CN104219053B - Method for information display, information concealing method and device - Google Patents

Method for information display, information concealing method and device Download PDF

Info

Publication number
CN104219053B
CN104219053B CN201410429501.1A CN201410429501A CN104219053B CN 104219053 B CN104219053 B CN 104219053B CN 201410429501 A CN201410429501 A CN 201410429501A CN 104219053 B CN104219053 B CN 104219053B
Authority
CN
China
Prior art keywords
authentication mechanism
information content
verification operation
layer
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410429501.1A
Other languages
Chinese (zh)
Other versions
CN104219053A (en
Inventor
鲍协浩
戚冬杰
赵振海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410429501.1A priority Critical patent/CN104219053B/en
Publication of CN104219053A publication Critical patent/CN104219053A/en
Application granted granted Critical
Publication of CN104219053B publication Critical patent/CN104219053B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure discloses a kind of method for information display, information concealing method and device, belongs to field of information security technology.Described information display methods includes:Receive the first kind verification operation for being verified to any layer in 1 layer of authentication mechanism of preceding n in n-layer authentication mechanism, n >=2;When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used to pretend original information content;Receive the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism;When the Equations of The Second Kind verification operation is verified, the original information content is shown.Solve information in correlation technique security it is poor the problem of;Having reached can be pretended by pretending the information content to original information content, and then make it that other people are difficult to know original information content, improve the effect of Information Security.

