WO2021218735A1 - 信息显示方法、装置、电子设备、存储介质及程序产品 - Google Patents

信息显示方法、装置、电子设备、存储介质及程序产品 Download PDF

Info

Publication number
WO2021218735A1
WO2021218735A1 PCT/CN2021/088664 CN2021088664W WO2021218735A1 WO 2021218735 A1 WO2021218735 A1 WO 2021218735A1 CN 2021088664 W CN2021088664 W CN 2021088664W WO 2021218735 A1 WO2021218735 A1 WO 2021218735A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
content
information
security level
processing
Prior art date
Application number
PCT/CN2021/088664
Other languages
English (en)
French (fr)
Inventor
张栋
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2021218735A1 publication Critical patent/WO2021218735A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Definitions

  • the embodiments of the present application relate to the technical field of electronic equipment, and in particular to an information display method, device, electronic equipment, storage medium, and program product.
  • electronic devices can be connected through communication to share information.
  • the embodiments of the present application provide an information display method, device, electronic device, storage medium, and program product, which can solve security problems such as information leakage that occur in the process of sharing information with electronic devices.
  • an embodiment of the present application provides an information display method, which is applied to a first electronic device, and the information display method includes:
  • the first electronic device In the case where the first electronic device is connected to the second electronic device, obtain the first security level of the environment in which the second electronic device is located;
  • the first processing is a processing method that matches the first security level of the environment in which the second electronic device is located.
  • an information display device including:
  • the obtaining module is used to obtain the first security level of the environment in which the second electronic device is located when the first electronic device is connected to the second electronic device;
  • the processing module is configured to perform first processing on the first content to obtain the second content
  • a sending module configured to send the second content to the second electronic device, so that the second electronic device displays the second content
  • the first processing is a processing method that matches the first security level of the environment in which the second electronic device is located.
  • an embodiment of the present application provides an electronic device, including a processor, a memory, and a computer program stored in the memory and capable of running on the processor.
  • the processor executes the computer program as described in the first aspect. The steps of the information display method described.
  • an embodiment of the present application provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • the computer program is executed by a processor, the steps of the information display method as described in the first aspect are implemented.
  • an embodiment of the present application provides an electronic device configured to execute the steps of the information display method as described in the first aspect.
  • the embodiments of the present application provide a computer program product, the program product is stored in a non-volatile storage medium, and the program product is executed by at least one processor to implement the computer program product described in the first aspect.
  • the steps of the information display method are described in the sixth aspect.
  • the content sent by the first electronic device to the second electronic device is obtained by acquiring the first security information where the second electronic device is located, It is no longer simply sending the first content, but first processing the first content matching the first security information, and then sending the second content obtained after the first processing to the second electronic device Therefore, the safety and reliability of electronic devices in the process of sharing information can be improved, thereby improving the user experience.
  • FIG. 1 is a schematic flowchart of an information display method provided by an embodiment of this application.
  • FIG. 2 is a schematic flowchart of an information display method provided by another embodiment of this application.
  • FIG. 3 is a first schematic diagram of shared information provided by an embodiment of this application.
  • Figure 4a is a second schematic diagram of shared information provided by an embodiment of this application.
  • Figure 4b is a third schematic diagram of shared information provided by an embodiment of this application.
  • FIG. 5 is a schematic diagram of prompt information provided by an embodiment of this application.
  • FIG. 6 is a schematic structural diagram of an information display device provided by an embodiment of this application.
  • FIG. 7 is a schematic diagram of the hardware structure of an electronic device that implements each embodiment of the present application.
  • the environment of the electronic devices connected in communication will also be very different. If the environment of the connected electronic devices is a relatively open environment such as coffee shops, shopping malls, restaurants, etc., the content of the communication between the electronic devices is easily leaked, which leads to security problems such as information leakage.
  • the embodiments of the present application provide an information display method, device, electronic device, and medium that can solve security problems such as information leakage in the process of electronic equipment sharing information.
  • FIG. 1 is a schematic flowchart of an information display method provided by an embodiment of this application.
  • the method shown in FIG. 1 may be executed by an electronic device, which may include, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a vehicle-mounted terminal, a wearable device, and a pedometer, etc. .
  • an electronic device which may include, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a vehicle-mounted terminal, a wearable device, and a pedometer, etc.
  • the information display method applied to the first electronic device includes:
  • S110 Acquire the first security level of the environment in which the second electronic device is located when the first electronic device is connected to the second electronic device.
  • the first security level may be the risk level of the environment in which the user is currently located. For example, high risk, medium risk, low risk, no risk, etc.
  • the information display method further includes: S120, performing first processing on the first content to obtain the second content, and sending the second content to the second electronic device, so that the second electronic device displays the second content.
  • the first processing is a processing method that matches the first security level of the environment in which the second electronic device is located.
  • the first processing may be a blurred display, a processing method such as occlusion using a preset mark, or a normal display.
  • the first processing can be normal display, and when the first security level is any one of high risk, medium risk, and low risk, the first processing can be obfuscation Display or use the preset logo to block.
  • the first electronic device may send the processed second content to the second electronic device, so as to display the second content on the second electronic device.
  • the content sent by the first electronic device to the second electronic device is obtained by acquiring the first security information where the second electronic device is located, It is no longer simply the sending of the first content, but the first processing that matches the first security information is first performed on the first content, and then the second content obtained after the first processing is sent to the second electronic device Therefore, the safety and reliability of electronic devices in the process of sharing information can be improved, thereby improving the user experience.
  • the target first risk indicator corresponding to the environment in which the second electronic device is located; where the first correspondence is the correspondence between the environmental information and the first risk indicator;
  • the security level corresponding to the target second risk indicator is determined as the first security level; wherein the second correspondence is the correspondence between the second risk indicator and the security level.
  • the user's personal information may be stored in the first electronic device in advance.
  • face information, voiceprint information, and trusted location information (work location, home, etc.) set by the user himself.
  • trusted location information (work location, home, etc.) set by the user himself.
  • the information of people trusted by the user can also be added to the first electronic device. For example, it may be to store some family information, so that when the first electronic device determines the user’s target communication risk information later, it will not cause the second electronic device’s security level to be rated due to the information collected by the user’s trusted person. deviation.
  • the first electronic device may obtain environmental information of the environment in which the second electronic device is located, where the environmental information may include at least one of the following: face information in the environment in which the electronic device is located, and sound information of the surrounding environment of the electronic device And the location information of the electronic device.
  • the sound information may include voiceprint information and sound size.
  • the environmental information of the environment where the second electronic device is acquired by the first electronic device may include the following information: the user's face Information, the facial information of other guests in the coffee shop collected by the camera collection device, the sound level of the surrounding environment, the voiceprint information existing in the surrounding environment, and the current location information of the user.
  • the environment of the second electronic device may include at least the following situations:
  • Face information in the environment where the electronic device is located is located:
  • the number of faces collected in the camera collection device is equal to 1, but it does not match the pre-stored face information
  • the number of faces collected in the camera collection device is greater than 1, and includes pre-stored face information
  • the number of faces collected in the camera collection device is greater than 1, and does not include pre-stored face information.
  • the sound level is greater than the preset number of decibels
  • the current location information of the electronic device does not match the pre-stored location information
  • the current moving speed of the electronic device is greater than the preset threshold.
  • the environmental information can be converted into a risk indicator, thereby facilitating the subsequent determination of the first security level.
  • the target first risk indicator of the second electronic device can be determined according to the first correspondence.
  • the first corresponding relationship may be as shown in Table 1.
  • the target second risk index corresponding to the second electronic device can be calculated according to a preset calculation method.
  • the preset calculation method may be to weight and normalize the target first risk indicator obtained by the electronic device according to the weight value.
  • the following two example scenarios are used to introduce the calculation method of the target second risk indicator.
  • the environmental information of the second electronic device of user A obtained by the electronic device may be as follows:
  • the number of faces collected in the camera collection device is greater than 1, and includes pre-stored face information
  • the target second risk indicator of the second electronic device calculated by the electronic device according to the preset calculation method is:
  • User B is out, and suddenly receives a call and has urgent matters to discuss. Therefore, the user enters the coffee shop to access the remote meeting, and the discussion involves commercial secrets. User B needs to pay attention to the surrounding situation to prevent leakage of sensitive information.
  • the first electronic device obtains the environment information of the second electronic device used by the user B as follows:
  • the number of faces collected in the camera collection device is greater than 1, and includes pre-stored face information
  • the sound level is greater than the preset number of decibels 40db;
  • the current location information of the electronic device does not match the pre-stored location information (the pre-stored location information is the location of the company).
