WO2021218735A1 - 信息显示方法、装置、电子设备、存储介质及程序产品 - Google Patents
信息显示方法、装置、电子设备、存储介质及程序产品 Download PDFInfo
- Publication number
- WO2021218735A1 WO2021218735A1 PCT/CN2021/088664 CN2021088664W WO2021218735A1 WO 2021218735 A1 WO2021218735 A1 WO 2021218735A1 CN 2021088664 W CN2021088664 W CN 2021088664W WO 2021218735 A1 WO2021218735 A1 WO 2021218735A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- content
- information
- security level
- processing
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
Definitions
- the embodiments of the present application relate to the technical field of electronic equipment, and in particular to an information display method, device, electronic equipment, storage medium, and program product.
- electronic devices can be connected through communication to share information.
- the embodiments of the present application provide an information display method, device, electronic device, storage medium, and program product, which can solve security problems such as information leakage that occur in the process of sharing information with electronic devices.
- an embodiment of the present application provides an information display method, which is applied to a first electronic device, and the information display method includes:
- the first electronic device In the case where the first electronic device is connected to the second electronic device, obtain the first security level of the environment in which the second electronic device is located;
- the first processing is a processing method that matches the first security level of the environment in which the second electronic device is located.
- an information display device including:
- the obtaining module is used to obtain the first security level of the environment in which the second electronic device is located when the first electronic device is connected to the second electronic device;
- the processing module is configured to perform first processing on the first content to obtain the second content
- a sending module configured to send the second content to the second electronic device, so that the second electronic device displays the second content
- the first processing is a processing method that matches the first security level of the environment in which the second electronic device is located.
- an embodiment of the present application provides an electronic device, including a processor, a memory, and a computer program stored in the memory and capable of running on the processor.
- the processor executes the computer program as described in the first aspect. The steps of the information display method described.
- an embodiment of the present application provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
- the computer program is executed by a processor, the steps of the information display method as described in the first aspect are implemented.
- an embodiment of the present application provides an electronic device configured to execute the steps of the information display method as described in the first aspect.
- the embodiments of the present application provide a computer program product, the program product is stored in a non-volatile storage medium, and the program product is executed by at least one processor to implement the computer program product described in the first aspect.
- the steps of the information display method are described in the sixth aspect.
- the content sent by the first electronic device to the second electronic device is obtained by acquiring the first security information where the second electronic device is located, It is no longer simply sending the first content, but first processing the first content matching the first security information, and then sending the second content obtained after the first processing to the second electronic device Therefore, the safety and reliability of electronic devices in the process of sharing information can be improved, thereby improving the user experience.
- FIG. 1 is a schematic flowchart of an information display method provided by an embodiment of this application.
- FIG. 2 is a schematic flowchart of an information display method provided by another embodiment of this application.
- FIG. 3 is a first schematic diagram of shared information provided by an embodiment of this application.
- Figure 4a is a second schematic diagram of shared information provided by an embodiment of this application.
- Figure 4b is a third schematic diagram of shared information provided by an embodiment of this application.
- FIG. 5 is a schematic diagram of prompt information provided by an embodiment of this application.
- FIG. 6 is a schematic structural diagram of an information display device provided by an embodiment of this application.
- FIG. 7 is a schematic diagram of the hardware structure of an electronic device that implements each embodiment of the present application.
- the environment of the electronic devices connected in communication will also be very different. If the environment of the connected electronic devices is a relatively open environment such as coffee shops, shopping malls, restaurants, etc., the content of the communication between the electronic devices is easily leaked, which leads to security problems such as information leakage.
- the embodiments of the present application provide an information display method, device, electronic device, and medium that can solve security problems such as information leakage in the process of electronic equipment sharing information.
- FIG. 1 is a schematic flowchart of an information display method provided by an embodiment of this application.
- the method shown in FIG. 1 may be executed by an electronic device, which may include, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a vehicle-mounted terminal, a wearable device, and a pedometer, etc. .
- an electronic device which may include, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a vehicle-mounted terminal, a wearable device, and a pedometer, etc.
- the information display method applied to the first electronic device includes:
- S110 Acquire the first security level of the environment in which the second electronic device is located when the first electronic device is connected to the second electronic device.
- the first security level may be the risk level of the environment in which the user is currently located. For example, high risk, medium risk, low risk, no risk, etc.
- the information display method further includes: S120, performing first processing on the first content to obtain the second content, and sending the second content to the second electronic device, so that the second electronic device displays the second content.
- the first processing is a processing method that matches the first security level of the environment in which the second electronic device is located.
- the first processing may be a blurred display, a processing method such as occlusion using a preset mark, or a normal display.