Description

Method for information display, information concealing method and device
Technical field
This disclosure relates to field of information security technology, more particularly to a kind of method for information display, information concealing method and dress Put.
Background technology
It is that one kind increases authentication mechanism in short message application that short message, which is hidden, prevents other people from arbitrarily checking the work(of whole short messages Energy.
One secret entrance is generally set in correlation technique in short message application, and user needs to input just in the secret entrance After true checking password, the short message being hidden can be just seen.But under the scene that user is coerced by other people, user's input is correct Checking password after, other people can also read the hiding short message of user.
Disclosure
In order to solve the problem of Information Security is poor in correlation technique, present disclose provides a kind of method for information display, Information concealing method and device.The technical scheme is as follows:
According to the first aspect of the embodiment of the present disclosure there is provided a kind of method for information display, including:
Receive for being verified to the first kind that any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism is verified Operation, n >=2;
When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for Original information content is pretended;
Receive the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism;
When the Equations of The Second Kind verification operation is verified, the original information content is shown.
Optionally, the Equations of The Second Kind verification operation received for being verified to n-th layer authentication mechanism, including:
Receive the recessive verification operation for being verified to n-th layer authentication mechanism, using the recessive verification operation as The Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation is the checking entrance of non-dominant prompting.
Optionally, the recessive verification operation received for being verified to n-th layer authentication mechanism, including:
Default shake operation is received by sensor, the default shake operation is regard as the recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, the default gesture operation is regard as the recessive verification operation;
And/or,
Default voice messaging is received by microphone, the default voice messaging is regard as the recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, by the button operation of the default rule It is used as the recessive verification operation;
And/or,
Default tap is received by the touch-screen to operate, and regard the default percussion operation as the recessive checking behaviour Make.
Optionally, it is described when the first kind verification operation is verified, the display camouflage information content, including:
The first kind verification operation corresponding to i-th layer of authentication mechanism in preceding n-1 layers of authentication mechanism is verified When, show the camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤n-1.
Optionally, methods described also includes:
Obtain the display duration of the original information content;Detect whether the display duration got exceedes pre- timing It is long;If the display duration exceedes the scheduled duration, the n-layer authentication mechanism is reactivated;
And/or,
If when showing the original information content, receiving the trigger signal for interrupting display, then reactivating the n-layer Authentication mechanism.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of information concealing method, including:
N-layer authentication mechanism, n >=2 are set to original information content;
Preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism are set with the camouflage information content, the camouflage information is used for Shown when the preceding n-1 layers of authentication mechanism is verified.
Optionally, it is described to original information content setting n-layer authentication mechanism, including:
The preceding n-1 layers of authentication mechanism verified by first kind verification operation are set;
The n-th layer authentication mechanism verified by Equations of The Second Kind verification operation is set.
Optionally, described set passes through the n-th layer authentication mechanism that Equations of The Second Kind verification operation is verified, including:
The n-th layer authentication mechanism verified by recessive verification operation is set, and the recessive verification operation is as described Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation is the checking entrance of non-dominant prompting.
Optionally, the recessive verification operation includes:It is default shake operation, default gesture operation, default voice messaging, pre- If at least one of the button operation of rule and default percussion operation.
Optionally, the preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism set the camouflage information content, including:
The camouflage information content of the i-th layer of authentication mechanism corresponded in the preceding n-1 layers of authentication mechanism, 1≤i are set respectively ≤n-1。
Optionally, the camouflage that the i-th layer of authentication mechanism corresponded in the preceding n-1 layers of authentication mechanism is set respectively is believed Content is ceased, including:
The information content of system default is obtained, using the described information content got as corresponding to described i-th layer checking The camouflage information content of mechanism;
And/or,
Obtain the sensitive content in the original information content, will in the original information content except the sensitive content it Outer content is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
It is the information content that the original information content is set to receive user, using the described information content received as right The camouflage information content of i-th layer of authentication mechanism described in Ying Yu.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of information display device, including:
First operation receiving module, being configured as receiving was used for appointing in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism One layer of first kind verification operation for being verified, n >=2;
Pretend content display module, be configured as testing in the first kind for receiving the described first operation receiving module Demonstrate,prove operation demonstration by when, display camouflage the information content, the camouflage information content be used for original information content is pretended;
Second operation receiving module, is configured as receiving the Equations of The Second Kind checking for being used to verify n-th layer authentication mechanism Operation;
Original contents display module, is configured as testing in the Equations of The Second Kind for receiving the described second operation receiving module Demonstrate,prove operation demonstration by when, show the original information content.
Optionally, the second operation receiving module, being configured as receiving is used for what n-th layer authentication mechanism was verified Recessive verification operation, regard the recessive verification operation as the Equations of The Second Kind verification operation, the checking of the recessive verification operation Entrance is the checking entrance of non-dominant prompting.
Optionally, the second operation receiving module, is configured as:
Default shake operation is received by sensor, the default shake operation is regard as the recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, the default gesture operation is regard as the recessive verification operation;
And/or,
Default voice messaging is received by microphone, the default voice messaging is regard as the recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, by the button operation of the default rule It is used as the recessive verification operation;
And/or,
Default tap is received by the touch-screen to operate, and regard the default percussion operation as the recessive checking behaviour Make.
Optionally, the camouflage content display module, is configured as in preceding n-1 layers of authentication mechanism corresponding to i-th layer When the first kind verification operation of authentication mechanism is verified, the camouflage information content corresponding with i-th layer of authentication mechanism is shown, 1≤i≤n-1。
Optionally, described device also includes:
First trigger module, is configured as obtaining the display duration of the original information content;It is described that detection is got Show whether duration exceedes scheduled duration;If the display duration exceedes the scheduled duration, reactivate the n-layer and test Card mechanism;
And/or,
Second trigger module, if being configured as, when showing the original information content, receiving the triggering for interrupting display Signal, then reactivate the n-layer authentication mechanism.
According to the fourth aspect of the embodiment of the present disclosure there is provided a kind of information concealment device, including:
Authentication mechanism setup module, is configured as setting n-layer authentication mechanism, n >=2 to original information content;
Pretend curriculum offering module, be configured as the n-layer authentication mechanism set to the authentication mechanism setup module In preceding n-1 layers of authentication mechanism the camouflage information content is set, the camouflage information is used in the preceding n-1 layer authentication mechanism checking By when shown.
Optionally, the authentication mechanism setup module, including:
First sets submodule, is configured as setting the preceding n-1 layers of verification machine verified by first kind verification operation System;
Second sets submodule, is configured as setting the n-th layer authentication mechanism verified by Equations of The Second Kind verification operation.
Optionally, described second submodule is set, is configured as setting the n-th layer verified by recessive verification operation Authentication mechanism, the recessive verification operation is as the Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation The checking entrance of non-dominant prompting.
Optionally, the recessive verification operation includes:It is default shake operation, default gesture operation, default voice messaging, pre- If at least one of the button operation of rule and default percussion operation.
Optionally, the camouflage curriculum offering module, is configured to set corresponding to the preceding n-1 layers of authentication mechanism In i-th layer of authentication mechanism the camouflage information content, 1≤i≤n-1.
Optionally, the camouflage curriculum offering module, including:
3rd sets submodule, is configured as obtaining the information content of system default, by the described information content got It is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
4th sets submodule, is configured as obtaining the sensitive content in the original information content, by the original letter Content in breath content in addition to the sensitive content is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
5th sets submodule, and it is the information content that the original information content is set to be configured as receiving user, will be connect The described information content received is used as the camouflage information content corresponding to i-th layer of authentication mechanism.
According to the 5th of the embodiment of the present disclosure the aspect there is provided a kind of information display device, including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
Receive for being verified to the first kind that any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism is verified Operation, n >=2;
When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for Original information content is pretended;
Receive the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism;
When the Equations of The Second Kind verification operation is verified, the original information content is shown.
According to the 6th of the embodiment of the present disclosure the aspect there is provided a kind of information concealment device, including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
N-layer authentication mechanism, n >=2 are set to original information content;
Preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism are set with the camouflage information content, the camouflage information is used for Shown when the preceding n-1 layers of authentication mechanism is verified.
