WO2024045740A1 - 页面信息的防护方法、装置及电子设备 - Google Patents

页面信息的防护方法、装置及电子设备 Download PDF

Info

Publication number
WO2024045740A1
WO2024045740A1 PCT/CN2023/098380 CN2023098380W WO2024045740A1 WO 2024045740 A1 WO2024045740 A1 WO 2024045740A1 CN 2023098380 W CN2023098380 W CN 2023098380W WO 2024045740 A1 WO2024045740 A1 WO 2024045740A1
Authority
WO
WIPO (PCT)
Prior art keywords
page
target
protection
view
rendering
Prior art date
Application number
PCT/CN2023/098380
Other languages
English (en)
French (fr)
Inventor
吴欣宇
Original Assignee
京东科技信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东科技信息技术有限公司 filed Critical 京东科技信息技术有限公司
Publication of WO2024045740A1 publication Critical patent/WO2024045740A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Definitions

  • the present application relates to the field of information security technology, and in particular to a method, device and electronic equipment for protecting page information.
  • the present application aims to solve, at least to a certain extent, one of the technical problems in the related art.
  • the embodiments of the present application propose a method, device, and electronic device for protecting page information, so as to solve the technical problem of poor protection effect of page information in related technologies.
  • the first embodiment of the present application proposes a method for protecting page information, including: in response to a target operation instruction, determining the current page to be a preset type page; determining the target protection area of the current page, and creating the target protection A protection sandbox corresponding to the area, the protection sandbox providing a rendering view with the same size as the corresponding target protection area; adding the subview of the target protection area to the rendering view of the corresponding protection sandbox; A preset view of the same size below the rendering view replaces the rendering view and the subview on the rendering view for page rendering to obtain the target page, and executes the target operation instruction corresponding to the target page. operate.
  • the second embodiment of the present application proposes a protection device for page information, including: a determination module for responding to In response to the target operation instruction, it is determined that the current page is a preset type page; a creation module is used to determine the target protection area of the current page, and create a protection sandbox corresponding to the target protection area, and the protection sandbox provides The corresponding rendering views of the target protection area have the same size; the first processing module is used to add the sub-view of the target protection area to the rendering view of the corresponding protection sandbox; the second processing module is used to add the sub-view of the target protection area to the rendering view of the corresponding protection sandbox; A preset view of the same size below the rendering view replaces the rendering view and the subview on the rendering view for page rendering to obtain the target page, and executes the target operation instruction corresponding to the target page. operate.
  • the third embodiment of the present application proposes an electronic device, including: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores information that can be executed by the at least one processor.
  • the instructions are executed by the at least one processor to enable the at least one processor to execute the method for protecting page information as proposed in the embodiment of the first aspect of this application.
  • the fourth embodiment of the present application provides a non-transient computer-readable storage medium storing computer instructions, the computer instructions being used to cause the computer to execute the page information protection method proposed in the first embodiment of the present application. .
  • the fifth embodiment of the present application provides a computer program product, which includes a computer program. When executed by a processor, the computer program implements the page information protection method proposed in the first embodiment of the present application.
  • the current page By responding to the target operation instruction, determine the current page as a preset type page, determine the target protection area of the current page, and create a protection sandbox corresponding to the target protection area.
  • the protection sandbox provides rendering with the same size as the corresponding target protection area.
  • View add the subview of the target protection area to the rendering view of the corresponding protection sandbox, and render the preset view of the same size below the rendering view instead of the rendering view and the subview on the rendering view for page rendering to obtain the target page, and perform operations corresponding to the target operation instructions on the target page, which can protect the private information in the current page when the user performs operations such as screenshots, screen recording, or screen sharing, improving the protection effect of page information and protecting Ensure user information security.
  • Figure 1 is a schematic flow chart of a method for protecting page information provided in Embodiment 1 of the present application;
  • Figure 2 is a schematic flow chart of a method for protecting page information provided in Embodiment 2 of the present application;
  • Figure 3 is an example diagram of the sub-view, rendering view and default view of the current page provided in Embodiment 2 of the present application;
  • Figure 4 is another subview, rendering view and default view of the current page provided in Embodiment 2 of the present application. sample graph;
  • Figure 5 is a schematic flowchart of a method for protecting page information provided in Embodiment 3 of the present application.
  • Figure 6 is a schematic structural diagram of a page information protection device provided in Embodiment 4 of the present application.
  • Figure 7 is a schematic structural diagram of a page information protection device provided in Embodiment 5 of the present application.
  • FIG. 8 illustrates a block diagram of an exemplary electronic device suitable for implementing embodiments of the present application.
  • the method of protecting page information includes: responding to the target operation instruction, determining the current page to be a preset type page; determining the target protection area of the current page, and creating a protection sandbox corresponding to the target protection area.
  • the protection sandbox provides the corresponding Rendering views with the same size of the target protection area; adding the subview of the target protection area to the rendering view of the corresponding protection sandbox; replacing the rendering view and the subviews on the rendering view with the default view of the same size below the rendering view
  • the view renders the page to obtain the target page, and performs operations corresponding to the target operation instructions on the target page.
  • the page information protection method provided by the embodiment of the present application is executed by a page information protection device.
  • the page information protection device will be referred to as a protection device for short.
  • the protection device can be an electronic device, or can be configured in the electronic device.
  • the protection device can be an APP configured in the electronic device, or can be a device configured in the APP, so that the APP has the ability to control the current page.
  • the function of effectively protecting the information in the target protection area is not limited by this application.
  • the protection device can run in the iOS operating system or other operating systems that support the page information protection function provided by the embodiments of the present application, and the embodiments of the present application do not limit this.
  • the electronic device can be a personal computer (Personal Computer, PC for short), cloud device, mobile device, server, etc.
  • the mobile device can be, for example, a mobile phone, a tablet computer, a personal digital assistant, a wearable device, Any hardware equipment such as vehicle-mounted equipment, this application does not limit this.
  • Figure 1 is a schematic flowchart of a method for protecting page information provided in Embodiment 1 of the present application. As shown in Figure 1, the method for protecting the page information may include the following steps 101-104.
  • Step 101 In response to the target operation instruction, determine that the current page is a preset type page.
  • the current page is the page to be displayed or the page being displayed during the running of the application.
  • the current page can be displayed before the target operation instruction is received, or can be displayed after the target operation instruction is received.
  • the application program is any application program that has the function of protecting page information.
  • the embodiment of the present application does not limit the type of the application program.
  • the protection device in the embodiment of the present application may be configured in the application program, or configured in the application program, or may be configured independently of the application program, which is not limited by the present application.
  • the embodiment of this application takes the protection device as an application program as an example. By integrating a specific software development kit (Software Development Kit, SDK for short) in any application program, the application program can have the features implemented by this application.
  • the page information protection function provided by the example.
  • the default type of page can be set in advance as needed, such as a page containing private information such as user personal information, capital account information, or a page containing other specified information. This application embodiment does not limit this.
  • the target operation instruction may be at least one of a screen sharing instruction, a screenshot instruction, a screen recording instruction, and other instructions.
  • a screen sharing instruction a screenshot instruction
  • a screen recording instruction a screen recording instruction
  • other instructions Taking the screen recording instruction as an example, when the user clicks the screen recording button with the screen recording function in the electronic device, the screen recording instruction can be triggered, and accordingly, the application can receive the screen recording instruction.
  • the application can determine the current page. It is a default type page. Or, assume that the user turns on the screen recording or screen sharing function before starting the application, thereby triggering the screen recording or screen sharing instruction. Then the user starts the application, and the user's personal information is to be displayed or is being displayed while the application is running. When the current page of information is displayed, the application can respond to the screen recording or screen sharing instruction and determine that the current page is a preset type page.
  • Step 102 Determine the target protection area of the current page, and create a protection sandbox corresponding to the target protection area.
  • the protection sandbox provides a rendering view with the same size as the corresponding target protection area.
  • the target protection area is the area that needs to be protected on the current page. It can be the entire page area of the current page, or it can be one or more partial page areas of the current page. It can be set in advance as needed. This application does not limit this. Among them, the local page area is a partial area of the current page.
  • Sandbox in the field of computer security, is a security mechanism that provides an isolation environment for running programs.
  • the protection sandbox in the embodiment of this application is a protection tool encapsulated by encoding code technology. It can be run in an application to protect the content added to the protection sandbox.
  • each protection sandbox can provide a rendering view, and the rendering view is consistent with the corresponding target protection area.
  • Dimensions are the same.
  • the rendering view is a view with specified attributes.
  • Step 103 Add the subview of the target protection area to the rendering view of the corresponding protection sandbox.
  • all subviews of the target protection area are subviews of the rendering view.
  • Step 104 Use a preset view of the same size below the rendering view to replace the rendering view and the subviews on the rendering view for page rendering to obtain the target page, and perform operations corresponding to the target operation instructions on the target page.
  • the preset view is a preset view located below the rendering view and having the same size as the rendering view.
  • the default view can be a view with a single color or a view containing any picture, which is not limited by this application.
  • the preset view can be used to replace the rendering view and the subview on the rendering view for page rendering, that is, during page rendering When rendering, the rendering view and the subviews on the rendering view are filtered in the protection sandbox.
  • the content in the rendering view and the subviews on the rendering view is not rendered. Instead, the content in the preset view is rendered to obtain the target page.
  • the operation corresponding to the target operation instruction can be performed on the target page.
  • the target operation instruction is a screenshot instruction
  • the image of the target page can be intercepted and saved as the page image obtained by executing the screen capture operation
  • the target operation instruction is a screen recording instruction
  • the image of the target page can be recorded.
  • the target operation instruction is a screen sharing instruction
  • the image of the target page can be shared to screen sharing in real time displayed on the peer device.
  • the user can perform screenshot operations and screen recording operations on the current page in the application, and the saved image of the target page, or the user can perform a screen sharing operation on the current page in the application, and the images shared to the screen share
  • the information content of the target protection area of the current page is replaced with the content in the default view.
  • the target protection area is the entire page area of the current page
  • the saved or shared target page The image is a single-color image or a preset image, thereby realizing the protection of user privacy information and other information content in the target protection area of the current page, and protecting the user's information security.
  • the current page in the application used by the user can be displayed normally, thereby ensuring the user experience of the user using the application.
  • the protection method for page information provided in the embodiment of the present application has a better protection effect.
  • the page information protection method determines the current page as a preset type page in response to the target operation instruction; determines the target protection area of the current page, and creates a protection sandbox corresponding to the target protection area to protect
  • the sandbox provides a rendering view with the same size as the corresponding target protection area; adds the subview of the target protection area to the rendering view of the corresponding protection sandbox; renders the preset with the same size underneath the view View, instead of the rendering view and the subviews on the rendering view, perform page rendering to obtain the target page, and perform operations corresponding to the target operation instructions on the target page.
  • the user performs operations such as screenshots, screen recording, or screen sharing, the private information in the current page can be protected, thereby improving the protection effect of the page information and protecting the user's information security.
  • FIG. 2 is a schematic flowchart of a method for protecting page information provided in Embodiment 2 of the present application. As shown in Figure 2, the method for protecting page information may include the following steps 201-204.
  • Step 201 In response to the target operation instruction, determine that the current page is a preset type page.
  • step 201 For the specific implementation process and principle of step 201, reference can be made to the description of the above embodiments and will not be described again here.