- the first processing can be normal display, and when the first security level is any one of high risk, medium risk, and low risk, the first processing can be obfuscation Display or use the preset logo to block.
- the first electronic device may send the processed second content to the second electronic device, so as to display the second content on the second electronic device.
- the content sent by the first electronic device to the second electronic device is obtained by acquiring the first security information where the second electronic device is located, It is no longer simply the sending of the first content, but the first processing that matches the first security information is first performed on the first content, and then the second content obtained after the first processing is sent to the second electronic device Therefore, the safety and reliability of electronic devices in the process of sharing information can be improved, thereby improving the user experience.
- the target first risk indicator corresponding to the environment in which the second electronic device is located; where the first correspondence is the correspondence between the environmental information and the first risk indicator;
- the security level corresponding to the target second risk indicator is determined as the first security level; wherein the second correspondence is the correspondence between the second risk indicator and the security level.
- the user's personal information may be stored in the first electronic device in advance.
- face information, voiceprint information, and trusted location information (work location, home, etc.) set by the user himself.
- trusted location information (work location, home, etc.) set by the user himself.
- the information of people trusted by the user can also be added to the first electronic device. For example, it may be to store some family information, so that when the first electronic device determines the user’s target communication risk information later, it will not cause the second electronic device’s security level to be rated due to the information collected by the user’s trusted person. deviation.
- the first electronic device may obtain environmental information of the environment in which the second electronic device is located, where the environmental information may include at least one of the following: face information in the environment in which the electronic device is located, and sound information of the surrounding environment of the electronic device And the location information of the electronic device.
- the sound information may include voiceprint information and sound size.
- the environmental information of the environment where the second electronic device is acquired by the first electronic device may include the following information: the user's face Information, the facial information of other guests in the coffee shop collected by the camera collection device, the sound level of the surrounding environment, the voiceprint information existing in the surrounding environment, and the current location information of the user.
- the environment of the second electronic device may include at least the following situations:
- Face information in the environment where the electronic device is located is located:
- the number of faces collected in the camera collection device is equal to 1, but it does not match the pre-stored face information
- the number of faces collected in the camera collection device is greater than 1, and includes pre-stored face information
- the number of faces collected in the camera collection device is greater than 1, and does not include pre-stored face information.
- the sound level is greater than the preset number of decibels
- the current location information of the electronic device does not match the pre-stored location information
- the current moving speed of the electronic device is greater than the preset threshold.
- the environmental information can be converted into a risk indicator, thereby facilitating the subsequent determination of the first security level.
- the target first risk indicator of the second electronic device can be determined according to the first correspondence.
- the first corresponding relationship may be as shown in Table 1.
- the target second risk index corresponding to the second electronic device can be calculated according to a preset calculation method.
- the preset calculation method may be to weight and normalize the target first risk indicator obtained by the electronic device according to the weight value.
- the following two example scenarios are used to introduce the calculation method of the target second risk indicator.
- the environmental information of the second electronic device of user A obtained by the electronic device may be as follows:
- the number of faces collected in the camera collection device is greater than 1, and includes pre-stored face information
- the target second risk indicator of the second electronic device calculated by the electronic device according to the preset calculation method is:
- User B is out, and suddenly receives a call and has urgent matters to discuss. Therefore, the user enters the coffee shop to access the remote meeting, and the discussion involves commercial secrets. User B needs to pay attention to the surrounding situation to prevent leakage of sensitive information.
- the first electronic device obtains the environment information of the second electronic device used by the user B as follows:
- the number of faces collected in the camera collection device is greater than 1, and includes pre-stored face information
- the sound level is greater than the preset number of decibels 40db;
- the current location information of the electronic device does not match the pre-stored location information (the pre-stored location information is the location of the company).
- the target second risk indicator of the second electronic device calculated by the electronic device according to the preset calculation method is:
- the electronic device can determine the first security level of the second electronic device through the second correspondence shown in Table 2 below.
- Second risk indicator Security Level Target second risk index ⁇ 0.05 no risk 0.05 ⁇ target second risk index ⁇ 0.1 Low risk 0.1 ⁇ target second risk index ⁇ 0.3 Medium risk 0.3 ⁇ target second risk index ⁇ 1 high risk
- the electronic device calculates that the target second risk indicator of the second electronic device of user B in the second example scenario is 0.201, it can determine that the first security level of the second electronic device of user B is medium risk.
- the electronic device calculates the target second risk indicator corresponding to the second electronic device through the first correspondence and the preset calculation method, so that the environmental information described by the second electronic device can be converted into the corresponding target second risk indicator.
- Two risk indicators, and based on the second corresponding relationship, the current first security level of the second electronic device can be determined, so as to facilitate the subsequent notification of the user's current environment of communication risk information, so that the user can adjust the communication environment in time And communication content, thereby improving the security and reliability of information throughout the communication process.