  • the target second risk indicator of the second electronic device calculated by the electronic device according to the preset calculation method is:
  • the electronic device can determine the first security level of the second electronic device through the second correspondence shown in Table 2 below.
  • Second risk indicator Security Level Target second risk index ⁇ 0.05 no risk 0.05 ⁇ target second risk index ⁇ 0.1 Low risk 0.1 ⁇ target second risk index ⁇ 0.3 Medium risk 0.3 ⁇ target second risk index ⁇ 1 high risk
  • the electronic device calculates that the target second risk indicator of the second electronic device of user B in the second example scenario is 0.201, it can determine that the first security level of the second electronic device of user B is medium risk.
  • the electronic device calculates the target second risk indicator corresponding to the second electronic device through the first correspondence and the preset calculation method, so that the environmental information described by the second electronic device can be converted into the corresponding target second risk indicator.
  • Two risk indicators, and based on the second corresponding relationship, the current first security level of the second electronic device can be determined, so as to facilitate the subsequent notification of the user's current environment of communication risk information, so that the user can adjust the communication environment in time And communication content, thereby improving the security and reliability of information throughout the communication process.
  • the information display method may further include:
  • the first security level is displayed.
  • the first electronic device may not only send the second content obtained after processing through the first processing matching the first security level to the second electronic device.
  • the first security level of the second electronic device can also be displayed, so that all connected electronic devices can learn the security level of communication in their environment or the other party's environment, so that users can adjust the communication environment and content in time. , Thereby improving the reliability of information security throughout the communication process.
  • FIG. 2 is a schematic flowchart of an information display method provided by another embodiment of this application. As shown in Figure 2, the information display method may include:
  • S210 Acquire a first security level of the environment in which the second electronic device is located when the first electronic device is connected to the second electronic device.
  • S210 is the same step as S110 shown in FIG. 1, and will not be repeated here.
  • S220 Determine a target privacy level associated with the first security level based on the first association relationship.
  • the first association relationship is the association relationship between the privacy level and the security level.
  • S230 Based on the second association relationship, determine the content associated with the target privacy level in the first content as the target content.
  • the second association relationship is the association relationship between the information content and the privacy level.
  • S240 Perform first processing on the target content in the first content.
  • the first electronic device may further determine the target privacy security level associated with the first security level after acquiring the first security level of the second electronic device, so that the first content is processed During the first processing, the first processing may only be performed on the target content with the target privacy security level in the first content, so that the user can still view part of the content in the first content normally, thereby improving the user experience.
  • the first electronic device may determine preset sensitive information included in the first content, and each preset sensitive information is associated with a privacy level.
  • the preset sensitive information may include but is not limited to the following content:
  • ID card military card, passport, driver's license, work permit, pass, social security card, residence permit, etc.
  • IP Internet Protocol
  • Bank account number identification information (password), deposit information (including fund amount, payment and collection records, etc.), real estate information, credit records, credit information, transaction and consumption records, flow records, etc.
  • Communication records and communication content short messages, MMS, emails, data describing personal communications (usually called metadata), etc.
  • Hardware serial number MAC address
  • software list software list
  • unique device identification code etc.
  • FIG. 3 is a first schematic diagram of shared information provided by an embodiment of the present invention.
  • the shared information includes preset sensitive information such as "A company”, “Zhang San”, “B address”, “C company”, "300 million capital” and ID card "1010101010".
  • the above preset sensitive information can be divided according to the degree of sensitivity, as shown below:
  • Very sensitive information data that has a potential negative impact on social security or the country, such as filthy pictures, political opinions, religious beliefs, sexual orientation, etc.
  • Highly sensitive information data that has the potential to affect the user's personal safety and property safety, or generally highly private data, etc.
  • Medium sensitive information Contains data (sets) that can be used to identify (directly or indirectly) natural persons' identities (such as ID number, WeChat ID, mobile phone number, etc.), or contain data combinations that can be associated with specific individuals (such as name + work) Unit) data set, etc.
  • Low-sensitive information data (sets) that cannot identify the identity of the data subject or reveal the relationship between relevant data and specific natural persons, or can only reveal the statistical characteristics of the group, etc.
  • Insensitive information basic data for the operation of the service or personal data or data sets that the user agrees to disclose.
  • the first association relationship between the security level and the privacy level may be as shown in Table 3, and the relationship between the information content and the privacy level may be as shown in Table 4.
  • the first processing of the electronic device on the target content in the first content may be to cover the target content through a preset identifier, where the preset identifier may be mosaic, etc. logo.
  • the target content is "Zhang San”, ID card "101010101010"
  • the second content displayed on the second electronic device may be as shown in FIG. 4a, which is a second schematic diagram of shared information provided by an embodiment of this application.
  • the first security level of user B's second electronic device is medium risk, it can be determined according to the above Table 3 and Table 4, and the target content is "Company A", “Zhang San”, “Company C”, and "300 million funds” ", ID card "101010101010".
  • the second content displayed on the second electronic device may be as shown in FIG. 4b, which is a third schematic diagram of shared information provided by an embodiment of the application.
  • the electronic device can determine the first content and the first security level of the second electronic device based on the first security level of the second electronic device.
  • Target content associated with a security level so that the electronic device can realize the first processing of different target content in the first content according to the different security levels of different second electronic devices, which can not only improve the security and reliability of the information Sex can also improve the user experience.
  • the information display method applied to the first electronic device may further include the following steps:
  • prompt information is displayed; the prompt information is used to prompt the third content to perform the second processing.
  • the user can also view the reason why the target sensitive information cannot be viewed by selecting the preset identifier, and can also view the recommended information, so that the user can follow It is recommended that the information adjust the environment in which you are in, and check the shared information in a more private environment to avoid information leakage and improve the security and reliability of information.
  • the second processing is to use the preset identifier to cover the target content as an example, and the steps of displaying the prompt information are described in detail with reference to FIG. 5.
  • the electronic device may also display prompt information as shown in FIG. 5.
  • FIG. 5 is a schematic diagram of prompt information provided by an embodiment of the application.
  • prompt information can be displayed in the form of a pop-up window.
  • the prompt information includes the current first security level of the first electronic device, and may also include a reason for covering the target content (covering reason) with a preset identifier.
  • the prompt information may also include suggestion information.
  • the suggestion information is used to prompt the environmental information that allows viewing of the target content.
  • the user can also view the reason why the target content is covered by selecting the preset identifier, and can also view the suggestion information.
  • the suggestion information adjusts the environment in which you are in, and goes to a more private environment to view the shared third content to avoid the leakage of information, thereby improving the security and reliability of the information.
  • the present application also provides a specific implementation of the information display device. See Figure 6.
  • FIG. 6 is a schematic structural diagram of an information display device provided by an embodiment of this application. As shown in Figure 6, the information display device includes:
  • the obtaining module 610 is configured to obtain the first security level of the environment in which the second electronic device is located when the first electronic device is connected to the second electronic device;
  • the processing module 620 is configured to perform first processing on the first content to obtain the second content
  • the sending module 630 is configured to send the second content to the second electronic device, so that the second electronic device displays the second content;
  • the first processing is a processing method that matches the first security level of the environment in which the second electronic device is located.
  • the content sent by the first electronic device to the second electronic device is obtained by acquiring the first security information where the second electronic device is located, It is no longer simply the sending of the first content, but the first processing that matches the first security information is first performed on the first content, and then the second content obtained after the first processing is sent to the second electronic device Therefore, the safety and reliability of electronic devices in the process of sharing information can be improved, thereby improving the user experience.
  • the information display device may further include:
  • the first determining module is configured to determine the target first risk indicator corresponding to the environment in which the second electronic device is located based on the first corresponding relationship before obtaining the first security level of the environment in which the second electronic device is located; the first corresponding relationship is Correspondence between environmental information and the first risk indicator;
  • the calculation module is used to normalize the target first risk indicator according to a preset calculation method to obtain the target second risk indicator corresponding to the second electronic device;
  • the second determination module is configured to determine the security level corresponding to the target second risk indicator as the first security level based on the second correspondence relationship; the second correspondence relationship is the correspondence relationship between the second risk indicator and the security level.
  • the information display device may further include:
  • the third determining module is used to determine the target privacy associated with the first security level based on the first association relationship after obtaining the first security level of the environment in which the second electronic device is located, and before performing the first processing on the first content grade;
  • the fourth determining module is configured to determine the content associated with the target privacy level in the first content as the target content based on the second association relationship;
  • the first association relationship is the association relationship between the privacy level and the security level
