
WO2023212943A1 (zh) 数据交互方法、装置、电子设备和存储介质
CN113225691B (zh) 音频处理方法、装置及存储介质

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2018568379

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20197007294

Country of ref document: KR

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18862471

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18862471

Country of ref document: EP

Kind code of ref document: A1