- the information display method may further include:
- the first security level is displayed.
- the first electronic device may not only send the second content obtained after processing through the first processing matching the first security level to the second electronic device.
- the first security level of the second electronic device can also be displayed, so that all connected electronic devices can learn the security level of communication in their environment or the other party's environment, so that users can adjust the communication environment and content in time. , Thereby improving the reliability of information security throughout the communication process.
- FIG. 2 is a schematic flowchart of an information display method provided by another embodiment of this application. As shown in Figure 2, the information display method may include:
- S210 Acquire a first security level of the environment in which the second electronic device is located when the first electronic device is connected to the second electronic device.
- S210 is the same step as S110 shown in FIG. 1, and will not be repeated here.
- S220 Determine a target privacy level associated with the first security level based on the first association relationship.
- the first association relationship is the association relationship between the privacy level and the security level.
- S230 Based on the second association relationship, determine the content associated with the target privacy level in the first content as the target content.
- the second association relationship is the association relationship between the information content and the privacy level.
- S240 Perform first processing on the target content in the first content.
- the first electronic device may further determine the target privacy security level associated with the first security level after acquiring the first security level of the second electronic device, so that the first content is processed During the first processing, the first processing may only be performed on the target content with the target privacy security level in the first content, so that the user can still view part of the content in the first content normally, thereby improving the user experience.
- the first electronic device may determine preset sensitive information included in the first content, and each preset sensitive information is associated with a privacy level.
- the preset sensitive information may include but is not limited to the following content:
- ID card military card, passport, driver's license, work permit, pass, social security card, residence permit, etc.
- IP Internet Protocol
- Bank account number identification information (password), deposit information (including fund amount, payment and collection records, etc.), real estate information, credit records, credit information, transaction and consumption records, flow records, etc.
- Communication records and communication content short messages, MMS, emails, data describing personal communications (usually called metadata), etc.
- Hardware serial number MAC address
- software list software list
- unique device identification code etc.
- FIG. 3 is a first schematic diagram of shared information provided by an embodiment of the present invention.
- the shared information includes preset sensitive information such as "A company”, “Zhang San”, “B address”, “C company”, "300 million capital” and ID card "1010101010".
- the above preset sensitive information can be divided according to the degree of sensitivity, as shown below:
- Very sensitive information data that has a potential negative impact on social security or the country, such as filthy pictures, political opinions, religious beliefs, sexual orientation, etc.
- Highly sensitive information data that has the potential to affect the user's personal safety and property safety, or generally highly private data, etc.
- Medium sensitive information Contains data (sets) that can be used to identify (directly or indirectly) natural persons' identities (such as ID number, WeChat ID, mobile phone number, etc.), or contain data combinations that can be associated with specific individuals (such as name + work) Unit) data set, etc.
- Low-sensitive information data (sets) that cannot identify the identity of the data subject or reveal the relationship between relevant data and specific natural persons, or can only reveal the statistical characteristics of the group, etc.
- Insensitive information basic data for the operation of the service or personal data or data sets that the user agrees to disclose.
- the first association relationship between the security level and the privacy level may be as shown in Table 3, and the relationship between the information content and the privacy level may be as shown in Table 4.
- the first processing of the electronic device on the target content in the first content may be to cover the target content through a preset identifier, where the preset identifier may be mosaic, etc. logo.
- the target content is "Zhang San”, ID card "101010101010"
- the second content displayed on the second electronic device may be as shown in FIG. 4a, which is a second schematic diagram of shared information provided by an embodiment of this application.
- the first security level of user B's second electronic device is medium risk, it can be determined according to the above Table 3 and Table 4, and the target content is "Company A", “Zhang San”, “Company C”, and "300 million funds” ", ID card "101010101010".
- the second content displayed on the second electronic device may be as shown in FIG. 4b, which is a third schematic diagram of shared information provided by an embodiment of the application.
- the electronic device can determine the first content and the first security level of the second electronic device based on the first security level of the second electronic device.
- Target content associated with a security level so that the electronic device can realize the first processing of different target content in the first content according to the different security levels of different second electronic devices, which can not only improve the security and reliability of the information Sex can also improve the user experience.
- the information display method applied to the first electronic device may further include the following steps:
- prompt information is displayed; the prompt information is used to prompt the third content to perform the second processing.
- the user can also view the reason why the target sensitive information cannot be viewed by selecting the preset identifier, and can also view the recommended information, so that the user can follow It is recommended that the information adjust the environment in which you are in, and check the shared information in a more private environment to avoid information leakage and improve the security and reliability of information.
- the second processing is to use the preset identifier to cover the target content as an example, and the steps of displaying the prompt information are described in detail with reference to FIG. 5.