  • the second association relationship is the association relationship between the information content and the privacy level
  • the processing module is specifically configured to perform first processing on the target content in the first content.
  • the information display device may further include:
  • the first receiving module is used to receive the third content sent by the second electronic device; the third content is the content obtained after the second processing, and the second processing is the content that matches the second security level of the environment in which the first electronic device is located Processing method
  • the first display module is used to display the third content
  • the second receiving module is used to receive the user's target input of the third content
  • the second display module is used to display prompt information in response to the target input
  • the prompt information is used to prompt the third content for the reason for the second processing.
  • the information display device further includes:
  • the second display module is used to display the first security level.
  • the various modules of the information display device provided by the embodiments of the present application have the function of realizing the information display methods/steps of the embodiments shown in FIGS. 1 to 5, and can achieve the technical effects corresponding to the embodiments shown in FIGS. 1 to 5 , For succinct description, I won’t repeat it here.
  • An embodiment of the present application also provides an electronic device, including a processor, a memory, and a computer program stored in the memory and capable of running on the processor.
  • the processor executes the computer program, the implementation of FIGS. 1 to 1
  • FIG. 7 is a schematic diagram of the hardware structure of an electronic device that implements each embodiment of the present application.
  • the electronic device 700 includes, but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, a processor 710, and Power 711 and other components.
  • a radio frequency unit 701 includes, but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, a processor 710, and Power 711 and other components.
  • the electronic device may include more or fewer components than those shown in the figure, or a combination of certain components, or different components. Layout.
  • electronic devices include, but are not limited to, mobile phones, tablet computers, notebook computers, palmtop computers, vehicle-mounted terminals, wearable devices, and pedometers.
  • the processor 710 is configured to obtain the first security level of the environment in which the second electronic device is located when the first electronic device is connected to the second electronic device; perform the first processing on the first content to obtain the second content ; Send the second content to the second electronic device so that the second electronic device displays the second content; wherein the first processing is a processing method that matches the first security level of the environment in which the second electronic device is located.
  • the content sent by the first electronic device to the second electronic device is obtained by acquiring the first security information where the second electronic device is located, It is no longer simply the sending of the first content, but the first processing that matches the first security information is first performed on the first content, and then the second content obtained after the first processing is sent to the second electronic device Therefore, the safety and reliability of electronic devices in the process of sharing information can be improved, thereby improving the user experience.
  • the radio frequency unit 701 can be used for receiving and sending signals in the process of sending and receiving information or talking. Specifically, after receiving the downlink data from the base station, it is processed by the processor 710; Uplink data is sent to the base station.
  • the radio frequency unit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the radio frequency unit 701 can also communicate with the network and other devices through a wireless communication system.
  • the electronic device provides users with wireless broadband Internet access through the network module 702, such as helping users to send and receive emails, browse web pages, and access streaming media.
  • the audio output unit 703 can convert the audio data received by the radio frequency unit 701 or the network module 702 or stored in the memory 709 into an audio signal and output it as sound. Moreover, the audio output unit 703 may also provide audio output related to a specific function performed by the electronic device 700 (for example, call signal reception sound, message reception sound, etc.).
  • the audio output unit 703 includes a speaker, a buzzer, a receiver, and the like.
  • the input unit 704 is used to receive audio or video signals.
  • the input unit 704 may include a graphics processing unit (GPU) 7041 and a microphone 7042.
  • the graphics processor 7041 is used for the image of a still picture or video obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed.
  • the processed image frame may be displayed on the display unit 706.
  • the image frame processed by the graphics processor 7041 may be stored in the memory 709 (or other storage medium) or sent via the radio frequency unit 701 or the network module 702.
  • the microphone 7042 can receive sound, and can process such sound into audio data.
  • the processed audio data can be converted into a format that can be sent to the mobile communication base station via the radio frequency unit 701 for output in the case of a telephone call mode.
  • the electronic device 700 further includes at least one sensor 705, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor includes an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 7061 according to the brightness of the ambient light.
  • the proximity sensor can close the display panel 7061 and the display panel 7061 when the electronic device 700 is moved to the ear. / Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three axes), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of electronic devices (such as horizontal and vertical screen switching, related games) , Magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tap), etc.; sensor 705 can also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, Infrared sensors, etc., will not be repeated here.
  • the display unit 706 is used to display information input by the user or information provided to the user.
  • the display unit 706 may include a display panel 7061, and the display panel 7061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • the user input unit 707 may be used to receive inputted numeric or character information, and generate key signal input related to user settings and function control of the electronic device.
  • the user input unit 707 includes a touch panel 7071 and other input devices 7072.
  • the touch panel 7071 also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 7071 or near the touch panel 7071. operate).
  • the touch panel 7071 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the user's touch position, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 710, the command sent by the processor 710 is received and executed.
  • the touch panel 7071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave.
  • the user input unit 707 may also include other input devices 7072.
  • other input devices 7072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
  • the touch panel 7071 can be overlaid on the display panel 7061.
  • the touch panel 7071 detects a touch operation on or near it, it is transmitted to the processor 710 to determine the type of the touch event, and then the processor 710 determines the type of touch event according to the touch.
  • the type of event provides corresponding visual output on the display panel 7061.
  • the touch panel 7071 and the display panel 7061 are used as two independent components to realize the input and output functions of the electronic device, in some embodiments, the touch panel 7071 and the display panel 7061 can be combined. Integrate to realize the input and output functions of electronic devices, and the specifics are not limited here.
  • the interface unit 708 is an interface for connecting an external device and the electronic device 700.
  • the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) port, video I/O port, headphone port, etc.
  • the interface unit 708 can be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more elements in the electronic device 700 or can be used to connect the electronic device 700 to an external device. Transfer data between devices.
  • the memory 709 can be used to store software programs and various data.
  • the memory 709 may mainly include a program storage area and a data storage area.
  • the program storage area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data created by the use of mobile phones (such as audio data, phone book, etc.), etc.
  • the memory 709 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the processor 710 is the control center of the electronic device. It uses various interfaces and lines to connect the various parts of the entire electronic device, runs or executes software programs and/or modules stored in the memory 709, and calls data stored in the memory 709 , Perform various functions of electronic equipment and process data, so as to monitor the electronic equipment as a whole.
  • the processor 710 may include one or more processing units; preferably, the processor 710 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface, and application programs.
  • the processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 710.
  • the electronic device 700 may also include a power source 711 (such as a battery) for supplying power to various components.
  • a power source 711 such as a battery
  • the power source 711 may be logically connected to the processor 710 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system. And other functions.
  • the electronic device 700 includes some functional modules not shown, which will not be repeated here.
  • an embodiment of the present application further provides an electronic device, including a processor 710, a memory 709, and a computer program stored on the memory 709 and running on the processor 710.
  • an electronic device including a processor 710, a memory 709, and a computer program stored on the memory 709 and running on the processor 710.
  • the computer program is executed by the processor 710,
  • Each process of the foregoing embodiment of the information display method is implemented, and the same technical effect can be achieved. To avoid repetition, details are not repeated here.
  • the embodiments of the present application also provide a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the technical effect, in order to avoid repetition, will not be repeated here.
  • the computer-readable storage medium include non-transitory computer-readable storage media, such as read-only memory (Read-Only Memory, ROM for short), Random Access Memory (RAM for short), and magnetic CD or CD, etc.
  • An embodiment of the present application also provides an electronic device configured to perform each process of the foregoing information display method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
  • the embodiments of the present application also provide a computer program product, the program product is stored in a non-volatile storage medium, and the program product is executed by at least one processor to perform each process of the above-mentioned information display method embodiment, and can To achieve the same technical effect, in order to avoid repetition, I will not repeat them here.
  • the technical solution of this application essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes several instructions to make a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present application.
  • a terminal which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.
  • the exemplary embodiments mentioned in the present invention describe some methods or systems based on a series of steps or devices.
  • the present invention is not limited to the order of the above steps, that is, the steps may be performed in the order mentioned in the embodiments, or may be different from the order in the embodiments, or several steps may be performed at the same time.
  • Such a processor can be, but is not limited to, a general-purpose processor, a dedicated processor, a special application processor, or a field programmable logic circuit. It can also be understood that each block in the block diagram and/or flowchart and the combination of the blocks in the block diagram and/or flowchart can also be implemented by dedicated hardware that performs specified functions or actions, or can be implemented by dedicated hardware and A combination of computer instructions.