  • whether the current page is a preset type page can be determined through the following multiple methods.
  • the identifier of the current page is used to uniquely identify the current page. It can be the name of the current page, or the Universal Resource Locator (URL) of the current page, or other identifiers.
  • the embodiment of this application does not do this. limit.
  • a list that is, a preset list
  • the preset list includes the identification of each preset type page.
  • each of the preset lists in the preset list is The identifier of the default type page is called the default identifier.
  • the preset identifier is used to uniquely identify the corresponding preset type page. It may be the name of the preset type page, or the URL of the preset type page, or other identifiers. This embodiment of the present application does not limit this. Therefore, it can be determined whether the current page is a preset type page based on whether the identifier of the current page matches any preset identifier in the preset list.
  • the preset control can be set as needed, for example, it can be a functional control such as text input, or other controls, which is not limited by this application.
  • all subviews of the current page can be traversed in sequence according to the page level of the current page, and when any subview among all subviews of the current page contains a preset control, the current page is determined to be a preset control.
  • Set type page
  • method 1 and method 2 can also be combined, that is, the identifier of the current page matches any preset identifier in the preset list, and any subview of all subviews of the current page contains When presetting controls, determine that the current page is a preset type page.
  • Step 202 Determine the target protection area of the current page, where the target protection area includes at least one partial page area of the current page, and create a protection sandbox corresponding to each local page area.
  • the protection sandbox provides information about the corresponding local page area. Rendered views with the same dimensions.
  • protection sandboxes corresponding to each local page area can be created when the view controller of the current page is initialized, or you can After the view controller of the current page is initialized, a protective sandbox corresponding to each local page area is created.
  • the embodiment of the present application does not limit the timing of creating the protective sandbox corresponding to each local page area. It only needs to be performed during page rendering. Just create it before getting the target page.
  • the rendering view of the protection sandbox can be obtained in the following manner: when creating a protection sandbox corresponding to the target protection area, a preset user interface component is generated, and the preset user interface component includes a preset An array of subviews composed of multiple subviews of a user interface component; traverse multiple subviews in the subview array to obtain the target subview with specified properties from multiple subviews in the subview array; use the target subview as the target Rendered view of the protection sandbox corresponding to the protection area.
  • the preset user interface component may be a text input box user interface (UI) component, or other user interface components including a subview array, and this embodiment of the present application does not limit this.
  • the preset user interface component includes multiple subviews, and the multiple subviews constitute a subview array.
  • the specified attributes can be set as needed.
  • the subview may belong to a specified class, or the subview may have other specified attributes. This is not limited in the embodiment of the present application.
  • UITextFieldCanvasView UI text field canvas view
  • UITextLayoutCanvasView UI text layout canvas view
  • multiple subviews in the subview array can be traversed to Get the canvas view canvasView from the top of the stack of the subview array.
  • the canvas view belongs to the UITextFieldCanvasView class or the UITextLayoutCanvasView class
  • the canvas view can be used as the rendering view of the protection sandbox corresponding to the target protection area.
  • Step 203 Add at least one subview of the local page area to the rendering view corresponding to the protection sandbox.
  • the target protection area of the current page includes at least one partial page area of the current page
  • a subview of the partial page area can be added to the corresponding protection area.
  • On the rendering view of the sandbox use the rendering view of the corresponding protection sandbox as the local page The region's parent view.
  • Step 204 Render the content in the preset view of the same size below the rendering view and the content in the subviews in other areas of the current page except the local page area to obtain the target page, and execute the operation on the target page.
  • the current page also includes other areas in addition to the at least one partial page area.
  • the rendering view and the subviews on the rendering view can be filtered in the corresponding protection sandbox, and the rendering view and the subviews on the rendering view cannot be filtered.
  • the original content of the corresponding area in the current page can be rendered to obtain the target page. Then, the operation corresponding to the target operation instruction can be performed on the target page.
  • the target protection area of the current page includes the local page area of the current page
  • the user performs screenshot operations and screen recording operations on the current page in the application.
  • the saved image of the target page or the user performs screen recording operations on the application.
  • the information content of the local page area of the current page is replaced with the content in the default view, such as replaced with a single color or The content of a preset image, while the original content in other areas of the current page is retained in the target page, thereby achieving protection of user privacy information and other information content in the target protection area of the current page.
  • Retain the original content of other areas of the current page to ensure the user experience of users viewing the target page.
  • the current page in the application used by the user can be displayed normally, thereby ensuring the user experience of the user using the application.
  • the target protection area of the current page includes a local page area of the current page
  • a protection sandbox corresponding to the local page area can be created, and the protection sandbox provides the same size as the local page area.
  • the rendering view 301 , and the subview of the partial page area ie, the subview in the dotted box 302
  • the content in the preset view 303 below the rendering view 301 and the content in the subviews of other areas in the current page except the local page area can be rendered to obtain the target page.
  • the default view 303 is a view with the same size and black color as the rendering view 301.
  • the information content of the target protection area of the current page is replaced with the content in the default view, and other parts of the current page The original content in the zone is preserved.
  • the target protection area may include the entire page area corresponding to the current page.
  • step 202 can be replaced by: determining the target protection area of the current page, where the target protection area includes the entire page area of the current page, and creating a protection sandbox corresponding to the entire page area.
  • the protection sandbox provides the corresponding entire page. The dimensions of the area are the same as the rendered view.
  • the target protection area includes the entire page area of the current page
  • step 203 when the target protection area includes the entire page area corresponding to the current page, step 203 can be replaced by: adding all subviews of the current page to the rendering view of the protection sandbox.
  • step 204 can be replaced by: rendering the content in a preset view of the same size below the rendering view to obtain the target page.
  • all subviews of the current page are added to the rendering view of the protective sandbox, and the rendering view can be used as the root view of the current page. Since the size of the rendering view and the size of the preset view are different from the entire If the pages have the same size, the content in the preset view of the same size below the rendering view will be rendered. In the resulting target page, all the information content of the current page will be replaced with the content in the preset view, thus making When the target protection area of the current page includes the entire page area of the current page, the user performs screenshot operations and screen recording operations on the current page in the application, in the saved image of the target page, or the user performs screenshot operations on the current page in the application.
  • the information content of the entire page area of the current page is replaced with the content in the preset view, such as a single color or a preset one. content of the image, thus achieving protection of the information content of the entire page area of the current page.
  • the current page in the application used by the user can be displayed normally, thereby ensuring the user experience of the user using the application.
  • the target protection area of the current page includes the entire page area of the current page
  • a protection sandbox corresponding to the entire page area can be created, and the protection sandbox provides the same size as the entire page area.
  • Render view 401, and all subviews of the current page ie, the subviews in the dotted box 402 can be added to the rendered view 401 to use the rendered view 401 as the root view 401 of the current page.
  • the content in the preset view 403 below the rendering view 401 can be rendered to obtain the target page.
  • the default view 403 is a view that has the same size as the rendering view 401 and is black in color. In the target page, all the information content of the current page is replaced with the content in the default view.
  • a risk reminder in response to the target operation instruction, after determining that the current page is a preset type page, a risk reminder can also be provided to the user.
  • a risk reminder in response to the target operation instruction, after determining that the current page is a preset type page, a risk reminder can also be provided to the user.
  • FIG. 5 is a schematic flowchart of a method for protecting page information provided in Embodiment 3 of the present application. As shown in Figure 5, the method for protecting page information may include the following steps 501-506.
  • Step 501 In response to the target operation instruction, determine that the current page is a preset type page.
  • the current page is the page to be displayed or the page being displayed during the running of the application.
  • the current page can be displayed before the target operation instruction is received, or can be displayed after the target operation instruction is received.
  • the application program is any application program that has the function of protecting page information.
  • the embodiment of the present application does not limit the type of the application program.
  • the protection device in the embodiment of the present application may be configured for the application program, or configured in the application program, or may be configured independently of the application program. Please do not limit this.
  • the embodiments of this application are described by taking the protection device as an application program as an example. By integrating a software development kit (Software Development Kit, SDK for short) in any application program, the application program has the features provided by the embodiments of this application. Page information protection function.
  • step 501 For the specific implementation process and principle of step 501, reference may be made to the relevant descriptions of the above embodiments, which will not be described again here.
  • Step 502 Control the current page to register with the protection management module configured in the application, so that the protection management module responds to the target operation instruction and returns specified prompt information to the current page.
  • a protection management module can be configured in the application program where the current page is located, where the protection management module has functions such as generating specified prompt information.
  • the protection management module can be initialized using lazy loading.
  • the specified prompt information can be set as needed, including text information such as "The current page has the risk of information leakage, please be careful.”
  • the application program after the application program responds to the target operation instruction and determines that the current page is a preset type page, it can control the current page to register with the protection management module. Then, in response to the target operation instruction, the protection management module can return specified prompt information to the current page.
  • Step 503 Display the specified prompt information on the current page in a preset manner.
  • the preset method is a preset method for displaying designated prompt information, which can be set arbitrarily according to needs, and the embodiments of the present application do not limit this.
  • the current page can be rendered and displayed normally on an electronic device that runs an application program and performs target operations on the current page.
  • the current page can be rendered and displayed normally on electronic device A.
  • the application program can run normally on the electronic device A and the page can be displayed normally, ensuring user experience.
  • specified prompt information can be displayed on the current page in a preset manner when the current page is displayed.
  • the designated prompt information can be in the form of text, highlighted at the top of the current page, and played in a loop to continuously remind users of risks, improve the protective effect of page information, and protect users. information security.
  • the specified prompt information can be in the form of a pop-up window, displayed in full screen on the current page, and can be closed after the user confirms.
  • Step 504 Determine the target protection area of the current page, and create a protection sandbox corresponding to the target protection area.
  • the protection sandbox provides a rendering view with the same size as the corresponding target protection area.
  • step 504 can be executed before step 503 or after step 503. This application does not limit this. It only needs to be done after determining that the current page is a preset type page in response to the target operation instruction, or after responding to the target operation instruction.
  • the operation command can be executed at the same time after confirming that the current page is a preset type page.
  • Step 505 Add the subview of the target protection area to the rendering view of the corresponding protection sandbox.
  • Step 506 Use a preset view of the same size below the rendering view to replace the rendering view and the subviews on the rendering view for page rendering to obtain the target page, and perform operations corresponding to the target operation instructions on the target page.
  • the page information protection method responds to the target operation instruction, determines the current page to be a preset type page, and controls the current page to register with the protection management module configured in the application, so that the protection management
  • the module returns the specified prompt information to the current page, displays the specified prompt information in a preset manner on the current page, determines the target protection area of the current page, and creates a protection sandbox corresponding to the target protection area.
  • the protection sandbox Provide a rendering view with the same size as the corresponding target protection area, and add the subview of the target protection area to the rendering view of the corresponding protection sandbox to render a preset view of the same size underneath the view, replacing the rendering view and rendering
  • the subview on the view performs page rendering to obtain the target page, and performs operations corresponding to the target operation instructions on the target page.