- the electronic device may also display prompt information as shown in FIG. 5.
- FIG. 5 is a schematic diagram of prompt information provided by an embodiment of the application.
- prompt information can be displayed in the form of a pop-up window.
- the prompt information includes the current first security level of the first electronic device, and may also include a reason for covering the target content (covering reason) with a preset identifier.
- the prompt information may also include suggestion information.
- the suggestion information is used to prompt the environmental information that allows viewing of the target content.
- the user can also view the reason why the target content is covered by selecting the preset identifier, and can also view the suggestion information.
- the suggestion information adjusts the environment in which you are in, and goes to a more private environment to view the shared third content to avoid the leakage of information, thereby improving the security and reliability of the information.
- the present application also provides a specific implementation of the information display device. See Figure 6.
- FIG. 6 is a schematic structural diagram of an information display device provided by an embodiment of this application. As shown in Figure 6, the information display device includes:
- the obtaining module 610 is configured to obtain the first security level of the environment in which the second electronic device is located when the first electronic device is connected to the second electronic device;
- the processing module 620 is configured to perform first processing on the first content to obtain the second content
- the sending module 630 is configured to send the second content to the second electronic device, so that the second electronic device displays the second content;
- the first processing is a processing method that matches the first security level of the environment in which the second electronic device is located.
- the content sent by the first electronic device to the second electronic device is obtained by acquiring the first security information where the second electronic device is located, It is no longer simply the sending of the first content, but the first processing that matches the first security information is first performed on the first content, and then the second content obtained after the first processing is sent to the second electronic device Therefore, the safety and reliability of electronic devices in the process of sharing information can be improved, thereby improving the user experience.
- the information display device may further include:
- the first determining module is configured to determine the target first risk indicator corresponding to the environment in which the second electronic device is located based on the first corresponding relationship before obtaining the first security level of the environment in which the second electronic device is located; the first corresponding relationship is Correspondence between environmental information and the first risk indicator;
- the calculation module is used to normalize the target first risk indicator according to a preset calculation method to obtain the target second risk indicator corresponding to the second electronic device;
- the second determination module is configured to determine the security level corresponding to the target second risk indicator as the first security level based on the second correspondence relationship; the second correspondence relationship is the correspondence relationship between the second risk indicator and the security level.
- the information display device may further include:
- the third determining module is used to determine the target privacy associated with the first security level based on the first association relationship after obtaining the first security level of the environment in which the second electronic device is located, and before performing the first processing on the first content grade;
- the fourth determining module is configured to determine the content associated with the target privacy level in the first content as the target content based on the second association relationship;
- the first association relationship is the association relationship between the privacy level and the security level
- the second association relationship is the association relationship between the information content and the privacy level
- the processing module is specifically configured to perform first processing on the target content in the first content.
- the information display device may further include:
- the first receiving module is used to receive the third content sent by the second electronic device; the third content is the content obtained after the second processing, and the second processing is the content that matches the second security level of the environment in which the first electronic device is located Processing method
- the first display module is used to display the third content
- the second receiving module is used to receive the user's target input of the third content
- the second display module is used to display prompt information in response to the target input
- the prompt information is used to prompt the third content for the reason for the second processing.
- the information display device further includes:
- the second display module is used to display the first security level.
- the various modules of the information display device provided by the embodiments of the present application have the function of realizing the information display methods/steps of the embodiments shown in FIGS. 1 to 5, and can achieve the technical effects corresponding to the embodiments shown in FIGS. 1 to 5 , For succinct description, I won’t repeat it here.
- An embodiment of the present application also provides an electronic device, including a processor, a memory, and a computer program stored in the memory and capable of running on the processor.
- the processor executes the computer program, the implementation of FIGS. 1 to 1
- FIG. 7 is a schematic diagram of the hardware structure of an electronic device that implements each embodiment of the present application.
- the electronic device 700 includes, but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, a processor 710, and Power 711 and other components.
- a radio frequency unit 701 includes, but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, a processor 710, and Power 711 and other components.
- the electronic device may include more or fewer components than those shown in the figure, or a combination of certain components, or different components. Layout.
- electronic devices include, but are not limited to, mobile phones, tablet computers, notebook computers, palmtop computers, vehicle-mounted terminals, wearable devices, and pedometers.
- the processor 710 is configured to obtain the first security level of the environment in which the second electronic device is located when the first electronic device is connected to the second electronic device; perform the first processing on the first content to obtain the second content ; Send the second content to the second electronic device so that the second electronic device displays the second content; wherein the first processing is a processing method that matches the first security level of the environment in which the second electronic device is located.