The technical scheme provided by this disclosed embodiment can include the following benefits:
By receiving the first kind verified to any layer authentication mechanism in preceding n-1 layers of authentication mechanism checking behaviour Make, and when being verified to first kind verification operation, the information content is pretended in only display;And receiving to n-th layer authentication mechanism The Equations of The Second Kind verification operation verified, and when being verified to Equations of The Second Kind verification operation, can just show original information content;Solution The problem of security of information is poor in correlation technique of having determined;Having reached can be by pretending the information content to original information content Pretended, and then make it that other people are difficult to know original information content, improve the effect of Information Security.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary, this can not be limited It is open.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the disclosure Example, and be used in specification to explain the principle of the disclosure together.
Fig. 1 is a kind of flow chart of method for information display according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of information concealing method according to another exemplary embodiment.
Fig. 3 is a kind of flow chart of method for information display according to another exemplary embodiment.
Fig. 4 is a kind of flow chart of method for information display according to another exemplary embodiment.
Fig. 5 is a kind of block diagram of information display device according to an exemplary embodiment.
Fig. 6 is a kind of block diagram of information display device according to another exemplary embodiment.
Fig. 7 is a kind of block diagram of information concealment device according to an exemplary embodiment.
Fig. 8 is a kind of block diagram of information concealment device according to another exemplary embodiment.
Fig. 9 is a kind of for presentation of information and the block diagram of the device of Information hiding according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of method for information display according to an exemplary embodiment, as shown in figure 1, the letter Breath display methods may comprise steps of.
In a step 101, receive for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism First kind verification operation, n >=2.
In a step 102, when first kind verification operation is verified, the display camouflage information content pretends the information content For pretending to original information content.
In step 103, the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received.
At step 104, when Equations of The Second Kind verification operation is verified, original information content is shown.
In summary, the method for information display provided in the embodiment of the present disclosure, by receiving to preceding n-1 layers of verification machine The first kind verification operation that any layer authentication mechanism in system is verified, and when being verified to first kind verification operation, only The display camouflage information content;And the Equations of The Second Kind verification operation verified to n-th layer authentication mechanism is being received, and to Equations of The Second Kind When verification operation is verified, original information content can be just shown;The security for solving information in correlation technique poor is asked Topic;Having reached can be pretended by pretending the information content to original information content, so cause other people be difficult know it is original The information content, improves the effect of Information Security.
Fig. 2 is a kind of flow chart of information concealing method according to an exemplary embodiment, as shown in Fig. 2 the letter Breath hidden method may comprise steps of.
In step 201, n-layer authentication mechanism, n >=2 are set to original information content.
In step 202., preceding n-1 layers of authentication mechanism in n-layer authentication mechanism are set with the camouflage information content, pretends information For being shown when preceding n-1 layers of authentication mechanism is verified.
In summary, the information concealing method provided in the embodiment of the present disclosure, by setting n-layer to test original information content Card mechanism, and the camouflage information content is set to preceding n-1 layers of authentication mechanism;Even if so that corresponding to preceding n-1 layers of authentication mechanism One class verification operation is known that other users can only also know the camouflage information pretended to original information content by other users Content, can not know real original information content;Solve the problem of Information Security is poor in correlation technique;Reach The effect of Information Security can be improved.
Fig. 3 is a kind of flow chart of method for information display according to an exemplary embodiment, as shown in figure 3, the letter Breath display methods may comprise steps of.
In step 301, n-layer authentication mechanism, n >=2 are set to original information content.
In step 302, preceding n-1 layers of authentication mechanism in n-layer authentication mechanism are set with the camouflage information content, pretends information For being shown when preceding n-1 layers of authentication mechanism is verified.
In step 303, receive for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism First kind verification operation, n >=2.
In step 304, when first kind verification operation is verified, the display camouflage information content pretends the information content For pretending to original information content.
In step 305, the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received.
Within step 306, when Equations of The Second Kind verification operation is verified, original information content is shown.
In summary, the method for information display provided in the embodiment of the present disclosure, by receiving to preceding n-1 layers of verification machine The first kind verification operation that any layer authentication mechanism in system is verified, and when being verified to first kind verification operation, only The display camouflage information content;And the Equations of The Second Kind verification operation verified to n-th layer authentication mechanism is being received, and to Equations of The Second Kind When verification operation is verified, original information content can be just shown;The security for solving information in correlation technique poor is asked Topic;Having reached can be pretended by pretending the information content to original information content, so cause other people be difficult know it is original The information content, improves the effect of Information Security.
Fig. 4 is a kind of flow chart of method for information display according to an exemplary embodiment, as shown in figure 4, the letter Breath display methods may comprise steps of.
In step 401, the preceding n-1 layers of authentication mechanism verified by first kind verification operation are set.
When user wants to be hidden some of terminal information, and then when avoiding other people from arbitrarily checking, user can be with Sequence of operations is performed in the terminal.Terminal, which receives to set for original information content after the sequence of operations of user, passes through first The preceding n-1 layers of authentication mechanism that class verification operation is verified.Wherein, n >=2, original information content can include short message, IMU At least one of letter information, notepad information, diary, mail, picture or video;The checking entrance of first kind verification operation The usually checking entrance of dominant prompting.
Such as, so that n is 3 as an example, terminal can set the first layer authentication mechanism verified by clear crytpographic key, and The 2nd layer of authentication mechanism verified by prearranged gesture is set.
When actually realizing, corresponding to each layer of authentication mechanism before terminal can sequentially be set in n-1 layers of authentication mechanism First kind verification operation, first corresponding to each layer of authentication mechanism can also set simultaneously before in n-1 layers of authentication mechanism Class verification operation, the present embodiment is not limited this.Also, each layer of authentication mechanism institute in preceding n-1 layers of authentication mechanism is right The first kind verification operation answered be can be the same or different, and the present embodiment is not also limited this.
In step 402, the n-th layer authentication mechanism verified by Equations of The Second Kind verification operation is set.
Terminal can set the n-th layer authentication mechanism verified by recessive verification operation, and recessive verification operation is made For Equations of The Second Kind verification operation, the checking entrance of recessive verification operation is the checking entrance of non-dominant prompting.Wherein, recessive checking behaviour Work includes:Preset shake operation, default gesture operation, default voice messaging, the button operation of default rule and default percussion At least one of operation.
Such as, terminal can be set by shaking the 3rd layer of authentication mechanism that the shake operation of terminal three times is verified.
It should be noted that this step can be the step of being performed under user triggers or terminal is performed automatically The step of, the present embodiment is not limited this.
In step 403, the camouflage information of the i-th layer of authentication mechanism corresponded in preceding n-1 layers of authentication mechanism is set respectively Content.
When being verified in order to avoid other people to the first kind verification operation corresponding to preceding n-1 layers of authentication mechanism, Ta Renke To browse original information content, the problem of threatening the information security of original information content, terminal can be set respectively correspond to before The camouflage information content of i-th layer of authentication mechanism in n-1 layers of authentication mechanism, is entered by pretending the information content to original information content Row camouflage.Wherein, the camouflage information content is used to pretend original information content, 1≤i≤n-1.
Terminal sets the method to set up for the camouflage information content for corresponding to i-th layer of authentication mechanism to include in following method At least one:
The first:
The information content of system default is obtained, the information content got is used as to the puppet corresponding to i-th layer of authentication mechanism Fill the information content;
Terminal can be with preset information contents, when terminal needs to set the camouflage information content for i-th layer of authentication mechanism, terminal Obtain systemic presupposition the information content, using the information content got as the camouflage information corresponding to i-th layer of authentication mechanism in Hold.
When actually realizing, terminal can be short message, notepad information, diary, instant messaging information or mail etc Original information content preset such as greeting, blessing language, the information content of polite expressions etc.Such as, for short message, eventually End can preset ' wishing that you are everyday happy ', ' wish you and your household is healthy, everything is just fine ', ' good morning ', ' I exists now It is meeting, busy to leave a message ' or ' I contacts with you later ' etc the information content.So, when terminal needs to set for short message When pretending the information content, terminal can regard above-mentioned default content as the camouflage information content corresponding to i-th layer of authentication mechanism.
Terminal can be declared for the default such as star's poster of original information content, cinema promotional poster, the commodity of picture etc The image content of leaflet, animal picture or landscape figure etc.When terminal needs to set the camouflage information content for picture, terminal It can be the camouflage information content corresponding to i-th layer of authentication mechanism by above-mentioned default curriculum offering.
Terminal can preset the letter of such as propaganda film, MV or star's interview etc for the original information content of video etc Cease content.When terminal needs to set the camouflage information content for video, default the above can be set to correspondence by terminal In the camouflage information content of i-th layer of authentication mechanism.