  • FIG. 6 is a schematic structural diagram of a device for protecting page information provided in Embodiment 4 of the present application.
  • the page information protection device 600 may include: a determination module 610 , a creation module 620 , a first processing module 630 and a second processing module 640 .
  • the determination module 610 is used to determine that the current page is a preset type page in response to the target operation instruction;
  • the creation module 620 is used to determine the target protection area of the current page and create a protection sandbox corresponding to the target protection area.
  • the protection sandbox provides a rendering view with the same size as the corresponding target protection area;
  • the first processing module 630 is used to add the sub-view of the target protection area to the rendering view of the corresponding protection sandbox;
  • the second processing module 640 is used to perform page rendering with a preset view of the same size below the rendering view instead of the rendering view and the subviews on the rendering view to obtain the target page, and perform operations corresponding to the target operation instructions on the target page. .
  • the page information protection device 600 provided by the embodiment of the present application can perform the page information protection method of the previous embodiment.
  • the page information protection device 600 can be an electronic device, or can be configured in an electronic device.
  • the protection device can be an APP configured in the electronic device, or it can be a device configured in the APP, so that the APP has the function of effectively protecting the information in the target protection area of the current page. Yes, this application does not limit this.
  • the electronic device can be a PC, a cloud device, a mobile device, a server, etc.
  • the mobile device can be, for example, any hardware device such as a mobile phone, a tablet computer, a personal digital assistant, a wearable device, a vehicle-mounted device, etc. This application is not limited to this.
  • the page information protection device in the embodiment of the present application determines the current page as a preset type page in response to the target operation instruction; determines the target protection area of the current page, and creates a protection sandbox corresponding to the target protection area.
  • the protection sandbox provides The corresponding rendering view of the target protection area has the same size; add the subview of the target protection area to the rendering view of the corresponding protection sandbox; replace the rendering view and the rendering view with the default view of the same size below the rendering view
  • the subview performs page rendering to obtain the target page, and performs operations corresponding to the target operation instructions on the target page.
  • FIG. 7 is a schematic structural diagram of a device for protecting page information provided in Embodiment 5 of the present application.
  • the page information protection device 700 may include: specifically, it may include: a determination module 710 , a creation module 720 , a first processing module 730 and a second processing module 740 .
  • the determination module 710, the creation module 720, the first processing module 730 and the second processing module 740 in Figure 7 have the same functions as the determination module 610, the creation module 620, the first processing module 630 and the second processing module 640 in Figure 6 and structure.
  • the target protection area includes at least one partial page area of the current page; the protection sandbox corresponding to the target protection area includes a protection sandbox corresponding to each partial page area;
  • the first processing module 730 includes:
  • the first processing unit is used to add at least one subview of the local page area to the rendering view corresponding to the protection sandbox.
  • the second processing module 740 includes:
  • the first rendering unit is used to render the content in the preset view of the same size below the rendering view and the content in the subviews of other areas in the current page except the local page area to obtain the target page.
  • the target protection area includes the entire page area corresponding to the current page; the first processing module 730 includes:
  • the second processing unit is used to add all subviews of the current page to the rendering view of the protective sandbox.
  • the second processing module 740 includes:
  • the second rendering unit is used to render the content in the preset view of the same size below the rendering view to obtain the target page.
  • the page information protection device 700 also includes:
  • the generation module 750 is configured to generate a preset user interface component when creating a protection sandbox corresponding to the target protection area.
  • the preset user interface component includes a subview array composed of multiple subviews of the preset user interface component;
  • the acquisition module 760 is used to traverse multiple subviews in the subview array to obtain the target subview with specified attributes from the multiple subviews in the subview array, and use the target subview as the protective sand corresponding to the target protection area. Rendered view of the box.
  • the page information protection device 700 also includes:
  • the display module 770 is used to display specified prompt information in a preset manner on the current page.
  • the page information protection device 700 also includes:
  • the control module is used to control the current page to register with the protection management module configured in the application, so that the protection management module responds to the target operation instruction and returns specified prompt information to the current page.
  • the determination module 710 includes:
  • the first determination unit is used to obtain the identifier of the current page and match the identifier of the current page with each preset identifier in the preset list.
  • the identifier of the current page matches any preset identifier in the preset list, Confirm that the current page is a default type page;
  • the second determination unit is used to traverse all subviews of the current page, and determine that the current page is a preset type page when any subview among all subviews of the current page contains a preset control.
  • the page information protection device in the embodiment of the present application determines the current page as a preset type page in response to the target operation instruction; determines the target protection area of the current page, and creates a protection sandbox corresponding to the target protection area.
  • the protection sandbox provides The corresponding rendering view of the target protection area has the same size; add the subview of the target protection area to the rendering view of the corresponding protection sandbox; replace the rendering view and the rendering view with the default view of the same size below the rendering view
  • the subview performs page rendering to obtain the target page, and performs operations corresponding to the target operation instructions on the target page.
  • this application also proposes an electronic device, including: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores information that can be used by the at least one processor.
  • Execution instructions the instructions are executed by the at least one processor, so that the at least one processor can execute the page information protection method proposed in any of the previous embodiments of this application.
  • this application also proposes a non-transitory computer-readable storage medium storing computer instructions.
  • the computer instructions are used to cause the computer to perform the protection of page information as proposed in any of the previous embodiments of this application. method.
  • this application also proposes a computer program product, which includes a computer program.
  • the computer program When executed by a processor, the computer program implements the method for protecting page information as proposed in any of the previous embodiments of this application. Law.
  • FIG. 8 shows a schematic block diagram of an example electronic device 800 that may be used to implement embodiments of the present disclosure.
  • Electronic devices are intended to refer to various forms of digital computers, such as laptop computers, desktop computers, workstations, personal digital assistants, servers, blade servers, mainframe computers, and other suitable computers.
  • Electronic devices may also represent various forms of mobile devices, such as personal digital assistants, cellular phones, smart phones, wearable devices, and other similar computing devices.
  • the components shown herein, their connections and relationships, and their functions are examples only and are not intended to limit implementations of the disclosure described and/or claimed herein.
  • the electronic device 800 may include a computing unit 801 that may be configured according to a computer program stored in a read-only memory (ROM) 802 or loaded from a storage unit 808 into a random access memory (RAM) 803 , to perform various appropriate actions and processing.
  • ROM read-only memory
  • RAM random access memory
  • various programs and data required for the operation of the device 800 can also be stored.
  • Computing unit 801, ROM 802 and RAM 803 are connected to each other via bus 804.
  • An input/output (I/O) interface 805 is also connected to bus 804.
  • the I/O interface 805 includes: an input unit 806, such as a keyboard, a mouse, etc.; an output unit 807, such as various types of displays, speakers, etc.; a storage unit 808, such as a magnetic disk, optical disk, etc. ; and communication unit 809, such as a network card, modem, wireless communication transceiver, etc.
  • the communication unit 809 allows the device 800 to exchange information/data with other devices through computer networks such as the Internet and/or various telecommunications networks.
  • Computing unit 801 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 801 include, but are not limited to, a central processing unit (CPU), a graphics processing unit (GPU), various dedicated artificial intelligence (AI) computing chips, various computing units running machine learning model algorithms, digital signal processing processor (DSP), and any appropriate processor, controller, microcontroller, etc.
  • the computing unit 801 performs various methods and processes described above, such as the page information protection method.
  • the page information protection method may be implemented as a computer software program, which is tangibly included in a machine-readable medium, such as the storage unit 808.
  • part or all of the computer program may be loaded and/or installed onto device 800 via ROM 802 and/or communication unit 809.
  • the computer program When the computer program is loaded into the RAM 803 and executed by the computing unit 801, one or more steps of the above-described protection method for page information may be performed.
  • the computing unit 801 may be configured to perform the protection method of page information in any other suitable manner (eg, by means of firmware).
  • Various implementations of the systems and techniques described above may be implemented in digital electronic circuit systems, integrated circuit systems, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), application specific standard products (ASSPs), systems on a chip implemented in a system (SOC), complex programmable logic device (CPLD), computer hardware, firmware, software, and/or combinations thereof.
  • FPGAs field programmable gate arrays
  • ASICs application specific integrated circuits
  • ASSPs application specific standard products
  • SOC system
  • CPLD complex programmable logic device
  • computer hardware firmware, software, and/or combinations thereof.
  • Various embodiments may include implementation in one or more computer programs executable and/or interpreted on a programmable system including at least one programmable processor, the programmable processor Can be a dedicated or general-purpose programmable processor that can be The system, at least one input device, and at least one output device receive data and instructions, and transmit the data and instructions to the storage system, the at least one input device, and the at least one output device.
  • a programmable system including at least one programmable processor, the programmable processor Can be a dedicated or general-purpose programmable processor that can be The system, at least one input device, and at least one output device receive data and instructions, and transmit the data and instructions to the storage system, the at least one input device, and the at least one output device.
  • Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general-purpose computer, special-purpose computer, or other programmable data processing device, such that the program codes, when executed by the processor or controller, cause the functions specified in the flowcharts and/or block diagrams/ The operation is implemented.
  • the program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
  • a machine-readable medium may be a tangible medium that may contain or store a program for use by or in connection with an instruction execution system, apparatus, or device.
  • the machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium.
  • Machine-readable media may include, but are not limited to, electronic, magnetic, optical, electromagnetic, infrared, or semiconductor systems, devices or devices, or any suitable combination of the foregoing.
  • machine-readable storage media would include one or more wire-based electrical connections, laptop disks, hard drives, random access memory (RAM), read only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • RAM random access memory
  • ROM read only memory
  • EPROM or flash memory erasable programmable read only memory
  • CD-ROM portable compact disk read-only memory
  • magnetic storage device or any suitable combination of the above.
  • the systems and techniques described herein may be implemented on a computer having a display device (eg, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user ); and a keyboard and pointing device (eg, a mouse or a trackball) through which a user can provide input to the computer.
  • a display device eg, a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
  • a keyboard and pointing device eg, a mouse or a trackball
  • Other kinds of devices may also be used to provide interaction with the user; for example, the feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and may be provided in any form, including Acoustic input, voice input or tactile input) to receive input from the user.
  • the systems and techniques described herein may be implemented in a computing system that includes back-end components (e.g., as a data server), or a computing system that includes middleware components (e.g., an application server), or a computing system that includes front-end components (e.g., A user's computer having a graphical user interface or web browser through which the user can interact with implementations of the systems and technologies described herein), or including such backend components, middleware components, or any combination of front-end components in a computing system.
  • the components of the system may be interconnected by any form or medium of digital data communication (eg, a communications network). Examples of communication networks include: local area network (LAN), wide area network (WAN), the Internet, and blockchain networks.
  • Computer systems may include clients and servers. Clients and servers are generally remote from each other and typically interact over a communications network. The relationship of client and server is created by computer programs running on corresponding computers and having a client-server relationship with each other.
  • the server can be a cloud server, also known as cloud computing server or cloud host. It is a host product in the cloud computing service system to solve the problem of traditional physical host and virtual server.
  • Dedicated servers Virtual Private Servers, referred to as VPS
  • VPS Virtual Private Servers
  • the server can be a cloud server, a distributed system server, or a server combined with a blockchain.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种页面信息的防护方法包括:响应于目标操作指令,确定当前页面为预设类型页面;确定当前页面的目标防护区域,并创建目标防护区域对应的防护沙盒,防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图;将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上;以渲染视图下层的相同尺寸的预设视图,代替渲染视图及渲染视图上的子视图进行页面渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作。