- the content sent by the first electronic device to the second electronic device is obtained by acquiring the first security information where the second electronic device is located, It is no longer simply the sending of the first content, but the first processing that matches the first security information is first performed on the first content, and then the second content obtained after the first processing is sent to the second electronic device Therefore, the safety and reliability of electronic devices in the process of sharing information can be improved, thereby improving the user experience.
- the radio frequency unit 701 can be used for receiving and sending signals in the process of sending and receiving information or talking. Specifically, after receiving the downlink data from the base station, it is processed by the processor 710; Uplink data is sent to the base station.
- the radio frequency unit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
- the radio frequency unit 701 can also communicate with the network and other devices through a wireless communication system.
- the electronic device provides users with wireless broadband Internet access through the network module 702, such as helping users to send and receive emails, browse web pages, and access streaming media.
- the audio output unit 703 can convert the audio data received by the radio frequency unit 701 or the network module 702 or stored in the memory 709 into an audio signal and output it as sound. Moreover, the audio output unit 703 may also provide audio output related to a specific function performed by the electronic device 700 (for example, call signal reception sound, message reception sound, etc.).
- the audio output unit 703 includes a speaker, a buzzer, a receiver, and the like.
- the input unit 704 is used to receive audio or video signals.
- the input unit 704 may include a graphics processing unit (GPU) 7041 and a microphone 7042.
- the graphics processor 7041 is used for the image of a still picture or video obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed.
- the processed image frame may be displayed on the display unit 706.
- the image frame processed by the graphics processor 7041 may be stored in the memory 709 (or other storage medium) or sent via the radio frequency unit 701 or the network module 702.
- the microphone 7042 can receive sound, and can process such sound into audio data.
- the processed audio data can be converted into a format that can be sent to the mobile communication base station via the radio frequency unit 701 for output in the case of a telephone call mode.
- the electronic device 700 further includes at least one sensor 705, such as a light sensor, a motion sensor, and other sensors.
- the light sensor includes an ambient light sensor and a proximity sensor.
- the ambient light sensor can adjust the brightness of the display panel 7061 according to the brightness of the ambient light.
- the proximity sensor can close the display panel 7061 and the display panel 7061 when the electronic device 700 is moved to the ear. / Or backlight.
- the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three axes), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of electronic devices (such as horizontal and vertical screen switching, related games) , Magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tap), etc.; sensor 705 can also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, Infrared sensors, etc., will not be repeated here.
- the display unit 706 is used to display information input by the user or information provided to the user.
- the display unit 706 may include a display panel 7061, and the display panel 7061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
- LCD liquid crystal display
- OLED organic light-emitting diode
- the user input unit 707 may be used to receive inputted numeric or character information, and generate key signal input related to user settings and function control of the electronic device.
- the user input unit 707 includes a touch panel 7071 and other input devices 7072.
- the touch panel 7071 also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 7071 or near the touch panel 7071. operate).
- the touch panel 7071 may include two parts: a touch detection device and a touch controller.
- the touch detection device detects the user's touch position, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 710, the command sent by the processor 710 is received and executed.
- the touch panel 7071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave.
- the user input unit 707 may also include other input devices 7072.
- other input devices 7072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
- the touch panel 7071 can be overlaid on the display panel 7061.
- the touch panel 7071 detects a touch operation on or near it, it is transmitted to the processor 710 to determine the type of the touch event, and then the processor 710 determines the type of touch event according to the touch.
- the type of event provides corresponding visual output on the display panel 7061.
- the touch panel 7071 and the display panel 7061 are used as two independent components to realize the input and output functions of the electronic device, in some embodiments, the touch panel 7071 and the display panel 7061 can be combined. Integrate to realize the input and output functions of electronic devices, and the specifics are not limited here.
- the interface unit 708 is an interface for connecting an external device and the electronic device 700.
- the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) port, video I/O port, headphone port, etc.
- the interface unit 708 can be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more elements in the electronic device 700 or can be used to connect the electronic device 700 to an external device. Transfer data between devices.
- the memory 709 can be used to store software programs and various data.
- the memory 709 may mainly include a program storage area and a data storage area.
- the program storage area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data created by the use of mobile phones (such as audio data, phone book, etc.), etc.
- the memory 709 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
- the processor 710 is the control center of the electronic device. It uses various interfaces and lines to connect the various parts of the entire electronic device, runs or executes software programs and/or modules stored in the memory 709, and calls data stored in the memory 709 , Perform various functions of electronic equipment and process data, so as to monitor the electronic equipment as a whole.
- the processor 710 may include one or more processing units; preferably, the processor 710 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface, and application programs.
- the processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 710.
- the electronic device 700 may also include a power source 711 (such as a battery) for supplying power to various components.