Abstract

一种信息显示方法、装置、电子设备、存储介质及程序产品。其中,一种信息显示方法,包括:在第一电子设备与第二电子设备连接的情况下,获取第二电子设备所处环境的第一安全等级(S110);将第一内容进行第一处理,得到第二内容,并将第二内容发送至第二电子设备,以使第二电子设备显示第二内容(S120);其中,第一处理为与第二电子设备所处环境的第一安全等级匹配的处理方式。

Description

信息显示方法、装置、电子设备、存储介质及程序产品
相关申请的交叉引用
本申请主张在2020年04月27日在中国提交的中国专利申请号202010344974.7的优先权,其全部内容通过引用包含于此。
技术领域
本申请实施例涉及电子设备技术领域,尤其涉及一种信息显示方法、装置、电子设备、存储介质及程序产品。
背景技术
随着电子设备的不断发展,电子设备之间可以通过通信连接,进行信息共享。
但是,由于互相通信连接的电子设备所处的环境不同,有的电子设备甚至是在较为开放的环境中进行通信,无法保证电子设备在通信过程中的信息内容在不同的环境下都能够得到严格的安全保障,因此,在共享信息的过程中极易导致信息泄露等安全问题。
因此,电子设备在共享信息的过程中,时常会出现信息泄露等安全问题。
发明内容
本申请实施例提供一种信息显示方法、装置、电子设备、存储介质及程序产品,能够解决电子设备在共享信息的过程中,出现的信息泄露等安全问题。
第一方面,本申请实施例提供了一种信息显示方法,应用于第一电子设备,信息显示方法包括:
在第一电子设备与第二电子设备连接的情况下,获取第二电子设备所 处环境的第一安全等级;
将第一内容进行第一处理,得到第二内容,并将第二内容发送至第二电子设备,以使第二电子设备显示第二内容;
其中,第一处理为与第二电子设备所处环境的第一安全等级匹配的处理方式。
第二方面,本申请实施例提供了一种信息显示装置,包括:
获取模块,用于在第一电子设备与第二电子设备连接的情况下,获取第二电子设备所处环境的第一安全等级;
处理模块,用于将第一内容进行第一处理,得到第二内容;
发送模块,用于将第二内容发送至第二电子设备,以使第二电子设备显示第二内容;
其中,第一处理为与第二电子设备所处环境的第一安全等级匹配的处理方式。
第三方面,本申请实施例提供了一种电子设备,包括处理器、存储器及存储在存储器上并可在处理器上运行的计算机程序,处理器执行所述计算机程序时实现如第一方面所述的信息显示方法的步骤。
第四方面,本申请实施例提供了一种计算机可读存储介质,计算机可读存储介质上存储计算机程序,计算机程序被处理器执行时实现如第一方面所述的信息显示方法的步骤。
第五方面,本申请实施例提供了一种电子设备,被配置成用于执行如第一方面所述的信息显示方法的步骤。
第六方面,本申请实施例提供了一种计算机程序产品,所述程序产品被存储在非易失的存储介质中,所述程序产品被至少一个处理器执行以实现如第一方面所述的信息显示方法的步骤。
在本申请实施例中,在第一电子设备与第二电子设备连接的情况下,通过获取第二电子设备所处的第一安全信息,使得第一电子设备发送至第二电子设备的内容,不再简单是第一内容的发送,而是会首先对第一内容进行与第一安全信息相匹配的第一处理,然后再将经过第一处理后得到的第二内容发送至第二电子设备,所以可以提高电子设备在共享信息的过程 中的安全可靠性,进而提高用户的使用体验。
附图说明
图1为本申请一个实施例提供的信息显示方法的流程示意图;
图2为本申请另一个实施例提供的信息显示方法的流程示意图;
图3为本申请一个实施例提供的共享信息的第一示意图;
图4a为本申请一个实施例提供的共享信息的第二示意图;
图4b为本申请一个实施例提供的共享信息的第三示意图;
图5为本申请一个实施例提供的提示信息的示意图;
图6为本申请一个实施例提供的一种信息显示装置的结构示意图;
图7为实现本申请各个实施例的一种电子设备的硬件结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
目前,人与人之间的通信交流不再受到距离的限制,用户通过电子设备即可实现随时随地与其他人进行通信交流。
然而,正是因为用户彼此之间的通信交流不受距离的限制,所以,通信连接的电子设备所处环境也会有很大差异。如果彼此连接的电子设备的所处环境为咖啡店、商场、饭店等较为开放的环境,则电子设备之间的通信的内容就极易被泄漏,从而导致信息泄漏等安全问题。
故,电子设备在共享信息的过程中,时常会出现信息泄露等安全问题。
为了解决上述的问题,本申请实施例提供了一种能够解决电子设备在共享信息的过程中,出现的信息泄露等安全问题的信息显示方法、装置、电子设备及介质。
图1为本申请一个实施例提供的信息显示方法的流程示意图。
在本申请一些实施例中,图1所示的方法可以由电子设备执行,电子设备可以包括但不限于手机、平板电脑、笔记本电脑、掌上电脑、车载终端、可穿戴设备、以及计步器等。
如图1所示,该应用于第一电子设备的信息显示方法包括:
S110,在第一电子设备与第二电子设备连接的情况下,获取第二电子设备所处环境的第一安全等级。
在本申请的一些实施例中,第一安全等级可以为用户当前所处环境的风险等级。如,高风险、中风险、低风险、无风险等。
信息显示方法还包括:S120,将第一内容进行第一处理,得到第二内容,并将第二内容发送至第二电子设备,以使第二电子设备显示第二内容。
其中,第一处理为与第二电子设备所处环境的第一安全等级匹配的处理方式。
在本申请的一些实施例中,第一处理可以为模糊化显示,也可以为利用预设标识进行遮挡等处理方式,还可以是正常显示。
作为一个示例,在第一安全等级为无风险时,第一处理可以为正常显示,在第一安全等级为高风险、中风险、低风险中的任一项时,第一处理可以为模糊化显示或是利用预设标识进行遮挡。在对第一内容进行第一处理后,第一电子设备就可以将处理后得到的第二内容发送至第二电子设备,以在第二电子设备上显示第二内容。
在本申请实施例中,在第一电子设备与第二电子设备连接的情况下,通过获取第二电子设备所处的第一安全信息,使得第一电子设备发送至第二电子设备的内容,不再简单是第一内容的发送,而是会首先对第一内容进行与第一安全信息相匹配的第一处理,然后在将经过第一处理后得到的第二内容发送至第二电子设备,所以可以提高电子设备在共享信息的过程中的安全可靠性,进而提高用户的使用体验。
为了可以使第一电子设备获取到更加精准的第二电子设备所处环境的第一安全等级,本申请的另一些实施例中在S110之前,还可以包括如下步骤:
基于第一对应关系,确定第二电子设备所处环境对应的目标第一风险 指标;其中,第一对应关系为环境信息与第一风险指标之间的对应关系;
按照预设计算方式,将目标第一风险指标进行归一化计算,得到第二电子设备对应的目标第二风险指标;
基于第二对应关系,将目标第二风险指标对应的安全等级确定为第一安全等级;其中,第二对应关系为第二风险指标与安全等级之间的对应关系。
下面开始详细介绍在S110之前包括的上述步骤。
在本申请的一些实施例中,为了可以提高整个通信过程中的信息安全可靠性,可以预先在第一电子设备中存储用户本人的信息。例如,人脸信息、声纹信息,还有用户本人设定的可信任的地点信息(工作地点、家等等)。此外,还可以在第一电子设备增加用户信任的人员的信息。例如,可以是存储一些家人的信息,以便后续第一电子设备在确定用户的目标通信风险信息时,不会由于采集到用户所信任的人员的信息而对第二电子设备的安全等级的评级造成偏差。
接下来,第一电子设备可以获取到第二电子设备所处环境的环境信息,其中,环境信息可以包括以下至少一项:电子设备所处环境内的人脸信息、电子设备周围环境的声音信息以及电子设备的位置信息。其中,声音信息可以包括声纹信息和声音大小。
作为一个示例,若用户当前在咖啡店内通过第二电子设备和第一电子设备进行通信时,则第一电子设备获取到第二电子设备所处环境的环境信息可以包括如下信息:用户的人脸信息、摄像采集装置采集到的咖啡店内的其他客人的人脸信息、周围环境的声音大小、以及周围环境中存在的声纹信息、用户当前的位置信息。
由此可知,第二电子设备所处环境可以至少包括如下几种情况:
1、电子设备所处环境内的人脸信息:
A、摄像采集装置中未采集到人脸信息;
B、摄像采集装置中采集到的人脸数量等于1,但与预先存储的人脸信息不符;
C、摄像采集装置中采集到的人脸数量大于1,且包括预先存储的人脸 信息;
D、摄像采集装置中采集到的人脸数量大于1,且不包括预先存储的人脸信息。
2、电子设备周围环境的声音信息:
A、声音大小大于预设分贝数;
B、声音采集装置在预设时间段内采集得到的声纹信息中存在预先存储的声纹信息;
C、声音采集装置在预设时间段内采集得到的声纹信息中不存在预先存储的声纹信息。
3、电子设备的位置信息:
A、电子设备当前的位置信息与预先存储的位置信息不符;
B、当前电子设备的移动速度大于预设阈值。
如此,通过下述表1所示的环境信息与第一风险指标之间的对应关系,即可将环境信息转化为风险指标,从而便于后续第一安全等级的确定。
接下来,在第一电子设备获取到第二电子设备所处环境的环境信息之后,可以根据第一对应关系,确定第二电子设备的目标第一风险指标。其中,第一对应关系可以如表1所示。
表1
Figure PCTCN2021088664-appb-000001
Figure PCTCN2021088664-appb-000002
其次,在第一电子设备通过上述表1确定第二电子设备对应的目标第一风险指标之后,即可按照预设计算方式计算出第二电子设备对应的目标第二风险指标。
其中,预设计算方式可以是将电子设备得到的目标第一风险指标按照权重值进行加权及归一化计算,下面以两个示例场景,介绍目标第二风险指标的计算方法。
示例场景一:
用户A在家中参见部门组织的视频会议,他背后的妻子正与孩子玩游戏,孩子会经常出现在用户A的视频镜头中,同时妻子与孩子的说话声也会被电子设备所采集。
根据上述场景信息的描述可知,电子设备获取到用户A的第二电子设备的环境信息可能如下所示:
1.摄像采集装置中采集到的人脸数量大于1,且包括预先存储的人脸信息;
2.声音采集装置在预设时间段内采集得到的声纹信息中存在预先存储的声纹信息。
因此,电子设备按照预设计算方式计算得到第二电子设备的目标第二风险指标为:
Figure PCTCN2021088664-appb-000003
其中,S=7×0.1+9×0.15+5×0.15+9×0.1+6×0.1+7×0.1+6×0.1+5×0.1。
示例场景二:
用户B在外出,忽然接到电话有紧急事情需要商讨,因此,用户进入咖啡店中接入远程会议,讨论的事情涉及到商业机密,用户B需要时常留意周围情况,以防敏感信息泄露。
根据上述场景信息的描述可知,第一电子设备获取到用户B使用的第二电子设备的环境信息可能如下所示:
1.摄像采集装置中采集到的人脸数量大于1,且包括预先存储的人脸信息;
2.声音大小大于预设分贝数40db;
3.声音采集装置在预设时间段内采集得到的声纹信息中存在预先存储的声纹信息;
4.电子设备当前的位置信息与预先存储的位置信息(预先存储的位置信息为公司所在位置)不符。