Description

页面信息的防护方法、装置及电子设备
相关申请的交叉引用
本申请基于申请号为202211071765.5、申请日为2022年9月2日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及信息安全技术领域,尤其涉及一种页面信息的防护方法、装置及电子设备。
背景技术
互联网技术的快速发展,加快了信息传播的效率,但同时也带来了信息安全的问题。并且,随着电子设备的发展与普及,屏幕截图、屏幕录制、屏幕共享等成为电子设备间一种常见的信息传播的方式。通过屏幕截图、屏幕录制或屏幕共享等方式,将屏幕上的内容传送至他人,提高了沟通效率。
然而,若屏幕内容涉及用户的个人信息、资金账户信息等隐私信息,则在将屏幕上的内容传送至他人时,将导致用户的隐私信息的泄露。
相关技术,以通过基于iOS操作系统的电子设备进行屏幕共享为例,在屏幕共享过程中,用户打开应用程序(Application program,简称APP)中包含隐私信息的页面时,APP可以弹出提醒信息,以提醒用户存在安全风险。然而,提醒信息容易被用户忽视,从而这种方式仍然存在信息泄露的风险,页面信息的防护效果差。
发明内容
本申请旨在至少在一定程度上解决相关技术中的技术问题之一。
本申请实施例提出一种页面信息的防护方法、装置及电子设备,以解决相关技术中的页面信息的防护效果差的技术问题。
本申请第一方面实施例提出了一种页面信息的防护方法,包括:响应于目标操作指令,确定当前页面为预设类型页面;确定所述当前页面的目标防护区域,并创建所述目标防护区域对应的防护沙盒,所述防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图;将所述目标防护区域的子视图添加到对应的防护沙盒的渲染视图上;以所述渲染视图下层的相同尺寸的预设视图,代替所述渲染视图及所述渲染视图上的所述子视图进行页面渲染,以得到目标页面,并对所述目标页面执行所述目标操作指令对应的操作。
本申请第二方面实施例提出了一种页面信息的防护装置,包括:确定模块,用于响 应于目标操作指令,确定当前页面为预设类型页面;创建模块,用于确定所述当前页面的目标防护区域,并创建所述目标防护区域对应的防护沙盒,所述防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图;第一处理模块,用于将所述目标防护区域的子视图添加到对应的防护沙盒的渲染视图上;第二处理模块,用于以所述渲染视图下层的相同尺寸的预设视图,代替所述渲染视图及所述渲染视图上的所述子视图进行页面渲染,以得到目标页面,并对所述目标页面执行所述目标操作指令对应的操作。
本申请第三方面实施例提出了一种电子设备,包括:至少一个处理器;以及与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如本申请第一方面实施例提出的页面信息的防护方法。
本申请第四方面实施例提出了一种存储有计算机指令的非瞬时计算机可读存储介质,所述计算机指令用于使所述计算机执行如本申请第一方面实施例提出的页面信息的防护方法。
本申请第五方面实施例提出了一种计算机程序产品,包括计算机程序,所述计算机程序在被处理器执行时实现如本申请第一方面实施例提出的页面信息的防护方法。
上述发明中的一个实施例具有如下优点或有益效果:
通过响应于目标操作指令,确定当前页面为预设类型页面,确定当前页面的目标防护区域,并创建目标防护区域对应的防护沙盒,防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图,将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上,以渲染视图下层的相同尺寸的预设视图,代替渲染视图及渲染视图上的子视图进行页面渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作,可以实现在用户进行屏幕截图、屏幕录制或屏幕共享等操作时,对当前页面中的隐私信息进行防护,提高了页面信息的防护效果,保护了用户的信息安全。
本申请附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本申请的实践了解到。
附图说明
本申请上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1为本申请实施例一所提供的页面信息的防护方法的流程示意图;
图2为本申请实施例二所提供的页面信息的防护方法的流程示意图;
图3为本申请实施例二所提供的当前页面的子视图、渲染视图及预设视图的示例图;
图4为本申请实施例二所提供的当前页面的子视图、渲染视图及预设视图的另一 示例图;
图5为本申请实施例三所提供的页面信息的防护方法的流程示意图;
图6为本申请实施例四所提供的页面信息的防护装置的结构示意图;
图7为本申请实施例五所提供的页面信息的防护装置的结构示意图;
图8示出了适于用来实现本申请实施方式的示例性电子设备的框图。
具体实施方式
下面详细描述本申请的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本申请,而不能理解为对本申请的限制。
需要说明的是,本公开的技术方案中,所涉及的用户个人信息的获取,存储和应用等,均符合相关法律法规的规定,且不违背公序良俗。
本申请实施例针对相关技术中页面信息的防护效果差的技术问题,提出一种页面信息的防护方法、装置、电子设备、存储介质以及计算机程序产品。其中,页面信息的防护方法包括:响应于目标操作指令,确定当前页面为预设类型页面;确定当前页面的目标防护区域,并创建目标防护区域对应的防护沙盒,防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图;将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上;以渲染视图下层的相同尺寸的预设视图,代替渲染视图及渲染视图上的子视图进行页面渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作。由此,可以实现在用户进行屏幕截图、屏幕录制或屏幕共享等操作时,对当前页面中的隐私信息进行防护,提高了页面信息的防护效果,保护了用户的信息安全。
下面参考附图描述本申请实施例的页面信息的防护方法、装置、电子设备、存储介质以及计算机程序产品。
下面首先对本申请实施例提供的页面信息的防护方法进行说明。其中,需要说明的是,本申请实施例提供的页面信息的防护方法,由页面信息的防护装置执行,以下将页面信息的防护装置简称为防护装置。其中,该防护装置可以为电子设备,也可以被配置在电子设备中,比如该防护装置可以为配置在电子设备中的APP,也可以为配置在APP中的装置,以使APP具有对当前页面的目标防护区域中的信息进行有效防护的功能,本申请对此不作限制。
需要说明的是,防护装置可以运行在iOS操作系统中,也可以运行在其它支持本申请实施例提供的页面信息防护功能的操作系统中,本申请实施例对此不作限制。
其中,电子设备可以为个人电脑(Personal Computer,简称PC)、云端设备、移动设备、服务器等,移动设备例如可以为手机、平板电脑、个人数字助理、穿戴式设备、 车载设备等任意硬件设备,本申请对此不作限制。
图1为本申请实施例一所提供的页面信息的防护方法的流程示意图。如图1所示,该页面信息的防护方法可以包括以下步骤101-104。
步骤101,响应于目标操作指令,确定当前页面为预设类型页面。
其中,当前页面,为应用程序运行过程中,待显示的页面或正在显示的页面。相应的,当前页面,可以在接收到目标操作指令之前显示,也可以在接收到目标操作指令之后显示,本申请对此不作限制。其中,应用程序,为任意的具有页面信息的防护功能的应用程序,本申请实施例对应用程序的类型不作限制。本申请实施例中的防护装置,可以为该应用程序,或者配置在该应用程序中,或者也独立于该应用程序进行配置,本申请对此不作限制。本申请实施例以防护装置为该应用程序为例进行说明,通过在任意一种应用程序中集成一个特定的软件开发工具包(Software Development Kit,简称SDK),可以使该应用程序具有本申请实施例提供的页面信息防护功能。
预设类型页面,可以根据需要预先设置,比如为包含用户个人信息、资金账户信息等隐私信息的页面,或者包含其它指定信息的页面,本申请实施例对此不作限制。
目标操作指令,可以为屏幕共享指令、屏幕截图指令、屏幕录制指令等指令中的至少一个。以屏幕录制指令为例,在用户点击电子设备中的具有屏幕录制功能的屏幕录制按钮时,即可触发屏幕录制指令,相应的,应用程序可以接收到屏幕录制指令。
举例来说,假设应用程序运行过程中,正在显示包含用户个人信息的当前页面时,用户开启了屏幕截图功能,从而触发了屏幕截图指令,则应用程序响应于该屏幕截图指令,可以确定当前页面为预设类型页面。或者,假设用户在启动应用程序之前,开启了屏幕录制或者屏幕共享功能,从而触发了屏幕录制或屏幕共享指令,然后用户启动了应用程序,在应用程序运行过程中待显示或正在显示包含用户个人信息的当前页面时,应用程序即可响应于该屏幕录制或屏幕共享指令,确定当前页面为预设类型页面。
步骤102,确定当前页面的目标防护区域,并创建目标防护区域对应的防护沙盒,防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图。
其中,目标防护区域,为当前页面需要防护的区域,可以为当前页面的整个页面区域,也可以为当前页面的一个或多个局部页面区域,可以根据需要预先设置,本申请对此不作限制。其中,局部页面区域,即当前页面的部分区域。
沙盒,在计算机安全领域中是一种安全机制,为运行中的程序提供的隔离环境。本申请实施例中的防护沙盒,为通过编码代码技术封装的一种防护工具,可以运行在应用程序中,对添加到防护沙盒中的内容进行防护。
在本申请的一个实施例中,对于当前页面的各目标防护区域,可以创建对应的防护沙盒,其中,每个防护沙盒可以提供一个渲染视图,且该渲染视图与对应的目标防护区域的尺寸相同。其中,渲染视图,为具有指定属性的视图。