Second:
Obtain original information content in sensitive content, using the content in original information content in addition to sensitive content as Corresponding to the camouflage information content of i-th layer of authentication mechanism;
When original information content is short message, notepad information, instant messaging information or mail, terminal can extract it In sensitive information, the information in addition to sensitive information is determined as corresponding to the camouflage information content of i-th layer of authentication mechanism.
Such as, when original information content is the notepad information comprising bank's card number and password, terminal can extract note Bank's card number and password in this information of thing, using the content in notepad information in addition to bank's card number and password as corresponding to The camouflage information content of i-th layer of authentication mechanism;When original information content is the payroll that Corporate Finance is sent by mail, Terminal can extract that the amount of money in salary bill is detailed, and the information in salary bill in addition to the amount of money extracted is detailed is defined as pair Should be in the camouflage information content of i-th layer of authentication mechanism.
When original information content is picture, terminal can recognize the destination object in picture, target pair will be removed in picture Content as outside is determined as corresponding to the camouflage information content of i-th layer of authentication mechanism.Wherein, the destination object can be user The object or terminal marked in advance extracts the object determined according to each stored picture.
When original information content is video, terminal can extract the target fragment in video, target patch will be removed in video Content outside section is determined as corresponding to the camouflage information content of i-th layer of authentication mechanism.Wherein, target fragment can be pre- for user The fragment that the fragment or terminal first marked is automatically extracted according to video content, the present embodiment is not limited this.
When actually realizing, terminal can also directly extract the regular content in original information content, normal by what is extracted Rule content is used as the camouflage information content corresponding to i-th layer of authentication mechanism.Wherein, regular content refers to that the information content carried is less Or for a user be not private information content.
Such as, when the text envelope that original information content is such as short message, notepad information or instant messaging information etc During breath, terminal can obtain the regular content in original information content by semantic analysis, and the regular content that analysis is obtained is made For the camouflage information content of i-th layer of authentication mechanism.Such as, greeting, blessing language and the polite expressions in text message are extracted.
When original information content is mail, terminal can extract the regular content in mail, such as greeting, blessing The content of language, signature or polite expressions etc, using the content extracted as the camouflage information corresponding to i-th layer of authentication mechanism in Hold.
When original information content is picture, terminal can be carried out to the sensitive action in picture or sensitive objects automatically Hide, and then only show the content after hiding.
When original information content is video, terminal can extract landscape fragment or cuisines fragment in video, will carry The fragment got is used as the camouflage information content corresponding to i-th layer of authentication mechanism.
The third:
It is the information content that original information content is set to receive user, using the information content received as corresponding to i-th The camouflage information content of layer authentication mechanism.
When needing to set the camouflage information content for i-th layer of authentication mechanism, user can input customized in the terminal Content, terminal is received after user-defined content, using the information content received as corresponding to i-th layer of authentication mechanism The camouflage information content.
It should be noted is that, terminal be the camouflage information content that sets of every layer of authentication mechanism can with it is identical can not also Together, the present embodiment is not limited this.
Need explanation on the other hand, the present embodiment is simply first carried out after step 402 exemplified by execution step 403 by terminal, When actually realizing, terminal can also perform step 402 and step 403 simultaneously, or first carry out step is performed after step 403 402, it is only necessary to ensure that step 401 is performed to step 403 before step 404, its actual execution sequence is not limited It is fixed.
In step 404, receive for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism First kind verification operation, n >=2.
When user wants the information content hidden in browsing terminal, user can input in the terminal to be verified to i-th layer The first kind verification operation that mechanism is verified, accordingly, terminal can receive verified to i-th layer of authentication mechanism One class verification operation.Wherein, i initial value is 1, and i is the integer less than or equal to n-1.
Such as, when first layer authentication mechanism is encrypted using Crypted password, user can input to correspond in the terminal to be added The clear crytpographic key of password;Terminal receives the clear crytpographic key of user's input accordingly.Similar, when second layer authentication mechanism is used When encrypting gesture encryption, user can apply gesture decryption oprerations corresponding with encryption gesture in the terminal;Terminal can be corresponding Receive gesture decryption oprerations.
When actually realizing, terminal can show the checking entrance for pointing out first kind verification operation, and user checks To after checking entrance, into checking entrance, apply first kind verification operation, terminal receives first kind verification operation accordingly, The present embodiment is not limited this.
In step 405, the first kind verification operation of i-th layer of authentication mechanism is corresponded in preceding n-1 layers of authentication mechanism When being verified, the camouflage information content corresponding with i-th layer of authentication mechanism is shown.
When terminal receives the first kind verification operation for being verified to i-th layer of authentication mechanism, terminal can be docked The first kind verification operation received is verified, when being verified, and is shown in camouflage information corresponding with i-th layer of authentication mechanism Hold.Wherein, the camouflage information content is used to pretend original information content.
Such as, terminal receives the clear crytpographic key corresponding to first layer authentication mechanism, then terminal can detect what is received Whether clear crytpographic key is correct, if correctly, the camouflage information content of the display corresponding to first layer authentication mechanism.
Needing at first point of explanation is, when terminal receives the first kind verification operation corresponding to i-th layer of authentication mechanism, eventually End can be verified to the first kind verification operation corresponding to i-th layer of authentication mechanism received, when being verified, display Corresponding to the camouflage information content of i-th layer of authentication mechanism.Hereafter, by i+1, when user continues to correspond to i-th layer of verification machine During the first kind verification operation of system, terminal can perform the first kind verification operation for receiving and corresponding to i-th layer of authentication mechanism again, The first kind verification operation corresponding to i-th layer of authentication mechanism received is verified, if the verification passes, then correspondence is shown In i-th layer of the camouflage information content.
Needing the second point of explanation is, if terminal-pair first kind verification operation authentication failed, flow terminates, this implementation Example will not be repeated here.
Need explanation be thirdly, in i<During n-1, user can also select not continuing to first kind verification operation, Now flow will terminate, and the present embodiment is not also repeated this.
In a step 406, the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received.
After terminal shows the camouflage information content corresponding to (n-1)th layer of authentication mechanism, user can be performed to n-th layer The Equations of The Second Kind verification operation that authentication mechanism is verified.Accordingly, terminal can receive Equations of The Second Kind verification operation.
When actually realizing, this step can include:Receive the recessiveness checking for being verified to n-th layer authentication mechanism Operation, using recessive verification operation as Equations of The Second Kind verification operation, the checking entrance of recessive verification operation is testing for non-dominant prompting Demonstrate,prove entrance.
Because recessive verification operation can include default shake operation, default gesture operation, default voice messaging, default rule At least one of the button operation of rule and default percussion operation, so according to the difference of recessive verification operation, terminal is received The method of reseptance of recessive verification operation for being verified to n-th layer authentication mechanism can include at least one in following method Kind:
The first:
Default shake operation is received by sensor, default shake operation is regard as recessive verification operation;
When user is shaken in terminal according to default shake operation, terminal can be received default shake by sensor and be grasped Make, terminal regard default shake operation as recessive verification operation.Wherein, shake operation can be traditional shake operation, also may be used To be that user grips the shake operation that terminal makes certain gesture, it can also be that user inverts the reverse turn operation of terminal, this implementation Example is not limited this.
Such as, when user shakes No. three mobile phones, terminal can be received by sensor shakes the shake operation of three times. When user, which grips mobile phone, makes the operation drawn a circle, terminal can receive operation of drawing a circle by sensor.When user grips hand When machine draws one ' check mark ', terminal can receive the operation by sensor.When user inverts mobile phone, mobile phone can To receive the reverse turn operation by sensor.
The present embodiment simply so that default shake operation is above-mentioned several operations as an example, when actually realizing, is preset and shakes behaviour Make not limiting this for other operations, the present embodiment.
Second:
Default gesture operation is received by touch-screen, default gesture operation is regard as recessive verification operation;
The third:
Default voice messaging is received by microphone, default voice messaging is regard as recessive verification operation;
User can also say default sentence against terminal microphone, accordingly, and terminal can receive pre- by microphone If voice messaging.
4th kind:
The button operation of default rule is received by physical button or virtual key, using the button operation of default rule as Recessive verification operation;
User can also with preset rule press terminal in physical button, or pressing terminal by dummy keyboard to The virtual key that family is provided.Such as, terminal presses numerical key ' 1 ' and numerical key ' 9 ' simultaneously.
5th kind:
Default tap is received by touch-screen to operate, and regard default percussion operation as recessive verification operation.
User can also tap terminal screen, such as, 3 terminal screens of user's adopting consecutive click chemical reaction according to default percussion rule.
In step 407, when Equations of The Second Kind verification operation is verified, original information content is shown.
When terminal receives Equations of The Second Kind verification operation, terminal can be verified to Equations of The Second Kind verification operation, if to Two class verification operations are verified, then terminal can show original information content.