因此,电子设备按照预设计算方式计算得到第二电子设备的目标第二风险指标为:
Figure PCTCN2021088664-appb-000004
其中,S=7×0.1+9×0.15+5×0.15+9×0.1+6×0.1+7×0.1+6×0.1+5×0.1。
接下来,电子设备通过下述表2所示的第二对应关系,即可确定第二电子设备的第一安全等级。
表2
第二风险指标 安全等级
目标第二风险指标<0.05 无风险
0.05≤目标第二风险指标<0.1 低分险
0.1≤目标第二风险指标<0.3 中风险
0.3≤目标第二风险指标≤1 高风险
由表2示出的第二对应关系可知,第一电子设备在计算出上述示例场景一中的用户A的第二电子设备的目标第二风险指标为0.080时,则可确定用户A的第二电子设备的第一安全等级为低风险;
电子设备在计算出上述示例场景二中的用户B的第二电子设备的目标 第二风险指标为0.201时,则可确定用户B的第二电子设备的第一安全等级为中风险。
在本申请实施例中,电子设备通过第一对应关系以及预设计算方式计算得到第二电子设备对应的目标第二风险指标,使得第二电子设备所述的环境信息可以转化为对应的目标第二风险指标,并且在根据第二对应关系,就可以确定出第二电子设备当前的第一安全等级,进而方便后续通知用户当前所处环境对于通信的风险信息,进而使用户可以及时调整通信环境和通信内容,从而提高整个通信过程中的信息安全可靠性。
为了可以使第一电子设备也可以即时显示第二电子设备的安全等级,在本申请的另一些实施例中,在S110之后,信息显示方法还可以包括:
显示第一安全等级。
在本申请实施例中,第一电子设备在确定第二电子设备的第一安全等级之后,不仅可以将经过与第一安全等级匹配的第一处理进行处理后得到的第二内容发送至第二电子设备上,还可以显示第二电子设备的第一安全等级,从而使得互相连接的电子设备都可以获知自己或是对方所处环境对于通信的安全等级,进而便于用户及时调整通信环境和通信内容,从而提高整个通信过程中的信息安全可靠性。
用户在将电子设备互相连接时,有的时候不仅仅是进行语音交流,还会共享一些文件、视频等信息。如此,为了保证电子设备之间共享的信息可以不被泄露,在本申请的一些实施例中,还提供了信息显示方法的另一种实现方式,具体如图2所示。
图2为本申请另一个实施例提供的信息显示方法的流程示意图。如图2所示,该信息显示方法可以包括:
S210,在第一电子设备与第二电子设备连接的情况下,获取第二电子设备所处环境的第一安全等级。
其中,S210为与图1中所示的S110相同的步骤,在此不再赘述。
S220,基于第一关联关系,确定与第一安全等级相关联的目标隐私等级。
其中,第一关联关系为隐私等级和安全等级之间的关联关系。
S230,基于第二关联关系,将第一内容中与目标隐私等级相关联的内容确定为目标内容。
其中,第二关联关系为信息内容与隐私等级之间的关联关系。
S240,对第一内容中的目标内容进行第一处理。
在本申请实施例中,第一电子设备还可以是在获取到第二电子设备的第一安全等级后,进一步确定与第一安全等级相关联的目标隐私安全等级,使得在对第一内容进行第一处理时,可以仅仅是对第一内容中与目标隐私安全等级的目标内容进行第一处理,使得用户可以还是可以正常查看第一内容中的部分内容,进而提高用户的使用体验。
下面通过一些实施例,详细介绍如图2所示的信息显示方法。
首先,第一电子设备可以确定第一内容中包括的预设敏感信息,每个预设敏感信息都与隐私等级相关联。其中,预设敏感信息可以包括但不限于如下内容:
1、个人基本信息:
个人姓名、生日、性别、民族、国籍、家庭关系、住址、电话号码、电子邮箱等等;
2、个人身份信息:
身份证、军官证、护照、驾驶证、工作证、出入证、社保卡、居住证等等;
3、个人生物识别信息:
个人基因、指纹、掌纹、耳廓等等。
4、网络身份标识信息:
系统账号、互联网协议(Internet Protocol,IP)地址、邮箱地址及与前述有关的密码、口令、口令保护答案、用户个人数字证书等等。
5、个人健康生理信息:
个人因生病医疗等产生的相关记录,如病症、住院志、医嘱单、检验报告、手术及麻醉记录、护理记录、用药记录、药物食物过敏信息、生育信息、以往病史、诊治情况、家族病史、现病史、传染病史等等。
6、个人教育工作信息:
个人职业、职位、工作单位、学历、学位、教育经历、工作经历、培训记录、成绩单等等。
7、个人财产信息:
银行账号、鉴别信息(口令)、存款信息(包括资金数量、支付收款记录等)、房产信息、信贷记录、征信信息、交易和消费记录、流水记录等等。
8、个人通信信息:
通信记录和通信内容、短信、彩信、电子邮件、描述个人通信的数据(通常称为元数据)等等。
9、联系人信息:
通讯录、好友列表、群列表、电子邮件地址列表、来电手机号等。
10、个人上网记录:
通过日志存储的用户操作记录,包括网站浏览记录、软件使用记录、点击记录等等。
11、个人常用设备记录:
硬件序列号、媒体存取控制(Media Access Control,MAC)位址、软件列表、唯一设备识别码等等。
12、个人位置信息:
行踪轨迹、精准定位信息、住宿信息、经纬度等等。
13、用户行为信息:
锁屏、安装、升级、卸载应用软件等等。
14、其他信息:
婚史、宗教信仰、性取向、手机视频、相册、通话录音、投放广告、推送新闻、手机应用程序安装列表信息等等。
作为一个示例,如图3所示,图3为本发明一个实施例提供的共享信息的第一示意图。如图3所示,该共享信息为包括有的预设敏感信息如下“A公司”、“张三”、“B地址”、“C公司”、“3亿资金”以及身份证“101010101010”。
接下来,可以将上述预设敏感信息,按照敏感程度进行划分,如下所 示:
非常敏感信息:对社会安全或国家有潜在负面影响的数据,如污秽图片、政治观点、宗教信仰、性取向等。
高敏感信息:对用户人身安全、财产安全有潜在影响或一般而言私密性较高的数据等。
中敏感信息:包含有可用于识别(直接或间接)自然人身份(如身份证号、微信号、手机号等)的数据(集),或包含有可关联特定个人的数据组合(如姓名+工作单位)的数据集等。
低敏感信息:不能识别出数据主体的身份或揭示相关数据与特定自然人的关联关系或仅能揭示群体统计特征的数据(集)等。
不敏感信息:服务运行的基础数据或用户同意公开的个人数据或数据集等。
作为一个示例,安全等级与隐私等级之间的第一关联关系可以如表3所示,信息内容与隐私等级之间的关系可以如表4所示。
表3
Figure PCTCN2021088664-appb-000005
表4
信息内容 隐私等级
非常敏感信息 第五等级
高敏感信息 第四等级
中敏感信息 第三等级
低敏感信息 第二等级
不敏感信息 第一等级
接下来,电子设备通过上述表3和表4确定目标内容后,电子设备对第一内容中目标内容的第一处理可以是通过预设标识将目标内容覆盖,其中,预设标识可以为马赛克等标识。
继续以图3所示的共享信息为例,如用户A的第二电子设备的第一安全等级为低风险,则根据上述表3和表4可确定,目标内容为“张三”、身份证“101010101010”。如此,显示在第二电子设备上的第二内容可以如图4a所示,图4a为本申请一个实施例提供的共享信息的第二示意图。
若用户B的第二电子设备的第一安全等级为中风险,则根据上述表3和表4可确定,目标内容为“A公司”、“张三”、“C公司”、“3亿资金”、身份证“101010101010”。如此,显示在第二电子设备上的第二内容可以如图4b所示,图4b为本申请一个实施例提供的共享信息的第三示意图。
在本申请实施例中,由上述表3和表4示出的第一关联关系和第二关联关系可知,电子设备基于第二电子设备的第一安全等级,就可以确定第一内容中与第一安全等级相关联的目标内容,由此电子设备可以根据不同第二电子设备的安全等级的不同,实现对第一内容中的不同目标内容的第一处理,如此,不仅可以提高信息的安全可靠性还可以提高用户的使用体验。
在本申请的另一些实施例中,应用于第一电子设备的信息显示方法还可以包括如下步骤:
接收第二电子设备发送的第三内容,并显示第三内容;其中,第三内容为进行第二处理后得到的内容,第二处理为与第一电子设备所处环境的第二安全等级匹配的处理方式;
接收用户对第三内容的目标输入;
响应于目标输入,显示提示信息;提示信息用于提示第三内容进行第二处理的原因。
在本申请实施例中,在电子设备显示覆盖后的共享信息后,用户通过选择预设标识,还可以查看目标敏感信息无法查看的原因,并且还可以查看到建议信息,如此,用户就可以按照建议信息调整自己所处的环境,到 更加私密的环境下去查看共享信息,以避免信息的泄露,从而提高信息的安全可靠性。
下面以第二处理为利用预设标识覆盖目标内容为例,并结合图5详细介绍显示提示信息步骤。
电子设备在接收到用户对第三内容的目标输入后,还可以显示如图5所示的提示信息。图5为本申请一个实施例提供的提示信息的示意图。
如图5所示,若用户点击第三内容后,即可以弹窗的形式显示提示信息。
其中,提示信息中包括有第一电子设备当前的第一安全等级,还可以包括有预设标识的覆盖目标内容的原因(覆盖原因)等。在另一些实施例中,提示信息中还可以包括建议信息。其中,建议信息用于提示允许查看目标内容的环境信息。
在本申请实施例中,第一电子设备在显示第三内容之后,用户通过选择预设标识,还可以查看目标内容被覆盖的原因,并且还可以查看到建议信息,如此,用户就可以按照建议信息调整自己所处的环境,到更加私密的环境下去查看共享的第三内容,以避免信息的泄露,从而提高信息的安全可靠性。
基于上述实施例提供的信息显示方法的具体实现方式,相应地,本申请还提供了一种信息显示装置的具体实现方式。请参见图6。
图6为本申请一个实施例提供的一种信息显示装置的结构示意图。如图6所示,该信息显示装置包括:
获取模块610,用于在第一电子设备与第二电子设备连接的情况下,获取第二电子设备所处环境的第一安全等级;
处理模块620,用于将第一内容进行第一处理,得到第二内容;
发送模块630,用于将第二内容发送至第二电子设备,以使第二电子设备显示第二内容;
其中,第一处理为与第二电子设备所处环境的第一安全等级匹配的处理方式。
在本申请实施例中,在第一电子设备与第二电子设备连接的情况下, 通过获取第二电子设备所处的第一安全信息,使得第一电子设备发送至第二电子设备的内容,不再简单是第一内容的发送,而是会首先对第一内容进行与第一安全信息相匹配的第一处理,然后在将经过第一处理后得到的第二内容发送至第二电子设备,所以可以提高电子设备在共享信息的过程中的安全可靠性,进而提高用户的使用体验。
在本申请的一些实施例中,信息显示装置还可以包括:
第一确定模块,用于在获取第二电子设备所处环境的第一安全等级之前,基于第一对应关系,确定第二电子设备所处环境对应的目标第一风险指标;第一对应关系为环境信息与第一风险指标之间的对应关系;
计算模块,用于按照预设计算方式,将目标第一风险指标进行归一化计算,得到第二电子设备对应的目标第二风险指标;
第二确定模块,用于基于第二对应关系,将目标第二风险指标对应的安全等级确定为第一安全等级;第二对应关系为第二风险指标与安全等级之间的对应关系。