步骤103,将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上。
可以理解的是,将目标防护区域的子视图添加到渲染视图上后,目标防护区域的所有子视图,即为渲染视图的子视图。
步骤104,以渲染视图下层的相同尺寸的预设视图,代替渲染视图及渲染视图上的子视图进行页面渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作。
其中,预设视图,为预先设置的位于渲染视图下层,且与渲染视图具有相同尺寸的视图。预设视图可以为具有单一颜色的视图,也可以为包含任意一幅图片的视图,本申请对此不作限制。
本申请实施例中,可以在将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上后,以预设视图代替渲染视图及渲染视图上的子视图进行页面渲染,即在进行页面渲染时,过滤防护沙盒中的渲染视图及渲染视图上的子视图,不对渲染视图及渲染视图上的子视图中的内容进行渲染,而是对预设视图中的内容进行渲染,以得到目标页面。
进一步的,即可对目标页面执行目标操作指令对应的操作。比如,在目标操作指令为屏幕截图指令时,可以截取得到目标页面的图像,将目标页面的图像作为执行屏幕截取操作得到的页面图像进行保存;在目标操作指令为屏幕录制指令时,可以录制得到包含目标页面的视频,将目标页面的图像,作为执行屏幕录制操作得到的视频中的至少一帧图像进行保存;在目标操作指令为屏幕共享指令时,可以将目标页面的图像实时分享至屏幕共享的对端设备进行显示。
值得注意的是,本申请实施例中,当前页面在所在应用程序中显示时,仍然正常显示该页面中的原有内容。
由此,使得用户对应用程序中的当前页面进行屏幕截图操作和屏幕录制操作,所保存的目标页面的图像中,或者用户对应用程序中的当前页面进行屏幕共享操作,所分享到屏幕共享的对端设备的目标页面的图像中,当前页面的目标防护区域的信息内容被替换为预设视图中的内容,比如目标防护区域为当前页面的整个页面区域时,所保存或分享的目标页面的图像为单一颜色的图像或预设的一幅图像,从而实现了对当前页面的目标防护区域的用户隐私信息等信息内容的防护,保护了用户的信息安全。同时,用户所使用的应用程序中的当前页面能够正常显示,从而能够保证应用程序的使用用户的用户体验。且相比相关技术,本申请实施例中提供的页面信息的防护方法的防护效果更好。
综上,本申请实施例提供的页面信息的防护方法,响应于目标操作指令,确定当前页面为预设类型页面;确定当前页面的目标防护区域,并创建目标防护区域对应的防护沙盒,防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图;将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上;以渲染视图下层的相同尺寸的预设 视图,代替渲染视图及渲染视图上的子视图进行页面渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作。由此,可以实现在用户进行屏幕截图、屏幕录制或屏幕共享等操作时,对当前页面中的隐私信息进行防护,提高了页面信息的防护效果,保护了用户的信息安全。
为了清楚说明本申请实施例中,是如何基于防护沙盒,对对应的目标防护区域中的信息进行防护的,下面结合图2,对本申请实施例中的页面信息的防护方法进行进一步说明。
图2为本申请实施例二所提供的页面信息的防护方法的流程示意图。如图2所示,页面信息的防护方法可以包括以下步骤201-204。
步骤201,响应于目标操作指令,确定当前页面为预设类型页面。
其中,步骤201的具体实现过程及原理,可以参考上述实施例的描述,此处不再赘述。
在本申请的一个实施例中,可以通过以下多种方式,判断当前页面是否为预设类型页面。
方式一
获取当前页面的标识,并将当前页面的标识与预设列表中的各预设标识进行匹配,在当前页面的标识与预设列表中任一预设标识匹配时,确定当前页面为预设类型页面。
其中,当前页面的标识,用于唯一标识当前页面,其可以为当前页面的名称,或者当前页面的统一资源定位符(Universal Resource Locator,简称URL),或者其它标识,本申请实施例对此不作限制。
在本申请的一个实施例中,可以根据需要预先设置一个列表,即预设列表,预设列表中包括各个预设类型页面的标识,为了便于区分,本申请实施例中将预设列表中各预设类型页面的标识称为预设标识。其中,预设标识用于唯一标识对应的预设类型页面,其可以为预设类型页面的名称,或者预设类型页面的URL,或者其它标识,本申请实施例对此不作限制。从而可以根据当前页面的标识,与预设列表中任一预设标识是否匹配,来确定当前页面是否为预设类型页面。
方式二
遍历当前页面的所有子视图,并在当前页面的所有子视图中任一子视图包含预设控件时,确定当前页面为预设类型页面。
其中,预设控件,可以根据需要设置,比如可以为文本输入等功能控件,或者其它控件,本申请对此不作限制。
在本申请的一个实施例中,可以按照当前页面的页面层级,依次遍历当前页面的所有子视图,并在当前页面的所有子视图中任一子视图包含预设控件时,确定当前页面为预设类型页面。
在本申请的一个实施例中,也可以将方式一和方式二组合,即在当前页面的标识与预设列表中任一预设标识匹配,且当前页面的所有子视图中任一子视图包含预设控件时,确定当前页面为预设类型页面。
步骤202,确定当前页面的目标防护区域,其中,目标防护区域包括当前页面的至少一个局部页面区域,并创建各局部页面区域分别对应的防护沙盒,防护沙盒提供与对应的局部页面区域的尺寸相同的渲染视图。
在本申请的一个实施例中,目标防护区域包括当前页面的至少一个局部页面区域的情况下,可以在当前页面的视图控制器初始化时,创建各局部页面区域分别对应的防护沙盒,也可以在当前页面的视图控制器初始化之后,创建各局部页面区域分别对应的防护沙盒,本申请实施例对各局部页面区域分别对应的防护沙盒的创建时机不作限制,只需在进行页面渲染,得到目标页面之前创建即可。
在本申请的一个实施例中,可以通过以下方式,获取防护沙盒的渲染视图:在创建目标防护区域对应的防护沙盒时,生成预设用户界面组件,预设用户界面组件包括由预设用户界面组件的多个子视图构成的子视图数组;遍历子视图数组中的多个子视图,以从子视图数组中的多个子视图中获取具有指定属性的目标子视图;将目标子视图,作为目标防护区域对应的防护沙盒的渲染视图。
其中,预设用户界面组件,可以为文本输入框用户界面(User Interface,简称UI)组件,也可以为包括子视图数组的其它用户界面组件,本申请实施例对此不作限制。其中,预设用户界面组件,包括多个子视图,该多个子视图构成一个子视图数组。
指定属性,可以根据需要设置,比如可以为子视图属于指定的类,或者子视图具有指定的其它属性,本申请实施例对此不作限制。
在本申请的一个实施例中,以指定属性为子视图属于UI文本字段画布视图(UITextFieldCanvasView)类或者UI文本布局画布视图(UITextLayoutCanvasView)类为例,可以遍历子视图数组中的多个子视图,以从子视图数组的栈顶获取画布视图canvasView。在该画布视图属于UITextFieldCanvasView类或者UITextLayoutCanvasView类的情况下,可以将该画布视图作为目标防护区域对应的防护沙盒的渲染视图。在该画布视图不属于UITextFieldCanvasView类或者UITextLayoutCanvasView类的情况下,则可以从子视图数组中依次寻找属于UITextFieldCanvasView类或者UITextLayoutCanvasView类的目标子视图,作为目标防护区域对应的防护沙盒的渲染视图。
步骤203,将至少一个局部页面区域的子视图,添加至对应防护沙盒的渲染视图上。
在本申请的一个实施例中,在当前页面的目标防护区域包括当前页面的至少一个局部页面区域的情况下,对于每个局部页面区域,可以将该局部页面区域的子视图,添加至对应防护沙盒的渲染视图上,以将对应的防护沙盒的渲染视图,作为该局部页面 区域的父视图。
步骤204,对渲染视图下层的相同尺寸的预设视图中的内容,以及当前页面中除局部页面区域之外的其它区域的子视图中的内容进行渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作。
可以理解的是,在当前页面的目标防护区域包括当前页面的至少一个局部页面区域的情况下,当前页面中除该至少一个局部页面区域之外,还包括其它区域。本申请实施例中,在进行页面渲染时,对于当前页面的目标防护区域,可以过滤对应的防护沙盒中的渲染视图及渲染视图上的子视图,不对渲染视图及渲染视图上的子视图中的内容进行渲染,而是对渲染视图下层的预设视图中的内容进行渲染,对于当前页面的其它区域,可以对当前页面中对应区域的原有内容进行渲染,以得到目标页面。进而即可对目标页面执行目标操作指令对应的操作。
由此,使得当前页面的目标防护区域包括当前页面的局部页面区域时,用户对应用程序中的当前页面进行屏幕截图操作和屏幕录制操作,所保存的目标页面的图像中,或者用户对应用程序中的当前页面进行屏幕共享操作,所分享到屏幕共享的对端设备的目标页面的图像中,当前页面的局部页面区域的信息内容被替换为预设视图中的内容,比如替换为单一颜色或预设的一幅图像的内容,而当前页面的其它区域中的原有内容在目标页面中被保留,从而在实现了对当前页面的目标防护区域的用户隐私信息等信息内容进行防护的同时,保留当前页面的其它区域的原有内容,以保证目标页面的观看用户的用户体验。同时,用户所使用的应用程序中的当前页面能够正常显示,从而能够保证应用程序的使用用户的用户体验。
参考图3,假设当前页面的目标防护区域包括当前页面的一个局部页面区域,本申请实施例中,可以创建该局部页面区域对应的防护沙盒,防护沙盒提供与该局部页面区域的尺寸相同的渲染视图301,并且可以将该局部页面区域的子视图(即虚线框302中的子视图),添加至该渲染视图301上,以将该渲染视图301,作为该局部页面区域的父视图。进而可以对该渲染视图301下层的预设视图303中的内容,以及当前页面中除该局部页面区域之外的其它区域的子视图中的内容进行渲染,以得到目标页面。其中,预设视图303,为与渲染视图301的尺寸相同且颜色为黑色的视图,目标页面中,当前页面的目标防护区域的信息内容被替换为预设视图中的内容,而当前页面的其它区域中的原有内容被保留。