Terminal can detect whether the Equations of The Second Kind verification operation received matches with default Equations of The Second Kind verification operation, if Matching, it is determined that be verified to Equations of The Second Kind verification operation, conversely, then authentication failed.
In an application scenarios of the present embodiment, in order to avoid forgeing the bank card password of oneself, and then band is used It is inconvenient to come, and Xiao Ming creates the notepad information of be stored with bank's card number and password in mobile phone notepad.Then in order to avoid hand When machine is stolen, other people view this notepad information, and then cause property loss, and Xiao Ming is provided with to this notepad information 2 layers of authentication mechanism.Wherein, first layer authentication mechanism is provided with gesture checking, and second layer authentication mechanism is provided with speech verification;And ' No. 8.10 small younger sister's birthdays that first layer authentication mechanism is set by user, remember to buy present ' pretended.So, even if other people Mobile phone is found, has been hit it encryption gesture by the cut in screen, and first layer authentication mechanism is verified, other people also can only See the camouflage information content of first layer authentication mechanism, and the bank's card number and password of oneself can not be viewed;And other people View after the information content, other people typically will be considered that the content is exactly the initial content of this notepad information, thus abandon after Continuous decryption, improves the information security of notepad information.Even if other people know also need to further checking, but be due to mobile phone simultaneously The checking entrance verified to final step will not be shown, other people can not also continue checking, further ensure information security.
In another application scenarios of the present embodiment, little Hua is in order to prevent the short message record of oneself and lover from being looked into by other people See, little Hua is provided with 3 layers of checking to short message record, first layer authentication mechanism is password authentification, and second layer authentication mechanism is gesture Checking, third layer authentication mechanism is verified for combination button, and first layer authentication mechanism and second layer authentication mechanism pass through camouflage The information content is pretended to short message record.Then when other people are using little Hua mobile phones and attempt out of curiosity to hiding short message When being verified, even if other people may be verified to first layer authentication mechanism, but it can only also view in the information of camouflage Hold, and real camouflage content can not be viewed;And other people also differ and surely continue to be verified second layer authentication mechanism, Even if other people are also verified in the case of minimum probability to second layer authentication mechanism, then the content that he sees is still pseudo- The information content of dress, and it is not the true content of short message record, improve the safety of short message record.Simultaneously as third layer Authentication mechanism is using recessive verification operation, and terminal does not provide checking entrance, so not knowing that also third layer is tested in advance at other people During card, the content for thinking currently to show that other people can very certainly is the true content of short message, further increases information peace Entirely.
It should be added that, step 404 to step 407 can be the step of step 403 is performed one time afterwards, also may be used Multiple step is performed with the Posterior circle for being step 403, the present embodiment is not limited this.
In summary, the method for information display provided in the embodiment of the present disclosure, by receiving to preceding n-1 layers of verification machine The first kind verification operation that any layer authentication mechanism in system is verified, and when being verified to first kind verification operation, only The display camouflage information content;And the Equations of The Second Kind verification operation verified to n-th layer authentication mechanism is being received, and to Equations of The Second Kind When verification operation is verified, original information content can be just shown;The security for solving information in correlation technique poor is asked Topic;Having reached can be pretended by pretending the information content to original information content, so cause other people be difficult know it is original The information content, improves the effect of Information Security.
Under normal circumstances, user is conducted interviews checking to hiding content, and terminal is shown after corresponding content, Yong Hudou Will be considered that the content now shown is exactly hiding content, so the present embodiment is by setting n-layer authentication mechanism to encrypt, and it is preceding N-1 layers of authentication mechanism pretend original information content using the camouflage information content, even if having reached that other users coerce user's sheet People verifies that other users can not also view the true content in original information content, improve letter to hiding content Cease the security of content.
Meanwhile, the present embodiment is verified by being set to last layer of authentication mechanism by recessive verification operation, recessive The checking entrance of verification operation is the checking entrance of non-dominant prompting so that other users are to the of preceding n-1 layers of authentication mechanism After the checking of one class checking information, other users can not also know also one layer checking, further increase the safety of the information content.
It should be noted that after terminal shows original information content, terminal can also carry out in following steps extremely A few step:
First, obtain the display duration of original information content;Detect whether the display duration got exceedes scheduled duration; If showing that duration exceedes scheduled duration, n-layer authentication mechanism is reactivated;
When terminal starts display original information content, terminal can record the display duration of original information content, and in fact When detection record display duration whether exceed scheduled duration such as ' 30S ', when testing result be more than scheduled duration when, terminal User can be asked to verify again.When actually realizing, terminal can show the checking entrance of first kind verification operation, work as user Apply the first kind verification operation verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism, accordingly, Terminal can reactivate n-layer authentication mechanism.So, avoid user and checked that hiding original information content is forgotten to exit When, the problem of original information content that terminal is shown is stolen a glance at by other people.
Second, if when showing original information content, receiving the trigger signal for interrupting display, then reactivating n-layer and test Card mechanism.
Wherein, the trigger signal for interrupting display can be the request signal of new calling incoming call or user under Informing is drawn to switch to the switching signal at other interfaces from informing.
Such as, when terminal shows original information content, when having new calling incoming call and end of calling, terminal will show the The checking entrance of one class verification operation, when any layer in preceding n-1 layers of authentication mechanism during user applies to n-layer authentication mechanism is carried out During the first kind verification operation of checking, terminal reactivates n-layer authentication mechanism.
It is similar, when user is by pulling down informing, and then check new message, after new instant messaging information, terminal The checking entrance of first kind verification operation can be shown, when in preceding n-1 layers of authentication mechanism during user applies to n-layer authentication mechanism During the first kind verification operation that any layer is verified, terminal can reactivate n-layer authentication mechanism.
When actually realizing, when user exits the display of original information content, and want to check original information content again When, terminal, which still needs, reactivates n-layer authentication mechanism.
Following is disclosure device embodiment, can be used for performing method of disclosure embodiment.It is real for disclosure device The details not disclosed in example is applied, method of disclosure embodiment is refer to.
Fig. 5 is a kind of block diagram of information display device according to an exemplary embodiment, as shown in figure 5, the information Display device can include but is not limited to:First operation receiving module 510, the camouflage operation of content display module 520, second are received Module 530 and original contents display module 540.
First operation receiving module 510, being configured as receiving is used in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism The first kind verification operation verified of any layer, n >=2;
Pretend content display module 520, be configured as verifying in the first kind for receiving the first operation receiving module 510 Operation demonstration by when, display camouflage the information content, camouflage the information content be used for original information content is pretended;
Second operation receiving module 530, being configured as receiving is used to test the Equations of The Second Kind that n-th layer authentication mechanism is verified Card operation;
Original contents display module 540, is configured as verifying in the Equations of The Second Kind for receiving the second operation receiving module 530 Operation demonstration by when, show original information content.
In summary, the information display device provided in the embodiment of the present disclosure, by receiving to appointing in first n-1 layers One layer of first kind verification operation for being verified, and when being verified to first kind verification operation, only the display camouflage information content; And the Equations of The Second Kind verification operation verified to n-th layer is being received, and when being verified to Equations of The Second Kind verification operation, can just show Show original information content;Solve information in correlation technique security it is poor the problem of;Having reached can be by pretending information Content is pretended to original information content, and then make it that other people are difficult to know original information content, improves Information Security Effect.
Fig. 6 is a kind of block diagram of information display device according to an exemplary embodiment, as shown in fig. 6, the information Display device can include but is not limited to:First operation receiving module 610, the camouflage operation of content display module 620, second are received Module 630 and original contents display module 640.
First operation receiving module 610, being configured as receiving is used in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism The first kind verification operation verified of any layer, n >=2;
Pretend content display module 620, be configured as verifying in the first kind for receiving the first operation receiving module 610 Operation demonstration by when, display camouflage the information content, camouflage the information content be used for original information content is pretended;
Second operation receiving module 630, being configured as receiving is used to test the Equations of The Second Kind that n-th layer authentication mechanism is verified Card operation;
Original contents display module 640, is configured as verifying in the Equations of The Second Kind for receiving the second operation receiving module 630 Operation demonstration by when, show original information content.
Optionally, the second operation receiving module 630, being configured as receiving is used for what n-th layer authentication mechanism was verified Recessive verification operation, using recessive verification operation as Equations of The Second Kind verification operation, the checking entrance of recessive verification operation is non-dominant The checking entrance of prompting.
Optionally, the second operation receiving module 630, is configured as:
Default shake operation is received by sensor, default shake operation is regard as recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, default gesture operation is regard as recessive verification operation;
And/or,