在本申请的一些实施例中,信息显示装置还可以包括:
第三确定模块,用于在获取第二电子设备所处环境的第一安全等级之后,将第一内容进行第一处理之前,基于第一关联关系,确定与第一安全等级相关联的目标隐私等级;
第四确定模块,用于基于第二关联关系,将第一内容中与目标隐私等级相关联的内容确定为目标内容;
其中,第一关联关系为隐私等级和安全等级之间的关联关系,第二关联关系为信息内容与隐私等级之间的关联关系;
处理模块,具体用于对第一内容中的目标内容进行第一处理。
在本申请的一些实施例中,信息显示装置还可以包括:
第一接收模块,用于接收第二电子设备发送的第三内容;第三内容为进行第二处理后得到的内容,第二处理为与第一电子设备所处环境的第二安全等级匹配的处理方式;
第一显示模块,用于显示第三内容;
第二接收模块,用于接收用户对第三内容的目标输入;
第二显示模块,用于响应于目标输入,显示提示信息;
提示信息用于提示第三内容进行第二处理的原因。
在本申请的一些实施例中,信息显示装置还包括:
第二显示模块,用于显示第一安全等级。
本申请实施例提供的信息显示装置的各个模块具有实现图1至图5所示实施例的信息显示的方法/步骤的功能,且能达到与图1至图5所示实施例相应的技术效果,为简洁描述,在此不再赘述。
本申请实施例还提供一种电子设备,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现图1至图5所示实施例的信息显示的方法/步骤的功能。下面结合附图说明本公开提供的电子设备。
图7为实现本申请各个实施例的一种电子设备的硬件结构示意图。
该电子设备700包括但不限于:射频单元701、网络模块702、音频输出单元703、输入单元704、传感器705、显示单元706、用户输入单元707、接口单元708、存储器709、处理器710、以及电源711等部件。本领域技术人员可以理解,图7中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。在本申请实施例中,电子设备包括但不限于手机、平板电脑、笔记本电脑、掌上电脑、车载终端、可穿戴设备、以及计步器等。
其中,处理器710,用于在第一电子设备与第二电子设备连接的情况下,获取第二电子设备所处环境的第一安全等级;将第一内容进行第一处理,得到第二内容;将第二内容发送至第二电子设备,以使第二电子设备显示第二内容;其中,第一处理为与第二电子设备所处环境的第一安全等级匹配的处理方式。
在本申请实施例中,在第一电子设备与第二电子设备连接的情况下,通过获取第二电子设备所处的第一安全信息,使得第一电子设备发送至第二电子设备的内容,不再简单是第一内容的发送,而是会首先对第一内容进行与第一安全信息相匹配的第一处理,然后在将经过第一处理后得到的第二内容发送至第二电子设备,所以可以提高电子设备在共享信息的过程 中的安全可靠性,进而提高用户的使用体验。
应理解的是,本申请实施例中,射频单元701可用于收发信息或通话过程中,信号的接收和发送,具体的,将来自基站的下行数据接收后,给处理器710处理;另外,将上行的数据发送给基站。通常,射频单元701包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频单元701还可以通过无线通信系统与网络和其他设备通信。
电子设备通过网络模块702为用户提供了无线的宽带互联网访问,如帮助用户收发电子邮件、浏览网页和访问流式媒体等。
音频输出单元703可以将射频单元701或网络模块702接收的或者在存储器709中存储的音频数据转换成音频信号并且输出为声音。而且,音频输出单元703还可以提供与电子设备700执行的特定功能相关的音频输出(例如,呼叫信号接收声音、消息接收声音等等)。音频输出单元703包括扬声器、蜂鸣器以及受话器等。
输入单元704用于接收音频或视频信号。输入单元704可以包括图形处理器(Graphics Processing Unit,GPU)7041和麦克风7042,图形处理器7041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。处理后的图像帧可以显示在显示单元706上。经图形处理器7041处理后的图像帧可以存储在存储器709(或其它存储介质)中或者经由射频单元701或网络模块702进行发送。麦克风7042可以接收声音,并且能够将这样的声音处理为音频数据。处理后的音频数据可以在电话通话模式的情况下转换为可经由射频单元701发送到移动通信基站的格式输出。
电子设备700还包括至少一种传感器705,比如光传感器、运动传感器以及其他传感器。具体地,光传感器包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板7061的亮度,接近传感器可在电子设备700移动到耳边时,关闭显示面板7061和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别电子 设备姿态(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;传感器705还可以包括指纹传感器、压力传感器、虹膜传感器、分子传感器、陀螺仪、气压计、湿度计、温度计、红外线传感器等,在此不再赘述。
显示单元706用于显示由用户输入的信息或提供给用户的信息。显示单元706可包括显示面板7061,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板7061。
用户输入单元707可用于接收输入的数字或字符信息,以及产生与电子设备的用户设置以及功能控制有关的键信号输入。具体地,用户输入单元707包括触控面板7071以及其他输入设备7072。触控面板7071,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板7071上或在触控面板7071附近的操作)。触控面板7071可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器710,接收处理器710发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板7071。除了触控面板7071,用户输入单元707还可以包括其他输入设备7072。具体地,其他输入设备7072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
进一步的,触控面板7071可覆盖在显示面板7061上,当触控面板7071检测到在其上或附近的触摸操作后,传送给处理器710以确定触摸事件的类型,随后处理器710根据触摸事件的类型在显示面板7061上提供相应的视觉输出。在一些实施例中,虽然触控面板7071与显示面板7061是作为两个独立的部件来实现电子设备的输入和输出功能,但是在某些实施例中,可以将触控面板7071与显示面板7061集成而实现电子设备的输入和输出功能,具体此处不做限定。
接口单元708为外部装置与电子设备700连接的接口。例如,外部装置可以包括有线或无线头戴式耳机端口、外部电源(或电池充电器)端口、有线或无线数据端口、存储卡端口、用于连接具有识别模块的装置的端口、音频输入/输出(I/O)端口、视频I/O端口、耳机端口等等。接口单元708可以用于接收来自外部装置的输入(例如,数据信息、电力等等)并且将接收到的输入传输到电子设备700内的一个或多个元件或者可以用于在电子设备700和外部装置之间传输数据。
存储器709可用于存储软件程序以及各种数据。存储器709可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器709可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
处理器710是电子设备的控制中心,利用各种接口和线路连接整个电子设备的各个部分,通过运行或执行存储在存储器709内的软件程序和/或模块,以及调用存储在存储器709内的数据,执行电子设备的各种功能和处理数据,从而对电子设备进行整体监控。处理器710可包括一个或多个处理单元;优选的,处理器710可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器710中。
电子设备700还可以包括给各个部件供电的电源711(比如电池),优选的,电源711可以通过电源管理系统与处理器710逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
另外,电子设备700包括一些未示出的功能模块,在此不再赘述。
优选的,本申请实施例还提供一种电子设备,包括处理器710,存储器709,存储在存储器709上并可在所述处理器710上运行的计算机程序,该计算机程序被处理器710执行时实现上述信息显示方法实施例的各个过 程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述信息显示的方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质的示例包括非暂态计算机可读存储介质,如只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等。
本申请实施例还提供一种电子设备,被配置成用于执行上述信息显示的方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供一种计算机程序产品,所述程序产品被存储在非易失的存储介质中,所述程序产品被至少一个处理器执行上述信息显示的方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
还需要说明的是,本发明中提及的示例性实施例,基于一系列的步骤或者装置描述一些方法或系统。但是,本发明不局限于上述步骤的顺序, 也就是说,可以按照实施例中提及的顺序执行步骤,也可以不同于实施例中的顺序,或者若干步骤同时执行。
上面参考根据本公开的实施例的方法、装置(系统)和计算机存储介质的流程图和/或框图描述了本公开的各方面。应当理解,流程图和/或框图中的每个方框以及流程图和/或框图中各方框的组合可以由计算机程序指令实现。这些计算机程序指令可被提供给通用计算机、专用计算机、或其它可编程数据处理装置的处理器,以产生一种机器,使得经由计算机或其它可编程数据处理装置的处理器执行的这些指令使能对流程图和/或框图的一个或多个方框中指定的功能/动作的实现。这种处理器可以是但不限于是通用处理器、专用处理器、特殊应用处理器或者现场可编程逻辑电路。还可理解,框图和/或流程图中的每个方框以及框图和/或流程图中的方框的组合,也可以由执行指定的功能或动作的专用硬件来实现,或可由专用硬件和计算机指令的组合来实现。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (13)