在本申请的一个实施例中,目标防护区域可以包括当前页面对应的整个页面区域。相应的,步骤202可以替换为:确定当前页面的目标防护区域,其中,目标防护区域包括当前页面的整个页面区域,并创建整个页面区域对应的防护沙盒,防护沙盒提供与对应的整个页面区域的尺寸相同的渲染视图。
在本申请的一个实施例中,目标防护区域包括当前页面的整个页面区域的情况下, 可以在当前页面的视图控制器初始化时,创建整个页面区域对应的防护沙盒。
在本申请的一个实施例中,目标防护区域包括当前页面对应的整个页面区域的情况下,步骤203可以替换为:将当前页面的所有子视图,添加到防护沙盒的渲染视图上。相应的,步骤204可以替换为:对渲染视图下层的相同尺寸的预设视图中的内容进行渲染,以得到目标页面。
本申请实施例中,将当前页面的所有子视图,添加到防护沙盒的渲染视图上,可以将该渲染视图作为当前页面的根视图,由于渲染视图的尺寸以及预设视图的尺寸,与整个页面的尺寸相同,则对渲染视图下层的相同尺寸的预设视图中的内容进行渲染,得到的目标页面中,当前页面的所有信息内容会被替换为预设视图中的内容,由此,使得当前页面的目标防护区域包括当前页面的整个页面区域时,用户对应用程序中的当前页面进行屏幕截图操作和屏幕录制操作,所保存的目标页面的图像中,或者用户对应用程序中的当前页面进行屏幕共享操作,所分享到屏幕共享的对端设备的目标页面的图像中,当前页面的整个页面区域的信息内容被替换为预设视图中的内容,比如替换为单一颜色或预设的一幅图像的内容,从而实现了对当前页面的整个页面区域的信息内容进行防护。同时,用户所使用的应用程序中的当前页面能够正常显示,从而能够保证应用程序的使用用户的用户体验。
参考图4,假设当前页面的目标防护区域包括当前页面的整个页面区域,本申请实施例中,可以创建该整个页面区域对应的防护沙盒,防护沙盒提供与该整个页面区域的尺寸相同的渲染视图401,并且可以将当前页面的所有子视图(即虚线框402中的子视图),添加到该渲染视图401上,以将渲染视图401作为当前页面的根视图401。进而可以对该渲染视图401下层的预设视图403中的内容进行渲染,以得到目标页面。其中,预设视图403,为与渲染视图401的尺寸相同且颜色为黑色的视图,目标页面中,当前页面的所有信息内容被替换为预设视图中的内容。
在本申请的一个实施例中,响应于目标操作指令,确定当前页面为预设类型页面之后,还可以对用户进行风险提醒。下面结合图5,针对上述情况,对本申请实施例提供的页面信息的防护方法进行进一步说明。
图5为本申请实施例三所提供的页面信息的防护方法的流程示意图。如图5所示,页面信息的防护方法可以包括以下步骤501-506。
步骤501,响应于目标操作指令,确定当前页面为预设类型页面。
其中,当前页面,为应用程序运行过程中,待显示的页面或正在显示的页面。相应的,当前页面,可以在接收到目标操作指令之前显示,也可以在接收到目标操作指令之后显示,本申请对此不作限制。其中,应用程序,为任意的具有页面信息的防护功能的应用程序,本申请实施例对应用程序的类型不作限制。本申请实施例中的防护装置,可以为该应用程序,或者配置在该应用程序中,或者也独立于该应用程序进行配置,本申 请对此不作限制。本申请实施例以防护装置为该应用程序为例进行说明,通过在任意一种应用程序中集成一个软件开发工具包(Software Development Kit,简称SDK),使该应用程序具有本申请实施例提供的页面信息防护功能。
其中,关于步骤501的具体实现过程及原理,可以参考上述实施例的相关描述,此处不再赘述。
步骤502,控制当前页面向所在应用程序中配置的防护管理模块进行注册,以使防护管理模块响应于目标操作指令,向当前页面返回指定提示信息。
在本申请的一个实施例中,当前页面所在的应用程序中可以配置防护管理模块,其中,该防护管理模块具有生成指定提示信息等功能。且应用程序启动时,可以采用懒加载的方式初始化该防护管理模块。
其中,指定提示信息,可以根据需要设置,比如包括“当前页面存在信息泄露风险,请谨慎”等文字信息。
在本申请的一个实施例中,应用程序响应于目标操作指令,确定当前页面为预设类型页面后,可以控制当前页面向防护管理模块进行注册。进而防护管理模块响应于目标操作指令,可以向当前页面返回指定提示信息。
步骤503,在当前页面上以预设方式显示指定提示信息。
其中,预设方式,为预先设置的显示指定提示信息的方式,可以根据需要任意设置,本申请实施例对此不作限制。
在本申请的一个实施例中,当前页面可以在运行应用程序并对当前页面进行目标操作的电子设备中正常渲染及显示。比如,在用户使用电子设备A运行应用程序时,若用户开启屏幕截图、屏幕录制或屏幕共享功能,当前页面可以在电子设备A中正常渲染及显示。由此,可以使得应用程序在电子设备A中正常运行并正常显示页面,保证用户体验。
另外,为了对用户进行风险提醒,可以在显示当前页面时,在当前页面上以预设方式显示指定提示信息。
在本申请的一个实施例中,指定提示信息可以为文字形式的信息,并在当前页面的顶部突出显示,且循环滚动播放,以持续对用户进行风险提醒,提高页面信息的防护效果,保护用户的信息安全。
在本申请的一个实施例中,指定提示信息可以为弹窗形式,并在当前页面之上全屏显示,用户确认后可关闭。
需要说明的是,上述显示指定提示信息的预设方式,仅是示例性说明,不能理解为对本申请技术方案的限制。
步骤504,确定当前页面的目标防护区域,并创建目标防护区域对应的防护沙盒,防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图。
其中,步骤504可以在步骤503之前执行,也可以在步骤503之后执行,本申请对此不作限制,只需在响应于目标操作指令,确定当前页面为预设类型页面后,或者在响应于目标操作指令,确定当前页面为预设类型页面的同时执行即可。
步骤505,将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上。
步骤506,以渲染视图下层的相同尺寸的预设视图,代替渲染视图及渲染视图上的子视图进行页面渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作。
其中,步骤504-506的具体实现过程及原理,可以参考上述实施例的相关描述,此处不作赘述。
综上,本申请实施例提供的页面信息的防护方法,响应于目标操作指令,确定当前页面为预设类型页面,控制当前页面向所在应用程序中配置的防护管理模块进行注册,以使防护管理模块响应于目标操作指令,向当前页面返回指定提示信息,在当前页面上以预设方式显示指定提示信息,确定当前页面的目标防护区域,并创建目标防护区域对应的防护沙盒,防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图,将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上,以渲染视图下层的相同尺寸的预设视图,代替渲染视图及渲染视图上的子视图进行页面渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作。由此,可以实现在用户进行屏幕截图、屏幕录制或屏幕共享等操作,且当前页面包括用户的隐私信息时,对用户进行风险提醒,并基于防护沙盒,对当前页面中的隐私信息进行有效防护,提高了页面信息的防护效果,保护了用户的信息安全。
图6为本申请实施例四所提供的页面信息的防护装置的结构示意图。
如图6所示,该页面信息的防护装置600可以包括:确定模块610、创建模块620、第一处理模块630和第二处理模块640。
其中,确定模块610,用于响应于目标操作指令,确定当前页面为预设类型页面;
创建模块620,用于确定当前页面的目标防护区域,并创建目标防护区域对应的防护沙盒,防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图;
第一处理模块630,用于将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上;
第二处理模块640,用于以渲染视图下层的相同尺寸的预设视图,代替渲染视图及渲染视图上的子视图进行页面渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作。
需要说明的是,本申请实施例提供的页面信息的防护装置600,可以执行前述实施例的页面信息的防护方法,该页面信息的防护装置600可以为电子设备,也可以被配置在电子设备中,比如该防护装置可以为配置在电子设备中的APP,也可以为配置在APP中的装置,以使APP具有对当前页面的目标防护区域中的信息进行有效防护的功 能,本申请对此不作限制。
其中,电子设备可以为PC、云端设备、移动设备、服务器等,移动设备例如可以为手机、平板电脑、个人数字助理、穿戴式设备、车载设备等任意硬件设备,本申请对此不作限制。
需要说明的是,前述页面信息的防护方法实施例中的解释说明也适用于该实施例的页面信息的防护装置,此处不再赘述。
本申请实施例的页面信息的防护装置,响应于目标操作指令,确定当前页面为预设类型页面;确定当前页面的目标防护区域,并创建目标防护区域对应的防护沙盒,防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图;将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上;以渲染视图下层的相同尺寸的预设视图,代替渲染视图及渲染视图上的子视图进行页面渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作。由此,可以实现在用户进行屏幕截图、屏幕录制或屏幕共享等操作时,对当前页面中的隐私信息进行防护,提高了页面信息的防护效果,保护了用户的信息安全。
图7为本申请实施例五所提供的页面信息的防护装置的结构示意图。
如图7所示,该页面信息的防护装置700可以包括:具体可以包括:确定模块710、创建模块720、第一处理模块730和第二处理模块740。其中,图7中确定模块710、创建模块720、第一处理模块730和第二处理模块740与图6中确定模块610、创建模块620、第一处理模块630和第二处理模块640具有相同功能和结构。