Default voice messaging is received by microphone, default voice messaging is regard as recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, using the button operation of default rule as Recessive verification operation;
And/or,
Default tap is received by touch-screen to operate, and regard default percussion operation as recessive verification operation.
Optionally, pretend content display module 620, be configured as in preceding n-1 layers of authentication mechanism testing corresponding to i-th layer When the first kind verification operation of card mechanism is verified, the display camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤ n-1。
Optionally, device also includes:
First trigger module 650, is configured as obtaining the display duration of original information content;When detecting the display got It is long whether to exceed scheduled duration;If showing that duration exceedes scheduled duration, n-layer authentication mechanism is restarted;
And/or,
Second trigger module 660, if being configured as when showing original information content, receives the triggering letter for interrupting display Number, then reactivate n-layer authentication mechanism.
In summary, the information display device provided in the embodiment of the present disclosure, by receiving to appointing in first n-1 layers One layer of first kind verification operation for being verified, and when being verified to first kind verification operation, only the display camouflage information content; And the Equations of The Second Kind verification operation verified to n-th layer is being received, and when being verified to Equations of The Second Kind verification operation, can just show Show original information content;Solve information in correlation technique security it is poor the problem of;Having reached can be by pretending information Content is pretended to original information content, and then make it that other people are difficult to know original information content, improves Information Security Effect.
Under normal circumstances, user is conducted interviews checking to hiding content, and terminal is shown after corresponding content, Yong Hudou Will be considered that the content now shown is exactly hiding content, so the present embodiment is by setting n-layer to encrypt, and first n-1 layers makes Pretend original information content with the camouflage information content, even if having reached that other users stress user enters to hiding content Row checking, other users can not also view the true content in original information content, improve the security of the information content.
Meanwhile, the present embodiment is verified by being set to last layer by recessive verification operation, recessive verification operation Checking entrance be non-dominant prompting checking entrance so that other users are before progress after n-1 layers of checking, other users Also one layer checking can not be known, the safety of the information content is further increased.
Fig. 7 is a kind of block diagram of information concealment device according to another exemplary embodiment, as shown in fig. 7, the letter Breath concealing device can include but is not limited to:Authentication mechanism setup module 710 and camouflage curriculum offering module 720;
Authentication mechanism setup module 710, is configured as setting n-layer authentication mechanism, n >=2 to original information content;
Pretend curriculum offering module 720, be configured as in the n-layer authentication mechanism to the setting of authentication mechanism setup module 710 Preceding n-1 layers of authentication mechanism set camouflage the information content, camouflage information be used for carried out when preceding n-1 layers of authentication mechanism is verified It has been shown that, the camouflage information content is used to pretend original information content.
In summary, the information concealment device provided in the embodiment of the present disclosure, by setting n-layer to test original information content Card mechanism, and the camouflage information content is set to preceding n-1 layers of authentication mechanism;Even if so that corresponding to preceding n-1 layers of authentication mechanism One class verification operation is known that other users can only also know the camouflage information pretended to original information content by other users Content, can not know real original information content;Solve the problem of Information Security is poor in correlation technique;Reach The effect of Information Security can be improved.
Fig. 8 is a kind of block diagram of information concealment device according to another exemplary embodiment, as shown in figure 8, the letter Breath concealing device can include but is not limited to:Authentication mechanism setup module 810 and camouflage curriculum offering module 820;
Authentication mechanism setup module 810, is configured as setting n-layer authentication mechanism, n >=2 to original information content;
Pretend curriculum offering module 820, be configured as in the n-layer authentication mechanism to the setting of authentication mechanism setup module 810 Preceding n-1 layers of authentication mechanism set camouflage the information content, camouflage information be used for carried out when preceding n-1 layers of authentication mechanism is verified It has been shown that, the camouflage information content is used to pretend original information content.
Optionally, authentication mechanism setup module 810, including:
First sets submodule 811, is configured as setting the preceding n-1 layers of checking verified by first kind verification operation Mechanism;
Second sets submodule 812, is configured as setting the n-th layer verification machine verified by Equations of The Second Kind verification operation System.
Optionally, second submodule 812 is set, is configured as setting the n-th layer verified by recessive verification operation Authentication mechanism, using recessive verification operation as Equations of The Second Kind verification operation, the checking entrance of recessive verification operation is non-dominant prompting Checking entrance.
Optionally, recessive verification operation includes:Default shake operation, default gesture operation, default voice messaging, default rule At least one of the button operation of rule and default percussion operation.
Optionally, camouflage curriculum offering module 820, is configured to set corresponding in preceding n-1 layers of authentication mechanism The camouflage information content of i-th layer of authentication mechanism, 1≤i≤n-1.
Optionally, camouflage curriculum offering module 820, including:
3rd sets submodule 821, is configured as obtaining the information content of system default, the information content got is made For the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
4th sets submodule 822, is configured as obtaining the sensitive content in original information content, by original information content In content in addition to sensitive content be used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
5th sets submodule 823, and it is the information content that original information content is set to be configured as receiving user, will be received The information content arrived is used as the camouflage information content corresponding to i-th layer of authentication mechanism.
In summary, the information concealment device provided in the embodiment of the present disclosure, by setting n-layer to test original information content Card mechanism, and the camouflage information content is set to preceding n-1 layers of authentication mechanism;Even if so that corresponding to preceding n-1 layers of authentication mechanism One class verification operation is known that other users can only also know the camouflage information pretended to original information content by other users Content, can not know real original information content;Solve the problem of Information Security is poor in correlation technique;Reach The effect of Information Security can be improved.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
Fig. 9 is a kind of for presentation of information and the frame of the device 900 of Information hiding according to an exemplary embodiment Figure.For example, device 900 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console is put down Board device, Medical Devices, body-building equipment, personal digital assistant etc..
Reference picture 9, device 900 can include following one or more assemblies:Processing assembly 902, memory 904, power supply Component 906, multimedia groupware 908, audio-frequency assembly 910, the interface 912 of input/output (I/O), sensor cluster 914, and Communication component 916.
The integrated operation of the usual control device 900 of processing assembly 902, such as with display, call, data communication, phase Machine operates the operation associated with record operation.Processing assembly 902 can refer to including one or more processors 918 to perform Order, to complete all or part of step of above-mentioned method.In addition, processing assembly 902 can include one or more modules, just Interaction between processing assembly 902 and other assemblies.For example, processing assembly 902 can include multi-media module, it is many to facilitate Interaction between media component 908 and processing assembly 902.
Memory 904 is configured as storing various types of data supporting the operation in device 900.These data are shown Example includes the instruction of any application program or method for being operated on device 900, and contact data, telephone book data disappears Breath, picture, video etc..Memory 904 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable to compile Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash Device, disk or CD.
Power supply module 906 provides electric power for the various assemblies of device 900.Power supply module 906 can include power management system System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 900.
Multimedia groupware 908 is included in the screen of one output interface of offer between described device 900 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detection touches or slide related duration and pressure with described.In certain embodiments, many matchmakers Body component 908 includes a front camera and/or rear camera.When device 900 be in operator scheme, such as screening-mode or During video mode, front camera and/or rear camera can receive the multi-medium data of outside.Each front camera and Rear camera can be a fixed optical lens system or with focusing and optical zoom capabilities.
Audio-frequency assembly 910 is configured as output and/or input audio signal.For example, audio-frequency assembly 910 includes a Mike Wind (MIC), when device 900 be in operator scheme, when such as call model, logging mode and speech recognition mode, microphone by with It is set to reception external audio signal.The audio signal received can be further stored in memory 904 or via communication set Part 916 is sent.In certain embodiments, audio-frequency assembly 910 also includes a loudspeaker, for exports audio signal.
I/O interfaces 912 is provide interface between processing assembly 902 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 914 includes one or more sensors, and the state for providing various aspects for device 900 is commented Estimate.For example, sensor cluster 914 can detect opening/closed mode of device 900, the relative positioning of component is for example described Component is the display and keypad of device 900, and sensor cluster 914 can be with 900 1 components of detection means 900 or device Position change, the existence or non-existence that user contacts with device 900, the orientation of device 900 or acceleration/deceleration and device 900 Temperature change.Sensor cluster 914 can include proximity transducer, be configured to detect in not any physical contact The presence of neighbouring object.Sensor cluster 914 can also include optical sensor, such as CMOS or ccd image sensor, for into As being used in application.In certain embodiments, the sensor cluster 914 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 916 is configured to facilitate the communication of wired or wireless way between device 900 and other equipment.Device 900 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation In example, communication component 916 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 916 also includes near-field communication (NFC) module, to promote junction service.Example Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 900 can be believed by one or more application specific integrated circuits (ASIC), numeral Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 904 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 918 of device 900.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (24)