  1. 一种信息显示方法,应用于第一电子设备,所述方法包括:
    在所述第一电子设备与第二电子设备连接的情况下,获取所述第二电子设备所处环境的第一安全等级;
    将第一内容进行第一处理,得到第二内容,并将所述第二内容发送至所述第二电子设备,以使所述第二电子设备显示所述第二内容;
    其中,所述第一处理为与所述第二电子设备所处环境的第一安全等级匹配的处理方式。
  2. 根据权利要求1所述的方法,其中,所述获取所述第二电子设备所处环境的第一安全等级之前,还包括:
    基于第一对应关系,确定所述第二电子设备所处环境对应的目标第一风险指标;所述第一对应关系为环境信息与第一风险指标之间的对应关系;
    按照预设计算方式,将所述目标第一风险指标进行归一化计算,得到所述第二电子设备对应的目标第二风险指标;
    基于第二对应关系,将所述目标第二风险指标对应的安全等级确定为所述第一安全等级;所述第二对应关系为第二风险指标与所述安全等级之间的对应关系。
  3. 根据权利要求1所述的方法,其中,所述获取所述第二电子设备所处环境的第一安全等级之后,所述将第一内容进行第一处理之前,还包括:
    基于第一关联关系,确定与所述第一安全等级相关联的目标隐私等级;
    基于第二关联关系,将所述第一内容中与所述目标隐私等级相关联的内容确定为目标内容;
    其中,所述第一关联关系为隐私等级和安全等级之间的关联关系,所述第二关联关系为信息内容与所述隐私等级之间的关联关系;
    所述将第一内容进行第一处理,包括:
    对所述第一内容中的所述目标内容进行所述第一处理。
  4. 根据权利要求1所述的方法,其中,还包括:
    接收所述第二电子设备发送的第三内容,并显示所述第三内容;所述 第三内容为进行第二处理后得到的内容,所述第二处理为与所述第一电子设备所处环境的第二安全等级匹配的处理方式;
    接收用户对所述第三内容的目标输入;
    响应于所述目标输入,显示提示信息;
    所述提示信息用于提示所述第三内容进行所述第二处理的原因。
  5. 根据权利要求1所述的方法,其中,所述获取所述第二电子设备所处环境的第一安全等级之后,还包括:
    显示所述第一安全等级。
  6. 一种信息显示装置,包括:
    获取模块,用于在第一电子设备与第二电子设备连接的情况下,获取所述第二电子设备所处环境的第一安全等级;
    处理模块,用于将第一内容进行第一处理,得到第二内容;
    发送模块,用于将所述第二内容发送至所述第二电子设备,以使所述第二电子设备显示所述第二内容;
    其中,所述第一处理为与所述第二电子设备所处环境的第一安全等级匹配的处理方式。
  7. 根据权利要求6所述的装置,其中,还包括:
    第一确定模块,用于在获取所述第二电子设备所处环境的第一安全等级之前,基于第一对应关系,确定所述第二电子设备所处环境对应的目标第一风险指标;所述第一对应关系为环境信息与第一风险指标之间的对应关系;
    计算模块,用于按照预设计算方式,将所述目标第一风险指标进行归一化计算,得到所述第二电子设备对应的目标第二风险指标;
    第二确定模块,用于基于第二对应关系,将所述目标第二风险指标对应的安全等级确定为所述第一安全等级;所述第二对应关系为第二风险指标与所述安全等级之间的对应关系。
  8. 根据权利要求6所述的装置,其中,还包括:
    第三确定模块,用于在获取所述第二电子设备所处环境的第一安全等级之后,所述将第一内容进行第一处理之前,基于第一关联关系,确定与 所述第一安全等级相关联的目标隐私等级;
    第四确定模块,用于基于第二关联关系,将所述第一内容中与所述目标隐私等级相关联的内容确定为目标内容;
    其中,所述第一关联关系为隐私等级和安全等级之间的关联关系,所述第二关联关系为信息内容与所述隐私等级之间的关联关系;
    所述处理模块,具体用于对所述第一内容中的所述目标内容进行所述第一处理。
  9. 根据权利要求6所述的装置,其中,还包括:
    第一接收模块,用于接收所述第二电子设备发送的第三内容;所述第三内容为进行第二处理后得到的内容,所述第二处理为与所述第一电子设备所处环境的第二安全等级匹配的处理方式;
    第一显示模块,用于显示所述第三内容;
    第二接收模块,用于接收用户对所述第三内容的目标输入;
    第二显示模块,用于响应于所述目标输入,显示提示信息;
    所述提示信息用于提示所述第三内容进行所述第二处理的原因。
  10. 一种电子设备,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如权利要求1至5中任一项所述的信息显示方法的步骤。
  11. 一种计算机可读存储介质,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现如权利要求1至5中任一项所述的信息显示方法的步骤。
  12. 一种电子设备,被配置成用于执行如权利要求1至5中任一项所述的信息显示方法的步骤。
  13. 一种计算机程序产品,所述程序产品被存储在非易失的存储介质中,所述程序产品被至少一个处理器执行以实现如权利要求1至5中任一项所述的信息显示方法的步骤。
PCT/CN2021/088664 2020-04-27 2021-04-21 信息显示方法、装置、电子设备、存储介质及程序产品 WO2021218735A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010344974.7A CN111597533A (zh) 2020-04-27 2020-04-27 信息显示方法、装置及电子设备
CN202010344974.7 2020-04-27

Publications (1)

Publication Number Publication Date
WO2021218735A1 true WO2021218735A1 (zh) 2021-11-04

Family

ID=72185149

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/088664 WO2021218735A1 (zh) 2020-04-27 2021-04-21 信息显示方法、装置、电子设备、存储介质及程序产品

Country Status (2)

Country Link
CN (1) CN111597533A (zh)
WO (1) WO2021218735A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111597533A (zh) * 2020-04-27 2020-08-28 维沃移动通信有限公司 信息显示方法、装置及电子设备
CN114884685B (zh) * 2021-02-05 2023-08-22 华为技术有限公司 电子设备的安全管理方法、电子设备及其可读介质
CN113486380B (zh) * 2021-07-23 2023-04-11 西安万像电子科技有限公司 文本文件的加密方法
CN117499928A (zh) * 2022-07-26 2024-02-02 华为技术有限公司 一种设备安全处理方法及电子设备
CN116401651B (zh) * 2023-06-08 2023-09-19 深圳市晨歌电子有限公司 一种信息存储安全防护方法、系统及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886263A (zh) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 一种对移动终端中的数据进行保护的方法及系统
CN106599716A (zh) * 2016-11-30 2017-04-26 广东欧珀移动通信有限公司 一种消息内容的保护方法、装置及移动终端
CN106778130A (zh) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 一种消息的显示方法、显示装置及移动终端
CN107577956A (zh) * 2017-08-29 2018-01-12 维沃移动通信有限公司 一种照片保密方法及电子设备
CN111597533A (zh) * 2020-04-27 2020-08-28 维沃移动通信有限公司 信息显示方法、装置及电子设备

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101074987B1 (ko) * 2007-11-06 2011-10-18 한국전자통신연구원 상황 인지를 통한 rfid 개인 프라이버시 제어 시스템및 상기 시스템을 이용한 개인 프라이버시 보호 방법
CN104539439B (zh) * 2015-01-12 2019-02-15 中国联合网络通信集团有限公司 数据传输方法及终端
CN105653957A (zh) * 2015-08-25 2016-06-08 宇龙计算机通信科技(深圳)有限公司 一种应用于多用户智能移动终端的消息提醒及显示方法
CN106657214A (zh) * 2016-09-14 2017-05-10 广东欧珀移动通信有限公司 一种数据迁移的方法及终端
CN107341418A (zh) * 2017-07-06 2017-11-10 珠海市魅族科技有限公司 显示控制方法、装置、计算机装置及计算机可读存储介质
CN110798394A (zh) * 2018-08-03 2020-02-14 腾讯科技(深圳)有限公司 一种即时通讯消息显示方法及装置
CN110135262A (zh) * 2019-04-16 2019-08-16 深圳壹账通智能科技有限公司 敏感数据防偷窥处理方法、装置、设备及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886263A (zh) * 2014-03-19 2014-06-25 宇龙计算机通信科技(深圳)有限公司 一种对移动终端中的数据进行保护的方法及系统
CN106599716A (zh) * 2016-11-30 2017-04-26 广东欧珀移动通信有限公司 一种消息内容的保护方法、装置及移动终端
CN106778130A (zh) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 一种消息的显示方法、显示装置及移动终端
CN107577956A (zh) * 2017-08-29 2018-01-12 维沃移动通信有限公司 一种照片保密方法及电子设备
CN111597533A (zh) * 2020-04-27 2020-08-28 维沃移动通信有限公司 信息显示方法、装置及电子设备

Also Published As

Publication number Publication date
CN111597533A (zh) 2020-08-28

Similar Documents

Publication Publication Date Title
WO2021218735A1 (zh) 信息显示方法、装置、电子设备、存储介质及程序产品
WO2021175160A1 (zh) 信息显示方法及电子设备
CN107846352B (zh) 一种信息显示方法、移动终端
WO2020020126A1 (zh) 信息处理方法及终端
WO2021110053A1 (zh) 文件发送方法及终端设备
US10542423B1 (en) Context-based presentation of information
WO2020258968A1 (zh) 信息传输方法、服务器、终端设备及介质
CN109587319B (zh) 一种来电处理方法、终端及计算机可读存储介质
WO2021136138A1 (zh) 信息提示方法及电子设备
WO2021083036A1 (zh) 消息回复方法、服务器和电子设备
WO2019206039A1 (zh) 未读消息处理方法及终端
CN110149628B (zh) 一种信息处理方法及终端设备
CN111064654A (zh) 一种消息显示方法及电子设备
WO2021088755A1 (zh) 权限设置方法及电子设备
WO2021068895A1 (zh) 截屏方法及其终端设备
WO2021017737A1 (zh) 消息发送方法及终端设备
CN109918944B (zh) 一种信息保护方法、装置、移动终端及存储介质
CN111753520A (zh) 一种风险预测方法、装置、电子设备及存储介质
WO2021083086A1 (zh) 信息处理方法及设备
CN109729210B (zh) 一种信息显示方法及终端设备
CN111444314A (zh) 一种信息处理方法及电子设备
CN108848240B (zh) 一种信息安全防护方法、终端及计算机可读存储介质
CN110781488A (zh) 密码提示方法和终端设备
CN110717163B (zh) 一种交互方法及终端设备
CN109348066B (zh) 一种来电意图识别方法、终端及计算机可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21795617

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21795617

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 20/12/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 21795617

Country of ref document: EP

Kind code of ref document: A1