- a power source 711 such as a battery
- the power source 711 may be logically connected to the processor 710 through a power management system, so as to manage charging, discharging, and power consumption management through the power management system. And other functions.
- the electronic device 700 includes some functional modules not shown, which will not be repeated here.
- an embodiment of the present application further provides an electronic device, including a processor 710, a memory 709, and a computer program stored on the memory 709 and running on the processor 710.
- an electronic device including a processor 710, a memory 709, and a computer program stored on the memory 709 and running on the processor 710.
- the computer program is executed by the processor 710,
- Each process of the foregoing embodiment of the information display method is implemented, and the same technical effect can be achieved. To avoid repetition, details are not repeated here.
- the embodiments of the present application also provide a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
- a computer program is stored on the computer-readable storage medium.
- the technical effect, in order to avoid repetition, will not be repeated here.
- the computer-readable storage medium include non-transitory computer-readable storage media, such as read-only memory (Read-Only Memory, ROM for short), Random Access Memory (RAM for short), and magnetic CD or CD, etc.
- An embodiment of the present application also provides an electronic device configured to perform each process of the foregoing information display method embodiment, and can achieve the same technical effect. To avoid repetition, it will not be repeated here.
- the embodiments of the present application also provide a computer program product, the program product is stored in a non-volatile storage medium, and the program product is executed by at least one processor to perform each process of the above-mentioned information display method embodiment, and can To achieve the same technical effect, in order to avoid repetition, I will not repeat them here.
- the technical solution of this application essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, The optical disc) includes several instructions to make a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present application.
- a terminal which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.
- the exemplary embodiments mentioned in the present invention describe some methods or systems based on a series of steps or devices.
- the present invention is not limited to the order of the above steps, that is, the steps may be performed in the order mentioned in the embodiments, or may be different from the order in the embodiments, or several steps may be performed at the same time.
- Such a processor can be, but is not limited to, a general-purpose processor, a dedicated processor, a special application processor, or a field programmable logic circuit. It can also be understood that each block in the block diagram and/or flowchart and the combination of the blocks in the block diagram and/or flowchart can also be implemented by dedicated hardware that performs specified functions or actions, or can be implemented by dedicated hardware and A combination of computer instructions.