在本申请实施例的一种可能的实现方式中,目标防护区域包括当前页面的至少一个局部页面区域;目标防护区域对应的防护沙盒,包括各局部页面区域分别对应的防护沙盒;
第一处理模块730,包括:
第一处理单元,用于将至少一个局部页面区域的子视图,添加至对应防护沙盒的渲染视图上。
在本申请实施例的另一种可能的实现方式中,第二处理模块740,包括:
第一渲染单元,用于对渲染视图下层的相同尺寸的预设视图中的内容,以及当前页面中除局部页面区域之外的其它区域的子视图中的内容进行渲染,以得到目标页面。
在本申请实施例的另一种可能的实现方式中,目标防护区域包括当前页面对应的整个页面区域;第一处理模块730,包括:
第二处理单元,用于将当前页面的所有子视图,添加到防护沙盒的渲染视图上。
在本申请实施例的另一种可能的实现方式中,第二处理模块740,包括:
第二渲染单元,用于对渲染视图下层的相同尺寸的预设视图中的内容进行渲染,以得到目标页面。
在本申请实施例的另一种可能的实现方式中,页面信息的防护装置700还包括:
生成模块750,用于在创建目标防护区域对应的防护沙盒时,生成预设用户界面组件,预设用户界面组件包括由预设用户界面组件的多个子视图构成的子视图数组;
获取模块760,用于遍历子视图数组中的多个子视图,以从子视图数组中的多个子视图中获取具有指定属性的目标子视图,并将目标子视图,作为目标防护区域对应的防护沙盒的渲染视图。
在本申请实施例的另一种可能的实现方式中,页面信息的防护装置700还包括:
显示模块770,用于在当前页面上以预设方式显示指定提示信息。
在本申请实施例的另一种可能的实现方式中,页面信息的防护装置700还包括:
控制模块,用于控制当前页面向所在应用程序中配置的防护管理模块进行注册,以使防护管理模块响应于目标操作指令,向当前页面返回指定提示信息。
在本申请实施例的另一种可能的实现方式中,确定模块710包括:
第一确定单元,用于获取当前页面的标识,并将当前页面的标识与预设列表中的各预设标识进行匹配,在当前页面的标识与预设列表中任一预设标识匹配时,确定当前页面为预设类型页面;
和/或,第二确定单元,用于遍历当前页面的所有子视图,并在当前页面的所有子视图中任一子视图包含预设控件时,确定当前页面为预设类型页面。
本申请实施例的页面信息的防护装置,响应于目标操作指令,确定当前页面为预设类型页面;确定当前页面的目标防护区域,并创建目标防护区域对应的防护沙盒,防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图;将目标防护区域的子视图添加到对应的防护沙盒的渲染视图上;以渲染视图下层的相同尺寸的预设视图,代替渲染视图及渲染视图上的子视图进行页面渲染,以得到目标页面,并对目标页面执行目标操作指令对应的操作。由此,可以实现在用户进行屏幕截图、屏幕录制或屏幕共享等操作时,对当前页面中的隐私信息进行防护,提高了页面信息的防护效果,保护了用户的信息安全。
为了实现上述实施例,本申请还提出一种电子设备,包括:至少一个处理器;以及与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如本申请前述任一实施例提出的页面信息的防护方法。
为了实现上述实施例,本申请还提出一种存储有计算机指令的非瞬时计算机可读存储介质,所述计算机指令用于使所述计算机执行如本申请前述任一实施例提出的页面信息的防护方法。
为了实现上述实施例,本申请还提出一种计算机程序产品,包括计算机程序,所述计算机程序在被处理器执行时实现如本申请前述任一实施例提出的页面信息的防护方 法。
图8示出了可以用来实施本公开的实施例的示例电子设备800的示意性框图。电子设备旨在表示各种形式的数字计算机,诸如,膝上型计算机、台式计算机、工作台、个人数字助理、服务器、刀片式服务器、大型计算机、和其它适合的计算机。电子设备还可以表示各种形式的移动装置,诸如,个人数字处理、蜂窝电话、智能电话、可穿戴设备和其它类似的计算装置。本文所示的部件、它们的连接和关系、以及它们的功能仅仅作为示例,并且不意在限制本文中描述的和/或者要求的本公开的实现。
如图8所示,该电子设备800可以包括计算单元801,其可以根据存储在只读存储器(ROM)802中的计算机程序或者从存储单元808加载到随机访问存储器(RAM)803中的计算机程序,来执行各种适当的动作和处理。在RAM 803中,还可存储设备800操作所需的各种程序和数据。计算单元801、ROM 802以及RAM 803通过总线804彼此相连。输入/输出(I/O)接口805也连接至总线804。
设备800中的多个部件连接至I/O接口805,包括:输入单元806,例如键盘、鼠标等;输出单元807,例如各种类型的显示器、扬声器等;存储单元808,例如磁盘、光盘等;以及通信单元809,例如网卡、调制解调器、无线通信收发机等。通信单元809允许设备800通过诸如因特网的计算机网络和/或各种电信网络与其他设备交换信息/数据。
计算单元801可以是各种具有处理和计算能力的通用和/或专用处理组件。计算单元801的一些示例包括但不限于中央处理单元(CPU)、图形处理单元(GPU)、各种专用的人工智能(AI)计算芯片、各种运行机器学习模型算法的计算单元、数字信号处理器(DSP)、以及任何适当的处理器、控制器、微控制器等。计算单元801执行上文所描述的各个方法和处理,例如页面信息的防护方法。例如,在一些实施例中,页面信息的防护方法可被实现为计算机软件程序,其被有形地包含于机器可读介质,例如存储单元808。在一些实施例中,计算机程序的部分或者全部可以经由ROM 802和/或通信单元809而被载入和/或安装到设备800上。当计算机程序加载到RAM 803并由计算单元801执行时,可以执行上文描述的页面信息的防护方法的一个或多个步骤。备选地,在其他实施例中,计算单元801可以通过其他任何适当的方式(例如,借助于固件)而被配置为执行页面信息的防护方法。
本文中以上描述的系统和技术的各种实施方式可以在数字电子电路系统、集成电路系统、场可编程门阵列(FPGA)、专用集成电路(ASIC)、专用标准产品(ASSP)、芯片上系统的系统(SOC)、复杂可编程逻辑设备(CPLD)、计算机硬件、固件、软件、和/或它们的组合中实现。这些各种实施方式可以包括:实施在一个或者多个计算机程序中,该一个或者多个计算机程序可在包括至少一个可编程处理器的可编程系统上执行和/或解释,该可编程处理器可以是专用或者通用可编程处理器,可以从存储系 统、至少一个输入装置、和至少一个输出装置接收数据和指令,并且将数据和指令传输至该存储系统、该至少一个输入装置、和该至少一个输出装置。
用于实施本公开的方法的程序代码可以采用一个或多个编程语言的任何组合来编写。这些程序代码可以提供给通用计算机、专用计算机或其他可编程数据处理装置的处理器或控制器,使得程序代码当由处理器或控制器执行时使流程图和/或框图中所规定的功能/操作被实施。程序代码可以完全在机器上执行、部分地在机器上执行,作为独立软件包部分地在机器上执行且部分地在远程机器上执行或完全在远程机器或服务器上执行。
在本公开的上下文中,机器可读介质可以是有形的介质,其可以包含或存储以供指令执行系统、装置或设备使用或与指令执行系统、装置或设备结合地使用的程序。机器可读介质可以是机器可读信号介质或机器可读储存介质。机器可读介质可以包括但不限于电子的、磁性的、光学的、电磁的、红外的、或半导体系统、装置或设备,或者上述内容的任何合适组合。机器可读存储介质的更具体示例会包括基于一个或多个线的电气连接、便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦除可编程只读存储器(EPROM或快闪存储器)、光纤、便捷式紧凑盘只读存储器(CD-ROM)、光学储存设备、磁储存设备、或上述内容的任何合适组合。
为了提供与用户的交互,可以在计算机上实施此处描述的系统和技术,该计算机具有:用于向用户显示信息的显示装置(例如,CRT(阴极射线管)或者LCD(液晶显示器)监视器);以及键盘和指向装置(例如,鼠标或者轨迹球),用户可以通过该键盘和该指向装置来将输入提供给计算机。其它种类的装置还可以用于提供与用户的交互;例如,提供给用户的反馈可以是任何形式的传感反馈(例如,视觉反馈、听觉反馈、或者触觉反馈);并且可以用任何形式(包括声输入、语音输入或者、触觉输入)来接收来自用户的输入。
可以将此处描述的系统和技术实施在包括后台部件的计算系统(例如,作为数据服务器)、或者包括中间件部件的计算系统(例如,应用服务器)、或者包括前端部件的计算系统(例如,具有图形用户界面或者网络浏览器的用户计算机,用户可以通过该图形用户界面或者该网络浏览器来与此处描述的系统和技术的实施方式交互)、或者包括这种后台部件、中间件部件、或者前端部件的任何组合的计算系统中。可以通过任何形式或者介质的数字数据通信(例如,通信网络)来将系统的部件相互连接。通信网络的示例包括:局域网(LAN)、广域网(WAN)、互联网和区块链网络。
计算机系统可以包括客户端和服务器。客户端和服务器一般远离彼此并且通常通过通信网络进行交互。通过在相应的计算机上运行并且彼此具有客户端-服务器关系的计算机程序来产生客户端和服务器的关系。服务器可以是云服务器,又称为云计算服务器或云主机,是云计算服务体系中的一项主机产品,以解决了传统物理主机与虚拟 专用服务器(Virtual Private Server,简称VPS)中,存在的管理难度大,业务扩展性弱的缺陷。服务器可以是云服务器,也可以为分布式系统的服务器,或者是结合了区块链的服务器。
应该理解,可以使用上面所示的各种形式的流程,重新排序、增加或删除步骤。例如,本发公开中记载的各步骤可以并行地执行也可以顺序地执行也可以不同的次序执行,只要能够实现本公开公开的技术方案所期望的结果,本文在此不进行限制。
上述具体实施方式,并不构成对本公开保护范围的限制。本领域技术人员应该明白的是,根据设计要求和其他因素,可以进行各种修改、组合、子组合和替代。任何在本公开的精神和原则之内所作的修改、等同替换和改进等,均应包含在本公开保护范围之内。

Claims (12)

  1. 一种页面信息的防护方法,包括:
    响应于目标操作指令,确定当前页面为预设类型页面;
    确定所述当前页面的目标防护区域,并创建所述目标防护区域对应的防护沙盒,所述防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图;
    将所述目标防护区域的子视图添加到对应的防护沙盒的渲染视图上;
    以所述渲染视图下层的相同尺寸的预设视图,代替所述渲染视图及所述渲染视图上的所述子视图进行页面渲染,以得到目标页面,并对所述目标页面执行所述目标操作指令对应的操作。
  2. 根据权利要求1所述的方法,其中所述目标防护区域包括所述当前页面的至少一个局部页面区域;所述目标防护区域对应的防护沙盒,包括各所述局部页面区域分别对应的防护沙盒;
    所述将所述目标防护区域的子视图添加到对应的防护沙盒的渲染视图上,包括:
    将所述至少一个局部页面区域的子视图,添加至对应防护沙盒的渲染视图上。
  3. 根据权利要求2所述的方法,其中所述以所述渲染视图下层的相同尺寸的预设视图,代替所述渲染视图及所述渲染视图上的所述子视图进行页面渲染,以得到目标页面,包括:
    对所述渲染视图下层的相同尺寸的预设视图中的内容,以及所述当前页面中除所述局部页面区域之外的其它区域的子视图中的内容进行渲染,以得到所述目标页面。
  4. 根据权利要求1至3中任一项所述的方法,其中所述目标防护区域包括所述当前页面对应的整个页面区域;
    所述将所述目标防护区域的子视图添加到对应的防护沙盒的渲染视图上,包括:
    将所述当前页面的所有子视图,添加到所述防护沙盒的渲染视图上。
  5. 根据权利要求4所述的方法,其中所述以所述渲染视图下层的相同尺寸的预设视图,代替所述渲染视图及所述渲染视图上的所述子视图进行页面渲染,以得到目标页面,包括:
    对所述渲染视图下层的相同尺寸的预设视图中的内容进行渲染,以得到所述目标页面。
  6. 根据权利要求1至5中任一项所述的方法,还包括:
    在创建所述目标防护区域对应的防护沙盒时,生成预设用户界面组件,所述预设用户界面组件包括由所述预设用户界面组件的多个子视图构成的子视图数组;
    遍历所述子视图数组中的多个子视图,以从所述子视图数组中的多个子视图中获取具有指定属性的目标子视图;
    将所述目标子视图,作为所述目标防护区域对应的防护沙盒的渲染视图。
  7. 根据权利要求1至6中任一项所述的方法,其中所述响应于目标操作指令,确定当前页面为预设类型页面之后,所述方法还包括:
    在所述当前页面上以预设方式显示指定提示信息。
  8. 根据权利要求7所述的方法,其中所述在所述当前页面上以预设方式显示指定提示信息之前,还包括:
    控制所述当前页面向所在应用程序中配置的防护管理模块进行注册,以使所述防护管理模块响应于所述目标操作指令,向所述当前页面返回所述指定提示信息。
  9. 根据权利要求1至8中任一项所述的方法,其中所述确定当前页面为预设类型页面,包括:
    获取所述当前页面的标识,并将所述当前页面的标识与预设列表中的各预设标识进行匹配,在所述当前页面的标识与所述预设列表中任一预设标识匹配时,确定所述当前页面为所述预设类型页面;
    和/或,遍历所述当前页面的所有子视图,并在所述当前页面的所有子视图中任一子视图包含预设控件时,确定所述当前页面为所述预设类型页面。
  10. 一种页面信息的防护装置,包括:
    确定模块,用于响应于目标操作指令,确定当前页面为预设类型页面;
    创建模块,用于确定所述当前页面的目标防护区域,并创建所述目标防护区域对应的防护沙盒,所述防护沙盒提供与对应的目标防护区域的尺寸相同的渲染视图;
    第一处理模块,用于将所述目标防护区域的子视图添加到对应的防护沙盒的渲染视图上;
    第二处理模块,用于以所述渲染视图下层的相同尺寸的预设视图,代替所述渲染视图及所述渲染视图上的所述子视图进行页面渲染,以得到目标页面,并对所述目标页面执行所述目标操作指令对应的操作。
  11. 一种电子设备,包括:
    至少一个处理器;以及
    与所述至少一个处理器通信连接的存储器;其中,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行权利要求1-9中任一项所述的方法。
  12. 一种存储有计算机指令的非瞬时计算机可读存储介质,其特征在于,所述计算机指令用于使所述计算机执行权利要求1-9中任一项所述的方法。
PCT/CN2023/098380 2022-09-02 2023-06-05 页面信息的防护方法、装置及电子设备 WO2024045740A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211071765.5A CN115510508A (zh) 2022-09-02 2022-09-02 页面信息的防护方法、装置及电子设备
CN202211071765.5 2022-09-02

Publications (1)

Publication Number Publication Date
WO2024045740A1 true WO2024045740A1 (zh) 2024-03-07

Family

ID=84501592

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/098380 WO2024045740A1 (zh) 2022-09-02 2023-06-05 页面信息的防护方法、装置及电子设备

Country Status (2)

Country Link
CN (1) CN115510508A (zh)
WO (1) WO2024045740A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115510508A (zh) * 2022-09-02 2022-12-23 京东科技信息技术有限公司 页面信息的防护方法、装置及电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485166A (zh) * 2016-10-20 2017-03-08 广州三星通信技术研究有限公司 用于电子终端的截屏方法和设备
CN112035878A (zh) * 2020-08-31 2020-12-04 维沃移动通信(杭州)有限公司 信息显示方法、装置和电子设备
US10970532B1 (en) * 2019-06-06 2021-04-06 Ca, Inc. Systems and methods for preventing sharing of sensitive content in image data on a closed computing platform
CN114115664A (zh) * 2021-11-24 2022-03-01 北京沃东天骏信息技术有限公司 截图处理方法、装置、设备及介质
CN115510508A (zh) * 2022-09-02 2022-12-23 京东科技信息技术有限公司 页面信息的防护方法、装置及电子设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485166A (zh) * 2016-10-20 2017-03-08 广州三星通信技术研究有限公司 用于电子终端的截屏方法和设备
US10970532B1 (en) * 2019-06-06 2021-04-06 Ca, Inc. Systems and methods for preventing sharing of sensitive content in image data on a closed computing platform
CN112035878A (zh) * 2020-08-31 2020-12-04 维沃移动通信(杭州)有限公司 信息显示方法、装置和电子设备
CN114115664A (zh) * 2021-11-24 2022-03-01 北京沃东天骏信息技术有限公司 截图处理方法、装置、设备及介质
CN115510508A (zh) * 2022-09-02 2022-12-23 京东科技信息技术有限公司 页面信息的防护方法、装置及电子设备

Also Published As

Publication number Publication date
CN115510508A (zh) 2022-12-23

Similar Documents

Publication Publication Date Title
US8468457B1 (en) Global keyboard shortcuts management for web applications
US20160004425A1 (en) Method of displaying graphic user interface and electronic device implementing same
CN109446832B (zh) 一种截屏方法及装置
CN111767554B (zh) 屏幕分享方法、装置、存储介质及电子设备
US10891397B2 (en) User interface display method for terminal, and terminal
CN108475182B (zh) 数据处理方法以及电子终端
WO2019242542A1 (zh) 截图处理方法及装置
US10083174B2 (en) Context enriched application text translation
CN104704468A (zh) Web应用程序的跨系统安装
WO2020211501A1 (zh) 数据分享方法、设备以及计算机可读介质
EP3161598A1 (en) Light dismiss manager
RU2768526C2 (ru) Реальное присутствие рукописного ввода для сотрудничества в реальном времени
WO2024045740A1 (zh) 页面信息的防护方法、装置及电子设备
WO2016070726A1 (zh) 页面标签的加载方法、装置和浏览器客户端
JP7007168B2 (ja) プログラム、情報処理方法、及び情報処理装置
WO2015069980A1 (en) Two step content selection
WO2024131568A1 (zh) 会话信息处理方法及相关设备
US20160232373A1 (en) Method and apparatus for providing security information of user device
CN107862035B (zh) 会议记录的网络读取方法、装置、智能平板和存储介质
US9904461B1 (en) Method and system for remote text selection using a touchscreen device
CN107315970B (zh) 一种敏感数据的交互方法及装置
CN112367295B (zh) 插件展示方法及装置、存储介质及电子设备
CN110221756B (zh) 处理应用数据的方法、装置、终端及存储介质
WO2021252058A1 (en) Systems and methods for viewing incompatible web pages via remote browser instances
US20160147741A1 (en) Techniques for providing a user interface incorporating sign language

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23858779

Country of ref document: EP

Kind code of ref document: A1