1. a kind of method for information display, it is characterised in that methods described includes:
The first kind verification operation for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism is received, N >=2, the checking entrance of the first kind verification operation is the checking entrance of dominant prompting;
When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for original The beginning information content is pretended;
The Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received, the Equations of The Second Kind verification operation is recessiveness Verification operation;
When the Equations of The Second Kind verification operation is verified, the original information content is shown.
2. according to the method described in claim 1, it is characterised in that described to receive for being verified to n-th layer authentication mechanism Equations of The Second Kind verification operation, including:
The recessive verification operation for being verified to n-th layer authentication mechanism is received, using the recessive verification operation as described Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation is the checking entrance of non-dominant prompting.
3. method according to claim 2, it is characterised in that the reception is used for what is verified to n-th layer authentication mechanism Recessive verification operation, including:
Default shake operation is received by sensor, the default shake operation is regard as the recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, the default gesture operation is regard as the recessive verification operation;
And/or,
Default voice messaging is received by microphone, the default voice messaging is regard as the recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, using the button operation of the default rule as The recessive verification operation;
And/or,
Default tap is received by the touch-screen to operate, and regard the default percussion operation as the recessive verification operation.
4. according to the method described in claim 1, it is characterised in that described when the first kind verification operation is verified, The display camouflage information content, including:
When the first kind verification operation in preceding n-1 layers of authentication mechanism corresponding to i-th layer of authentication mechanism is verified, show Show the camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤n-1.
5. according to any described method of Claims 1-4, it is characterised in that methods described also includes:
Obtain the display duration of the original information content;Detect whether the display duration got exceedes scheduled duration; If the display duration exceedes the scheduled duration, the n-layer authentication mechanism is reactivated;
And/or,
If when showing the original information content, receiving the trigger signal for interrupting display, then the n-layer checking is reactivated Mechanism.
6. a kind of information concealing method, it is characterised in that methods described includes:
The preceding n-1 layers of authentication mechanism verified by first kind verification operation, the checking of the first kind verification operation are set Entrance is the checking entrance of dominant prompting, n >=2;
The n-th layer authentication mechanism verified by Equations of The Second Kind verification operation is set, and the Equations of The Second Kind verification operation is tested for recessiveness Card operation;
Preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism are set with the camouflage information content, the camouflage information is used in institute Shown when n-1 layers of authentication mechanism are verified before stating, the camouflage information content is used to carry out puppet to original information content Dress.
7. method according to claim 6, it is characterised in that the setting is verified by Equations of The Second Kind verification operation N-th layer authentication mechanism, including:
The n-th layer authentication mechanism verified by recessive verification operation is set, the recessive verification operation is regard as described the Two class verification operations, the checking entrance of the recessive verification operation is the checking entrance of non-dominant prompting.
8. method according to claim 7, it is characterised in that the recessive verification operation includes:It is default shake operation, pre- If at least one of gesture operation, default voice messaging, the button operation of default rule and default percussion operation.
9. method according to claim 6, it is characterised in that the preceding n-1 layers of checking in the n-layer authentication mechanism Mechanism sets the camouflage information content, including:
The camouflage information content of the i-th layer of authentication mechanism corresponded in the preceding n-1 layers of authentication mechanism, 1≤i≤n- are set respectively 1。
10. method according to claim 9, it is characterised in that described set respectively corresponds to the preceding n-1 layers of verification machine The camouflage information content of i-th layer of authentication mechanism in system, including:
The information content of system default is obtained, using the described information content got as corresponding to i-th layer of authentication mechanism The camouflage information content;
And/or,
Obtain the sensitive content in the original information content, by the original information content in addition to the sensitive content Content is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
Receive user be the original information content set the information content, using the described information content received as corresponding to The camouflage information content of i-th layer of authentication mechanism.
11. a kind of information display device, it is characterised in that described device includes:
First operation receiving module, being configured as receiving is used for any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism The first kind verification operation verified, n >=2, the checking entrance of the first kind verification operation enters for the checking of dominant prompting Mouthful;
Pretend content display module, be configured as verifying in the first kind for receiving the described first operation receiving module and grasp When being verified, the display camouflage information content, the camouflage information content is used to pretend original information content;
Second operation receiving module, is configured as receiving the Equations of The Second Kind checking behaviour for being used to verify n-th layer authentication mechanism Make, the Equations of The Second Kind verification operation is recessive verification operation;
Original contents display module, is configured as verifying in the Equations of The Second Kind for receiving the described second operation receiving module and grasps When being verified, the original information content is shown.
12. device according to claim 11, it is characterised in that
The second operation receiving module, is configured as receiving the recessive checking behaviour for being used to verify n-th layer authentication mechanism Make, using the recessive verification operation as the Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation is non-aobvious Property prompting checking entrance.
13. device according to claim 12, it is characterised in that the second operation receiving module, is configured as:
Default shake operation is received by sensor, the default shake operation is regard as the recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, the default gesture operation is regard as the recessive verification operation;
And/or,
Default voice messaging is received by microphone, the default voice messaging is regard as the recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, using the button operation of the default rule as The recessive verification operation;
And/or,
Default tap is received by the touch-screen to operate, and regard the default percussion operation as the recessive verification operation.
14. device according to claim 11, it is characterised in that
The camouflage content display module, is configured as corresponding in preceding n-1 layers of authentication mechanism the institute of i-th layer of authentication mechanism When stating first kind verification operation and being verified, the camouflage information content corresponding with i-th layer, 1≤i≤n-1 are shown.
15. according to any described device of claim 11 to 14, it is characterised in that described device also includes:
First trigger module, is configured as obtaining the display duration of the original information content;Detect the display got Whether duration exceedes scheduled duration;If the display duration exceedes the scheduled duration, the n-layer verification machine is reactivated System;
And/or,
Second trigger module, if being configured as, when showing the original information content, receiving the trigger signal for interrupting display, Then reactivate the n-layer authentication mechanism.
16. a kind of information concealment device, it is characterised in that described device includes:
Authentication mechanism setup module, is configured as setting the preceding n-1 layers of authentication mechanism verified by first kind verification operation, The checking entrance of the first kind verification operation is the checking entrance of dominant prompting, n >=2;
The authentication mechanism setup module, is additionally configured to set the n-th layer verified by Equations of The Second Kind verification operation to verify Mechanism, the Equations of The Second Kind verification operation is recessive verification operation;
Pretend curriculum offering module, be configured as in the n-layer authentication mechanism to authentication mechanism setup module setting Preceding n-1 layers of authentication mechanism sets the camouflage information content, and the camouflage information is used to be verified in the preceding n-1 layers of authentication mechanism Shi Jinhang shows that the camouflage information content is used to pretend original information content.
17. device according to claim 16, it is characterised in that
The authentication mechanism setup module, is additionally configured to set the n-th layer verification machine verified by recessive verification operation System, the recessive verification operation is as the Equations of The Second Kind verification operation, and the checking entrance of the recessive verification operation is non-dominant The checking entrance of prompting.
18. device according to claim 17, it is characterised in that the recessive verification operation includes:Default shake operation, At least one of default gesture operation, default voice messaging, the button operation of default rule and default percussion operation.
19. device according to claim 16, it is characterised in that
The camouflage curriculum offering module, is configured to set i-th layer corresponded in the preceding n-1 layers of authentication mechanism to test The camouflage information content of card mechanism, 1≤i≤n-1.
20. device according to claim 19, it is characterised in that the camouflage curriculum offering module, including:
3rd set submodule, be configured as obtain system default the information content, using the described information content got as Corresponding to the camouflage information content of i-th layer of authentication mechanism;
And/or,
4th sets submodule, is configured as obtaining the sensitive content in the original information content, by the raw information Content in appearance in addition to the sensitive content is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
5th sets submodule, and it is the information content that the original information content is set to be configured as receiving user, will be received Described information content be used as the camouflage information content corresponding to i-th layer of authentication mechanism.
21. a kind of information display device, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The first kind verification operation for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism is received, N >=2, the checking entrance of the first kind verification operation is the checking entrance of dominant prompting;
When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for original The beginning information content is pretended;
The Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received, the Equations of The Second Kind verification operation is recessiveness Verification operation;
When the Equations of The Second Kind verification operation is verified, the original information content is shown.
22. a kind of information concealment device, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The preceding n-1 layers of authentication mechanism verified by first kind verification operation, the checking of the first kind verification operation are set Entrance is the checking entrance of dominant prompting, n >=2;
The n-th layer authentication mechanism verified by Equations of The Second Kind verification operation is set, and the Equations of The Second Kind verification operation is tested for recessiveness Card operation;
Preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism are set with the camouflage information content, the camouflage information is used in institute Shown when n-1 layers of authentication mechanism are verified before stating.
23. be stored with computer program, its feature on a kind of computer-readable recording medium, the computer-readable recording medium It is, the computer program realizes method for information display as claimed in claim 1 when being executed by processor.
24. be stored with computer program, its feature on a kind of computer-readable recording medium, the computer-readable recording medium It is, the computer program realizes information concealing method as claimed in claim 6 when being executed by processor.
CN201410429501.1A 2014-08-27 2014-08-27 Method for information display, information concealing method and device Active CN104219053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410429501.1A CN104219053B (en) 2014-08-27 2014-08-27 Method for information display, information concealing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410429501.1A CN104219053B (en) 2014-08-27 2014-08-27 Method for information display, information concealing method and device