Abstract
Description
第二风险指标 | 安全等级 |
目标第二风险指标<0.05 | 无风险 |
0.05≤目标第二风险指标<0.1 | 低分险 |
0.1≤目标第二风险指标<0.3 | 中风险 |
0.3≤目标第二风险指标≤1 | 高风险 |
信息内容 | 隐私等级 |
非常敏感信息 | 第五等级 |
高敏感信息 | 第四等级 |
中敏感信息 | 第三等级 |
低敏感信息 | 第二等级 |
不敏感信息 | 第一等级 |
Claims (13)
- 一种信息显示方法,应用于第一电子设备,所述方法包括:在所述第一电子设备与第二电子设备连接的情况下,获取所述第二电子设备所处环境的第一安全等级;将第一内容进行第一处理,得到第二内容,并将所述第二内容发送至所述第二电子设备,以使所述第二电子设备显示所述第二内容;其中,所述第一处理为与所述第二电子设备所处环境的第一安全等级匹配的处理方式。
- 根据权利要求1所述的方法,其中,所述获取所述第二电子设备所处环境的第一安全等级之前,还包括:基于第一对应关系,确定所述第二电子设备所处环境对应的目标第一风险指标;所述第一对应关系为环境信息与第一风险指标之间的对应关系;按照预设计算方式,将所述目标第一风险指标进行归一化计算,得到所述第二电子设备对应的目标第二风险指标;基于第二对应关系,将所述目标第二风险指标对应的安全等级确定为所述第一安全等级;所述第二对应关系为第二风险指标与所述安全等级之间的对应关系。
- 根据权利要求1所述的方法,其中,所述获取所述第二电子设备所处环境的第一安全等级之后,所述将第一内容进行第一处理之前,还包括:基于第一关联关系,确定与所述第一安全等级相关联的目标隐私等级;基于第二关联关系,将所述第一内容中与所述目标隐私等级相关联的内容确定为目标内容;其中,所述第一关联关系为隐私等级和安全等级之间的关联关系,所述第二关联关系为信息内容与所述隐私等级之间的关联关系;所述将第一内容进行第一处理,包括:对所述第一内容中的所述目标内容进行所述第一处理。
- 根据权利要求1所述的方法,其中,还包括:接收所述第二电子设备发送的第三内容,并显示所述第三内容;所述 第三内容为进行第二处理后得到的内容,所述第二处理为与所述第一电子设备所处环境的第二安全等级匹配的处理方式;接收用户对所述第三内容的目标输入;响应于所述目标输入,显示提示信息;所述提示信息用于提示所述第三内容进行所述第二处理的原因。
- 根据权利要求1所述的方法,其中,所述获取所述第二电子设备所处环境的第一安全等级之后,还包括:显示所述第一安全等级。
- 一种信息显示装置,包括:获取模块,用于在第一电子设备与第二电子设备连接的情况下,获取所述第二电子设备所处环境的第一安全等级;处理模块,用于将第一内容进行第一处理,得到第二内容;发送模块,用于将所述第二内容发送至所述第二电子设备,以使所述第二电子设备显示所述第二内容;其中,所述第一处理为与所述第二电子设备所处环境的第一安全等级匹配的处理方式。
- 根据权利要求6所述的装置,其中,还包括:第一确定模块,用于在获取所述第二电子设备所处环境的第一安全等级之前,基于第一对应关系,确定所述第二电子设备所处环境对应的目标第一风险指标;所述第一对应关系为环境信息与第一风险指标之间的对应关系;计算模块,用于按照预设计算方式,将所述目标第一风险指标进行归一化计算,得到所述第二电子设备对应的目标第二风险指标;第二确定模块,用于基于第二对应关系,将所述目标第二风险指标对应的安全等级确定为所述第一安全等级;所述第二对应关系为第二风险指标与所述安全等级之间的对应关系。
- 根据权利要求6所述的装置,其中,还包括:第三确定模块,用于在获取所述第二电子设备所处环境的第一安全等级之后,所述将第一内容进行第一处理之前,基于第一关联关系,确定与 所述第一安全等级相关联的目标隐私等级;第四确定模块,用于基于第二关联关系,将所述第一内容中与所述目标隐私等级相关联的内容确定为目标内容;其中,所述第一关联关系为隐私等级和安全等级之间的关联关系,所述第二关联关系为信息内容与所述隐私等级之间的关联关系;所述处理模块,具体用于对所述第一内容中的所述目标内容进行所述第一处理。
- 根据权利要求6所述的装置,其中,还包括:第一接收模块,用于接收所述第二电子设备发送的第三内容;所述第三内容为进行第二处理后得到的内容,所述第二处理为与所述第一电子设备所处环境的第二安全等级匹配的处理方式;第一显示模块,用于显示所述第三内容;第二接收模块,用于接收用户对所述第三内容的目标输入;第二显示模块,用于响应于所述目标输入,显示提示信息;所述提示信息用于提示所述第三内容进行所述第二处理的原因。
- 一种电子设备,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如权利要求1至5中任一项所述的信息显示方法的步骤。
- 一种计算机可读存储介质,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现如权利要求1至5中任一项所述的信息显示方法的步骤。
- 一种电子设备,被配置成用于执行如权利要求1至5中任一项所述的信息显示方法的步骤。
- 一种计算机程序产品,所述程序产品被存储在非易失的存储介质中,所述程序产品被至少一个处理器执行以实现如权利要求1至5中任一项所述的信息显示方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010344974.7A CN111597533A (zh) | 2020-04-27 | 2020-04-27 | 信息显示方法、装置及电子设备 |
CN202010344974.7 | 2020-04-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021218735A1 true WO2021218735A1 (zh) | 2021-11-04 |
Family
ID=72185149
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/088664 WO2021218735A1 (zh) | 2020-04-27 | 2021-04-21 | 信息显示方法、装置、电子设备、存储介质及程序产品 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111597533A (zh) |
WO (1) | WO2021218735A1 (zh) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111597533A (zh) * | 2020-04-27 | 2020-08-28 | 维沃移动通信有限公司 | 信息显示方法、装置及电子设备 |
CN114884685B (zh) * | 2021-02-05 | 2023-08-22 | 华为技术有限公司 | 电子设备的安全管理方法、电子设备及其可读介质 |
CN113486380B (zh) * | 2021-07-23 | 2023-04-11 | 西安万像电子科技有限公司 | 文本文件的加密方法 |
CN117499928A (zh) * | 2022-07-26 | 2024-02-02 | 华为技术有限公司 | 一种设备安全处理方法及电子设备 |
CN116401651B (zh) * | 2023-06-08 | 2023-09-19 | 深圳市晨歌电子有限公司 | 一种信息存储安全防护方法、系统及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103886263A (zh) * | 2014-03-19 | 2014-06-25 | 宇龙计算机通信科技(深圳)有限公司 | 一种对移动终端中的数据进行保护的方法及系统 |
CN106599716A (zh) * | 2016-11-30 | 2017-04-26 | 广东欧珀移动通信有限公司 | 一种消息内容的保护方法、装置及移动终端 |
CN106778130A (zh) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | 一种消息的显示方法、显示装置及移动终端 |
CN107577956A (zh) * | 2017-08-29 | 2018-01-12 | 维沃移动通信有限公司 | 一种照片保密方法及电子设备 |
CN111597533A (zh) * | 2020-04-27 | 2020-08-28 | 维沃移动通信有限公司 | 信息显示方法、装置及电子设备 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101074987B1 (ko) * | 2007-11-06 | 2011-10-18 | 한국전자통신연구원 | 상황 인지를 통한 rfid 개인 프라이버시 제어 시스템및 상기 시스템을 이용한 개인 프라이버시 보호 방법 |
CN104539439B (zh) * | 2015-01-12 | 2019-02-15 | 中国联合网络通信集团有限公司 | 数据传输方法及终端 |
CN105653957A (zh) * | 2015-08-25 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | 一种应用于多用户智能移动终端的消息提醒及显示方法 |
CN106657214A (zh) * | 2016-09-14 | 2017-05-10 | 广东欧珀移动通信有限公司 | 一种数据迁移的方法及终端 |
CN107341418A (zh) * | 2017-07-06 | 2017-11-10 | 珠海市魅族科技有限公司 | 显示控制方法、装置、计算机装置及计算机可读存储介质 |
CN110798394A (zh) * | 2018-08-03 | 2020-02-14 | 腾讯科技(深圳)有限公司 | 一种即时通讯消息显示方法及装置 |
CN110135262A (zh) * | 2019-04-16 | 2019-08-16 | 深圳壹账通智能科技有限公司 | 敏感数据防偷窥处理方法、装置、设备及存储介质 |
-
2020
- 2020-04-27 CN CN202010344974.7A patent/CN111597533A/zh active Pending
-
2021
- 2021-04-21 WO PCT/CN2021/088664 patent/WO2021218735A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103886263A (zh) * | 2014-03-19 | 2014-06-25 | 宇龙计算机通信科技(深圳)有限公司 | 一种对移动终端中的数据进行保护的方法及系统 |
CN106599716A (zh) * | 2016-11-30 | 2017-04-26 | 广东欧珀移动通信有限公司 | 一种消息内容的保护方法、装置及移动终端 |
CN106778130A (zh) * | 2016-11-30 | 2017-05-31 | 广东欧珀移动通信有限公司 | 一种消息的显示方法、显示装置及移动终端 |
CN107577956A (zh) * | 2017-08-29 | 2018-01-12 | 维沃移动通信有限公司 | 一种照片保密方法及电子设备 |
CN111597533A (zh) * | 2020-04-27 | 2020-08-28 | 维沃移动通信有限公司 | 信息显示方法、装置及电子设备 |
Also Published As
Publication number | Publication date |
---|---|
CN111597533A (zh) | 2020-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021218735A1 (zh) | 信息显示方法、装置、电子设备、存储介质及程序产品 | |
WO2021175160A1 (zh) | 信息显示方法及电子设备 | |
CN107846352B (zh) | 一种信息显示方法、移动终端 | |
WO2020020126A1 (zh) | 信息处理方法及终端 | |
WO2021110053A1 (zh) | 文件发送方法及终端设备 | |
US10542423B1 (en) | Context-based presentation of information | |
WO2020258968A1 (zh) | 信息传输方法、服务器、终端设备及介质 | |
CN109587319B (zh) | 一种来电处理方法、终端及计算机可读存储介质 | |
WO2021136138A1 (zh) | 信息提示方法及电子设备 | |
WO2021083036A1 (zh) | 消息回复方法、服务器和电子设备 | |
WO2019206039A1 (zh) | 未读消息处理方法及终端 | |
CN110149628B (zh) | 一种信息处理方法及终端设备 | |
CN111064654A (zh) | 一种消息显示方法及电子设备 | |
WO2021088755A1 (zh) | 权限设置方法及电子设备 | |
WO2021068895A1 (zh) | 截屏方法及其终端设备 | |
WO2021017737A1 (zh) | 消息发送方法及终端设备 | |
CN109918944B (zh) | 一种信息保护方法、装置、移动终端及存储介质 | |
CN111753520A (zh) | 一种风险预测方法、装置、电子设备及存储介质 | |
WO2021083086A1 (zh) | 信息处理方法及设备 | |
CN109729210B (zh) | 一种信息显示方法及终端设备 | |
CN111444314A (zh) | 一种信息处理方法及电子设备 | |
CN108848240B (zh) | 一种信息安全防护方法、终端及计算机可读存储介质 | |
CN110781488A (zh) | 密码提示方法和终端设备 | |
CN110717163B (zh) | 一种交互方法及终端设备 | |
CN109348066B (zh) | 一种来电意图识别方法、终端及计算机可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21795617 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21795617 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 20/12/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21795617 Country of ref document: EP Kind code of ref document: A1 |