Publications (2)

Publication Number Publication Date
CN104219053A CN104219053A (en) 2014-12-17
CN104219053B true CN104219053B (en) 2017-11-07

Family

ID=52100217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410429501.1A Active CN104219053B (en) 2014-08-27 2014-08-27 Method for information display, information concealing method and device

Country Status (1)

Country Link
CN (1) CN104219053B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017028141A1 (en) * 2015-08-16 2017-02-23 张焰焰 Method and mobile terminal for logging in to account
CN106897873A (en) * 2015-12-21 2017-06-27 阿里巴巴集团控股有限公司 A kind of frame display methods and device
CN106896996B (en) * 2015-12-21 2020-05-05 阿里巴巴集团控股有限公司 Information image display method and device
CN105933503B (en) * 2016-03-29 2020-02-21 联想(北京)有限公司 Information processing method and electronic equipment
CN113434899A (en) * 2016-03-30 2021-09-24 创新先进技术有限公司 Method and terminal for displaying private information
CN107635052A (en) * 2016-07-18 2018-01-26 中兴通讯股份有限公司 Message treatment method and device
CN107644333A (en) * 2016-07-22 2018-01-30 展讯通信(上海)有限公司 Barcode scanning method of payment, device and payment terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370209A (en) * 2008-09-22 2009-02-18 深圳华为通信技术有限公司 Information disguising method and system
CN103559451A (en) * 2013-10-21 2014-02-05 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting and displaying privacy information
CN103888607A (en) * 2014-03-13 2014-06-25 惠州Tcl移动通信有限公司 Method and system for viewing privacy short message services of mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499905A (en) * 2008-02-02 2009-08-05 诚实科技股份有限公司 Image password authentication system for mobile device and method therefor

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370209A (en) * 2008-09-22 2009-02-18 深圳华为通信技术有限公司 Information disguising method and system
CN103559451A (en) * 2013-10-21 2014-02-05 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting and displaying privacy information
CN103888607A (en) * 2014-03-13 2014-06-25 惠州Tcl移动通信有限公司 Method and system for viewing privacy short message services of mobile terminal

Also Published As

Publication number Publication date
CN104219053A (en) 2014-12-17

Similar Documents

Publication Publication Date Title
CN104219053B (en) Method for information display, information concealing method and device
CN103916233B (en) A kind of information ciphering method and device
CN105138259B (en) Operation executes method and device
CN105654302B (en) Payment method and device
EP2605495B1 (en) Mobile terminal and control method thereof
CN104391870B (en) Logistics information acquisition methods and device
CN106210256A (en) Mobile terminal and control method thereof
WO2016154898A1 (en) Mobile terminal privacy protection method, protection apparatus, and mobile terminal
CN103455761B (en) File encryption and decryption method and device and electronic device
CN103294941A (en) Method for accessing private space and mobile device
CN104484593B (en) terminal verification method and device
CN106020587A (en) Method and device for message display
CN106896983A (en) Interface display control method and device
CN106156561A (en) Application locking method, application unlocking method and a device
CN106295294A (en) Method for controlling mobile terminal and device
CN106529277A (en) Message preview method and device
CN108111667A (en) A kind of communication information encryption method, device and electronic equipment
CN107491681A (en) Finger print information processing method and processing device
US20060218408A1 (en) System and method for user authentication employing portable handheld electronic devices
CN107423378A (en) Image display method and device
CN106845199A (en) Object authentication method and device
CN107205198A (en) The unlocking method and a device of microphone
CN106789070A (en) The decryption method of data, device and terminal
CN107360322A (en) Information cuing method and device
CN106778198A (en) Perform the safety certifying method and device of operation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant