CN104219053B - Method for information display, information concealing method and device - Google Patents
Method for information display, information concealing method and device Download PDFInfo
- Publication number
- CN104219053B CN104219053B CN201410429501.1A CN201410429501A CN104219053B CN 104219053 B CN104219053 B CN 104219053B CN 201410429501 A CN201410429501 A CN 201410429501A CN 104219053 B CN104219053 B CN 104219053B
- Authority
- CN
- China
- Prior art keywords
- authentication mechanism
- information content
- verification operation
- layer
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- User Interface Of Digital Computer (AREA)
Abstract
The disclosure discloses a kind of method for information display, information concealing method and device, belongs to field of information security technology.Described information display methods includes:Receive the first kind verification operation for being verified to any layer in 1 layer of authentication mechanism of preceding n in n-layer authentication mechanism, n >=2;When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used to pretend original information content;Receive the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism;When the Equations of The Second Kind verification operation is verified, the original information content is shown.Solve information in correlation technique security it is poor the problem of;Having reached can be pretended by pretending the information content to original information content, and then make it that other people are difficult to know original information content, improve the effect of Information Security.
Description
Technical field
This disclosure relates to field of information security technology, more particularly to a kind of method for information display, information concealing method and dress
Put.
Background technology
It is that one kind increases authentication mechanism in short message application that short message, which is hidden, prevents other people from arbitrarily checking the work(of whole short messages
Energy.
One secret entrance is generally set in correlation technique in short message application, and user needs to input just in the secret entrance
After true checking password, the short message being hidden can be just seen.But under the scene that user is coerced by other people, user's input is correct
Checking password after, other people can also read the hiding short message of user.
Disclosure
In order to solve the problem of Information Security is poor in correlation technique, present disclose provides a kind of method for information display,
Information concealing method and device.The technical scheme is as follows:
According to the first aspect of the embodiment of the present disclosure there is provided a kind of method for information display, including:
Receive for being verified to the first kind that any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism is verified
Operation, n >=2;
When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for
Original information content is pretended;
Receive the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism;
When the Equations of The Second Kind verification operation is verified, the original information content is shown.
Optionally, the Equations of The Second Kind verification operation received for being verified to n-th layer authentication mechanism, including:
Receive the recessive verification operation for being verified to n-th layer authentication mechanism, using the recessive verification operation as
The Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation is the checking entrance of non-dominant prompting.
Optionally, the recessive verification operation received for being verified to n-th layer authentication mechanism, including:
Default shake operation is received by sensor, the default shake operation is regard as the recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, the default gesture operation is regard as the recessive verification operation;
And/or,
Default voice messaging is received by microphone, the default voice messaging is regard as the recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, by the button operation of the default rule
It is used as the recessive verification operation;
And/or,
Default tap is received by the touch-screen to operate, and regard the default percussion operation as the recessive checking behaviour
Make.
Optionally, it is described when the first kind verification operation is verified, the display camouflage information content, including:
The first kind verification operation corresponding to i-th layer of authentication mechanism in preceding n-1 layers of authentication mechanism is verified
When, show the camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤n-1.
Optionally, methods described also includes:
Obtain the display duration of the original information content;Detect whether the display duration got exceedes pre- timing
It is long;If the display duration exceedes the scheduled duration, the n-layer authentication mechanism is reactivated;
And/or,
If when showing the original information content, receiving the trigger signal for interrupting display, then reactivating the n-layer
Authentication mechanism.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of information concealing method, including:
N-layer authentication mechanism, n >=2 are set to original information content;
Preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism are set with the camouflage information content, the camouflage information is used for
Shown when the preceding n-1 layers of authentication mechanism is verified.
Optionally, it is described to original information content setting n-layer authentication mechanism, including:
The preceding n-1 layers of authentication mechanism verified by first kind verification operation are set;
The n-th layer authentication mechanism verified by Equations of The Second Kind verification operation is set.
Optionally, described set passes through the n-th layer authentication mechanism that Equations of The Second Kind verification operation is verified, including:
The n-th layer authentication mechanism verified by recessive verification operation is set, and the recessive verification operation is as described
Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation is the checking entrance of non-dominant prompting.
Optionally, the recessive verification operation includes:It is default shake operation, default gesture operation, default voice messaging, pre-
If at least one of the button operation of rule and default percussion operation.
Optionally, the preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism set the camouflage information content, including:
The camouflage information content of the i-th layer of authentication mechanism corresponded in the preceding n-1 layers of authentication mechanism, 1≤i are set respectively
≤n-1。
Optionally, the camouflage that the i-th layer of authentication mechanism corresponded in the preceding n-1 layers of authentication mechanism is set respectively is believed
Content is ceased, including:
The information content of system default is obtained, using the described information content got as corresponding to described i-th layer checking
The camouflage information content of mechanism;
And/or,
Obtain the sensitive content in the original information content, will in the original information content except the sensitive content it
Outer content is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
It is the information content that the original information content is set to receive user, using the described information content received as right
The camouflage information content of i-th layer of authentication mechanism described in Ying Yu.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of information display device, including:
First operation receiving module, being configured as receiving was used for appointing in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism
One layer of first kind verification operation for being verified, n >=2;
Pretend content display module, be configured as testing in the first kind for receiving the described first operation receiving module
Demonstrate,prove operation demonstration by when, display camouflage the information content, the camouflage information content be used for original information content is pretended;
Second operation receiving module, is configured as receiving the Equations of The Second Kind checking for being used to verify n-th layer authentication mechanism
Operation;
Original contents display module, is configured as testing in the Equations of The Second Kind for receiving the described second operation receiving module
Demonstrate,prove operation demonstration by when, show the original information content.
Optionally, the second operation receiving module, being configured as receiving is used for what n-th layer authentication mechanism was verified
Recessive verification operation, regard the recessive verification operation as the Equations of The Second Kind verification operation, the checking of the recessive verification operation
Entrance is the checking entrance of non-dominant prompting.
Optionally, the second operation receiving module, is configured as:
Default shake operation is received by sensor, the default shake operation is regard as the recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, the default gesture operation is regard as the recessive verification operation;
And/or,
Default voice messaging is received by microphone, the default voice messaging is regard as the recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, by the button operation of the default rule
It is used as the recessive verification operation;
And/or,
Default tap is received by the touch-screen to operate, and regard the default percussion operation as the recessive checking behaviour
Make.
Optionally, the camouflage content display module, is configured as in preceding n-1 layers of authentication mechanism corresponding to i-th layer
When the first kind verification operation of authentication mechanism is verified, the camouflage information content corresponding with i-th layer of authentication mechanism is shown,
1≤i≤n-1。
Optionally, described device also includes:
First trigger module, is configured as obtaining the display duration of the original information content;It is described that detection is got
Show whether duration exceedes scheduled duration;If the display duration exceedes the scheduled duration, reactivate the n-layer and test
Card mechanism;
And/or,
Second trigger module, if being configured as, when showing the original information content, receiving the triggering for interrupting display
Signal, then reactivate the n-layer authentication mechanism.
According to the fourth aspect of the embodiment of the present disclosure there is provided a kind of information concealment device, including:
Authentication mechanism setup module, is configured as setting n-layer authentication mechanism, n >=2 to original information content;
Pretend curriculum offering module, be configured as the n-layer authentication mechanism set to the authentication mechanism setup module
In preceding n-1 layers of authentication mechanism the camouflage information content is set, the camouflage information is used in the preceding n-1 layer authentication mechanism checking
By when shown.
Optionally, the authentication mechanism setup module, including:
First sets submodule, is configured as setting the preceding n-1 layers of verification machine verified by first kind verification operation
System;
Second sets submodule, is configured as setting the n-th layer authentication mechanism verified by Equations of The Second Kind verification operation.
Optionally, described second submodule is set, is configured as setting the n-th layer verified by recessive verification operation
Authentication mechanism, the recessive verification operation is as the Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation
The checking entrance of non-dominant prompting.
Optionally, the recessive verification operation includes:It is default shake operation, default gesture operation, default voice messaging, pre-
If at least one of the button operation of rule and default percussion operation.
Optionally, the camouflage curriculum offering module, is configured to set corresponding to the preceding n-1 layers of authentication mechanism
In i-th layer of authentication mechanism the camouflage information content, 1≤i≤n-1.
Optionally, the camouflage curriculum offering module, including:
3rd sets submodule, is configured as obtaining the information content of system default, by the described information content got
It is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
4th sets submodule, is configured as obtaining the sensitive content in the original information content, by the original letter
Content in breath content in addition to the sensitive content is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
5th sets submodule, and it is the information content that the original information content is set to be configured as receiving user, will be connect
The described information content received is used as the camouflage information content corresponding to i-th layer of authentication mechanism.
According to the 5th of the embodiment of the present disclosure the aspect there is provided a kind of information display device, including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
Receive for being verified to the first kind that any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism is verified
Operation, n >=2;
When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for
Original information content is pretended;
Receive the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism;
When the Equations of The Second Kind verification operation is verified, the original information content is shown.
According to the 6th of the embodiment of the present disclosure the aspect there is provided a kind of information concealment device, including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
N-layer authentication mechanism, n >=2 are set to original information content;
Preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism are set with the camouflage information content, the camouflage information is used for
Shown when the preceding n-1 layers of authentication mechanism is verified.
The technical scheme provided by this disclosed embodiment can include the following benefits:
By receiving the first kind verified to any layer authentication mechanism in preceding n-1 layers of authentication mechanism checking behaviour
Make, and when being verified to first kind verification operation, the information content is pretended in only display;And receiving to n-th layer authentication mechanism
The Equations of The Second Kind verification operation verified, and when being verified to Equations of The Second Kind verification operation, can just show original information content;Solution
The problem of security of information is poor in correlation technique of having determined;Having reached can be by pretending the information content to original information content
Pretended, and then make it that other people are difficult to know original information content, improve the effect of Information Security.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary, this can not be limited
It is open.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the disclosure
Example, and be used in specification to explain the principle of the disclosure together.
Fig. 1 is a kind of flow chart of method for information display according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of information concealing method according to another exemplary embodiment.
Fig. 3 is a kind of flow chart of method for information display according to another exemplary embodiment.
Fig. 4 is a kind of flow chart of method for information display according to another exemplary embodiment.
Fig. 5 is a kind of block diagram of information display device according to an exemplary embodiment.
Fig. 6 is a kind of block diagram of information display device according to another exemplary embodiment.
Fig. 7 is a kind of block diagram of information concealment device according to an exemplary embodiment.
Fig. 8 is a kind of block diagram of information concealment device according to another exemplary embodiment.
Fig. 9 is a kind of for presentation of information and the block diagram of the device of Information hiding according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of method for information display according to an exemplary embodiment, as shown in figure 1, the letter
Breath display methods may comprise steps of.
In a step 101, receive for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism
First kind verification operation, n >=2.
In a step 102, when first kind verification operation is verified, the display camouflage information content pretends the information content
For pretending to original information content.
In step 103, the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received.
At step 104, when Equations of The Second Kind verification operation is verified, original information content is shown.
In summary, the method for information display provided in the embodiment of the present disclosure, by receiving to preceding n-1 layers of verification machine
The first kind verification operation that any layer authentication mechanism in system is verified, and when being verified to first kind verification operation, only
The display camouflage information content;And the Equations of The Second Kind verification operation verified to n-th layer authentication mechanism is being received, and to Equations of The Second Kind
When verification operation is verified, original information content can be just shown;The security for solving information in correlation technique poor is asked
Topic;Having reached can be pretended by pretending the information content to original information content, so cause other people be difficult know it is original
The information content, improves the effect of Information Security.
Fig. 2 is a kind of flow chart of information concealing method according to an exemplary embodiment, as shown in Fig. 2 the letter
Breath hidden method may comprise steps of.
In step 201, n-layer authentication mechanism, n >=2 are set to original information content.
In step 202., preceding n-1 layers of authentication mechanism in n-layer authentication mechanism are set with the camouflage information content, pretends information
For being shown when preceding n-1 layers of authentication mechanism is verified.
In summary, the information concealing method provided in the embodiment of the present disclosure, by setting n-layer to test original information content
Card mechanism, and the camouflage information content is set to preceding n-1 layers of authentication mechanism;Even if so that corresponding to preceding n-1 layers of authentication mechanism
One class verification operation is known that other users can only also know the camouflage information pretended to original information content by other users
Content, can not know real original information content;Solve the problem of Information Security is poor in correlation technique;Reach
The effect of Information Security can be improved.
Fig. 3 is a kind of flow chart of method for information display according to an exemplary embodiment, as shown in figure 3, the letter
Breath display methods may comprise steps of.
In step 301, n-layer authentication mechanism, n >=2 are set to original information content.
In step 302, preceding n-1 layers of authentication mechanism in n-layer authentication mechanism are set with the camouflage information content, pretends information
For being shown when preceding n-1 layers of authentication mechanism is verified.
In step 303, receive for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism
First kind verification operation, n >=2.
In step 304, when first kind verification operation is verified, the display camouflage information content pretends the information content
For pretending to original information content.
In step 305, the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received.
Within step 306, when Equations of The Second Kind verification operation is verified, original information content is shown.
In summary, the method for information display provided in the embodiment of the present disclosure, by receiving to preceding n-1 layers of verification machine
The first kind verification operation that any layer authentication mechanism in system is verified, and when being verified to first kind verification operation, only
The display camouflage information content;And the Equations of The Second Kind verification operation verified to n-th layer authentication mechanism is being received, and to Equations of The Second Kind
When verification operation is verified, original information content can be just shown;The security for solving information in correlation technique poor is asked
Topic;Having reached can be pretended by pretending the information content to original information content, so cause other people be difficult know it is original
The information content, improves the effect of Information Security.
Fig. 4 is a kind of flow chart of method for information display according to an exemplary embodiment, as shown in figure 4, the letter
Breath display methods may comprise steps of.
In step 401, the preceding n-1 layers of authentication mechanism verified by first kind verification operation are set.
When user wants to be hidden some of terminal information, and then when avoiding other people from arbitrarily checking, user can be with
Sequence of operations is performed in the terminal.Terminal, which receives to set for original information content after the sequence of operations of user, passes through first
The preceding n-1 layers of authentication mechanism that class verification operation is verified.Wherein, n >=2, original information content can include short message, IMU
At least one of letter information, notepad information, diary, mail, picture or video;The checking entrance of first kind verification operation
The usually checking entrance of dominant prompting.
Such as, so that n is 3 as an example, terminal can set the first layer authentication mechanism verified by clear crytpographic key, and
The 2nd layer of authentication mechanism verified by prearranged gesture is set.
When actually realizing, corresponding to each layer of authentication mechanism before terminal can sequentially be set in n-1 layers of authentication mechanism
First kind verification operation, first corresponding to each layer of authentication mechanism can also set simultaneously before in n-1 layers of authentication mechanism
Class verification operation, the present embodiment is not limited this.Also, each layer of authentication mechanism institute in preceding n-1 layers of authentication mechanism is right
The first kind verification operation answered be can be the same or different, and the present embodiment is not also limited this.
In step 402, the n-th layer authentication mechanism verified by Equations of The Second Kind verification operation is set.
Terminal can set the n-th layer authentication mechanism verified by recessive verification operation, and recessive verification operation is made
For Equations of The Second Kind verification operation, the checking entrance of recessive verification operation is the checking entrance of non-dominant prompting.Wherein, recessive checking behaviour
Work includes:Preset shake operation, default gesture operation, default voice messaging, the button operation of default rule and default percussion
At least one of operation.
Such as, terminal can be set by shaking the 3rd layer of authentication mechanism that the shake operation of terminal three times is verified.
It should be noted that this step can be the step of being performed under user triggers or terminal is performed automatically
The step of, the present embodiment is not limited this.
In step 403, the camouflage information of the i-th layer of authentication mechanism corresponded in preceding n-1 layers of authentication mechanism is set respectively
Content.
When being verified in order to avoid other people to the first kind verification operation corresponding to preceding n-1 layers of authentication mechanism, Ta Renke
To browse original information content, the problem of threatening the information security of original information content, terminal can be set respectively correspond to before
The camouflage information content of i-th layer of authentication mechanism in n-1 layers of authentication mechanism, is entered by pretending the information content to original information content
Row camouflage.Wherein, the camouflage information content is used to pretend original information content, 1≤i≤n-1.
Terminal sets the method to set up for the camouflage information content for corresponding to i-th layer of authentication mechanism to include in following method
At least one:
The first:
The information content of system default is obtained, the information content got is used as to the puppet corresponding to i-th layer of authentication mechanism
Fill the information content;
Terminal can be with preset information contents, when terminal needs to set the camouflage information content for i-th layer of authentication mechanism, terminal
Obtain systemic presupposition the information content, using the information content got as the camouflage information corresponding to i-th layer of authentication mechanism in
Hold.
When actually realizing, terminal can be short message, notepad information, diary, instant messaging information or mail etc
Original information content preset such as greeting, blessing language, the information content of polite expressions etc.Such as, for short message, eventually
End can preset ' wishing that you are everyday happy ', ' wish you and your household is healthy, everything is just fine ', ' good morning ', ' I exists now
It is meeting, busy to leave a message ' or ' I contacts with you later ' etc the information content.So, when terminal needs to set for short message
When pretending the information content, terminal can regard above-mentioned default content as the camouflage information content corresponding to i-th layer of authentication mechanism.
Terminal can be declared for the default such as star's poster of original information content, cinema promotional poster, the commodity of picture etc
The image content of leaflet, animal picture or landscape figure etc.When terminal needs to set the camouflage information content for picture, terminal
It can be the camouflage information content corresponding to i-th layer of authentication mechanism by above-mentioned default curriculum offering.
Terminal can preset the letter of such as propaganda film, MV or star's interview etc for the original information content of video etc
Cease content.When terminal needs to set the camouflage information content for video, default the above can be set to correspondence by terminal
In the camouflage information content of i-th layer of authentication mechanism.
Second:
Obtain original information content in sensitive content, using the content in original information content in addition to sensitive content as
Corresponding to the camouflage information content of i-th layer of authentication mechanism;
When original information content is short message, notepad information, instant messaging information or mail, terminal can extract it
In sensitive information, the information in addition to sensitive information is determined as corresponding to the camouflage information content of i-th layer of authentication mechanism.
Such as, when original information content is the notepad information comprising bank's card number and password, terminal can extract note
Bank's card number and password in this information of thing, using the content in notepad information in addition to bank's card number and password as corresponding to
The camouflage information content of i-th layer of authentication mechanism;When original information content is the payroll that Corporate Finance is sent by mail,
Terminal can extract that the amount of money in salary bill is detailed, and the information in salary bill in addition to the amount of money extracted is detailed is defined as pair
Should be in the camouflage information content of i-th layer of authentication mechanism.
When original information content is picture, terminal can recognize the destination object in picture, target pair will be removed in picture
Content as outside is determined as corresponding to the camouflage information content of i-th layer of authentication mechanism.Wherein, the destination object can be user
The object or terminal marked in advance extracts the object determined according to each stored picture.
When original information content is video, terminal can extract the target fragment in video, target patch will be removed in video
Content outside section is determined as corresponding to the camouflage information content of i-th layer of authentication mechanism.Wherein, target fragment can be pre- for user
The fragment that the fragment or terminal first marked is automatically extracted according to video content, the present embodiment is not limited this.
When actually realizing, terminal can also directly extract the regular content in original information content, normal by what is extracted
Rule content is used as the camouflage information content corresponding to i-th layer of authentication mechanism.Wherein, regular content refers to that the information content carried is less
Or for a user be not private information content.
Such as, when the text envelope that original information content is such as short message, notepad information or instant messaging information etc
During breath, terminal can obtain the regular content in original information content by semantic analysis, and the regular content that analysis is obtained is made
For the camouflage information content of i-th layer of authentication mechanism.Such as, greeting, blessing language and the polite expressions in text message are extracted.
When original information content is mail, terminal can extract the regular content in mail, such as greeting, blessing
The content of language, signature or polite expressions etc, using the content extracted as the camouflage information corresponding to i-th layer of authentication mechanism in
Hold.
When original information content is picture, terminal can be carried out to the sensitive action in picture or sensitive objects automatically
Hide, and then only show the content after hiding.
When original information content is video, terminal can extract landscape fragment or cuisines fragment in video, will carry
The fragment got is used as the camouflage information content corresponding to i-th layer of authentication mechanism.
The third:
It is the information content that original information content is set to receive user, using the information content received as corresponding to i-th
The camouflage information content of layer authentication mechanism.
When needing to set the camouflage information content for i-th layer of authentication mechanism, user can input customized in the terminal
Content, terminal is received after user-defined content, using the information content received as corresponding to i-th layer of authentication mechanism
The camouflage information content.
It should be noted is that, terminal be the camouflage information content that sets of every layer of authentication mechanism can with it is identical can not also
Together, the present embodiment is not limited this.
Need explanation on the other hand, the present embodiment is simply first carried out after step 402 exemplified by execution step 403 by terminal,
When actually realizing, terminal can also perform step 402 and step 403 simultaneously, or first carry out step is performed after step 403
402, it is only necessary to ensure that step 401 is performed to step 403 before step 404, its actual execution sequence is not limited
It is fixed.
In step 404, receive for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism
First kind verification operation, n >=2.
When user wants the information content hidden in browsing terminal, user can input in the terminal to be verified to i-th layer
The first kind verification operation that mechanism is verified, accordingly, terminal can receive verified to i-th layer of authentication mechanism
One class verification operation.Wherein, i initial value is 1, and i is the integer less than or equal to n-1.
Such as, when first layer authentication mechanism is encrypted using Crypted password, user can input to correspond in the terminal to be added
The clear crytpographic key of password;Terminal receives the clear crytpographic key of user's input accordingly.Similar, when second layer authentication mechanism is used
When encrypting gesture encryption, user can apply gesture decryption oprerations corresponding with encryption gesture in the terminal;Terminal can be corresponding
Receive gesture decryption oprerations.
When actually realizing, terminal can show the checking entrance for pointing out first kind verification operation, and user checks
To after checking entrance, into checking entrance, apply first kind verification operation, terminal receives first kind verification operation accordingly,
The present embodiment is not limited this.
In step 405, the first kind verification operation of i-th layer of authentication mechanism is corresponded in preceding n-1 layers of authentication mechanism
When being verified, the camouflage information content corresponding with i-th layer of authentication mechanism is shown.
When terminal receives the first kind verification operation for being verified to i-th layer of authentication mechanism, terminal can be docked
The first kind verification operation received is verified, when being verified, and is shown in camouflage information corresponding with i-th layer of authentication mechanism
Hold.Wherein, the camouflage information content is used to pretend original information content.
Such as, terminal receives the clear crytpographic key corresponding to first layer authentication mechanism, then terminal can detect what is received
Whether clear crytpographic key is correct, if correctly, the camouflage information content of the display corresponding to first layer authentication mechanism.
Needing at first point of explanation is, when terminal receives the first kind verification operation corresponding to i-th layer of authentication mechanism, eventually
End can be verified to the first kind verification operation corresponding to i-th layer of authentication mechanism received, when being verified, display
Corresponding to the camouflage information content of i-th layer of authentication mechanism.Hereafter, by i+1, when user continues to correspond to i-th layer of verification machine
During the first kind verification operation of system, terminal can perform the first kind verification operation for receiving and corresponding to i-th layer of authentication mechanism again,
The first kind verification operation corresponding to i-th layer of authentication mechanism received is verified, if the verification passes, then correspondence is shown
In i-th layer of the camouflage information content.
Needing the second point of explanation is, if terminal-pair first kind verification operation authentication failed, flow terminates, this implementation
Example will not be repeated here.
Need explanation be thirdly, in i<During n-1, user can also select not continuing to first kind verification operation,
Now flow will terminate, and the present embodiment is not also repeated this.
In a step 406, the Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received.
After terminal shows the camouflage information content corresponding to (n-1)th layer of authentication mechanism, user can be performed to n-th layer
The Equations of The Second Kind verification operation that authentication mechanism is verified.Accordingly, terminal can receive Equations of The Second Kind verification operation.
When actually realizing, this step can include:Receive the recessiveness checking for being verified to n-th layer authentication mechanism
Operation, using recessive verification operation as Equations of The Second Kind verification operation, the checking entrance of recessive verification operation is testing for non-dominant prompting
Demonstrate,prove entrance.
Because recessive verification operation can include default shake operation, default gesture operation, default voice messaging, default rule
At least one of the button operation of rule and default percussion operation, so according to the difference of recessive verification operation, terminal is received
The method of reseptance of recessive verification operation for being verified to n-th layer authentication mechanism can include at least one in following method
Kind:
The first:
Default shake operation is received by sensor, default shake operation is regard as recessive verification operation;
When user is shaken in terminal according to default shake operation, terminal can be received default shake by sensor and be grasped
Make, terminal regard default shake operation as recessive verification operation.Wherein, shake operation can be traditional shake operation, also may be used
To be that user grips the shake operation that terminal makes certain gesture, it can also be that user inverts the reverse turn operation of terminal, this implementation
Example is not limited this.
Such as, when user shakes No. three mobile phones, terminal can be received by sensor shakes the shake operation of three times.
When user, which grips mobile phone, makes the operation drawn a circle, terminal can receive operation of drawing a circle by sensor.When user grips hand
When machine draws one ' check mark ', terminal can receive the operation by sensor.When user inverts mobile phone, mobile phone can
To receive the reverse turn operation by sensor.
The present embodiment simply so that default shake operation is above-mentioned several operations as an example, when actually realizing, is preset and shakes behaviour
Make not limiting this for other operations, the present embodiment.
Second:
Default gesture operation is received by touch-screen, default gesture operation is regard as recessive verification operation;
The third:
Default voice messaging is received by microphone, default voice messaging is regard as recessive verification operation;
User can also say default sentence against terminal microphone, accordingly, and terminal can receive pre- by microphone
If voice messaging.
4th kind:
The button operation of default rule is received by physical button or virtual key, using the button operation of default rule as
Recessive verification operation;
User can also with preset rule press terminal in physical button, or pressing terminal by dummy keyboard to
The virtual key that family is provided.Such as, terminal presses numerical key ' 1 ' and numerical key ' 9 ' simultaneously.
5th kind:
Default tap is received by touch-screen to operate, and regard default percussion operation as recessive verification operation.
User can also tap terminal screen, such as, 3 terminal screens of user's adopting consecutive click chemical reaction according to default percussion rule.
In step 407, when Equations of The Second Kind verification operation is verified, original information content is shown.
When terminal receives Equations of The Second Kind verification operation, terminal can be verified to Equations of The Second Kind verification operation, if to
Two class verification operations are verified, then terminal can show original information content.
Terminal can detect whether the Equations of The Second Kind verification operation received matches with default Equations of The Second Kind verification operation, if
Matching, it is determined that be verified to Equations of The Second Kind verification operation, conversely, then authentication failed.
In an application scenarios of the present embodiment, in order to avoid forgeing the bank card password of oneself, and then band is used
It is inconvenient to come, and Xiao Ming creates the notepad information of be stored with bank's card number and password in mobile phone notepad.Then in order to avoid hand
When machine is stolen, other people view this notepad information, and then cause property loss, and Xiao Ming is provided with to this notepad information
2 layers of authentication mechanism.Wherein, first layer authentication mechanism is provided with gesture checking, and second layer authentication mechanism is provided with speech verification;And
' No. 8.10 small younger sister's birthdays that first layer authentication mechanism is set by user, remember to buy present ' pretended.So, even if other people
Mobile phone is found, has been hit it encryption gesture by the cut in screen, and first layer authentication mechanism is verified, other people also can only
See the camouflage information content of first layer authentication mechanism, and the bank's card number and password of oneself can not be viewed;And other people
View after the information content, other people typically will be considered that the content is exactly the initial content of this notepad information, thus abandon after
Continuous decryption, improves the information security of notepad information.Even if other people know also need to further checking, but be due to mobile phone simultaneously
The checking entrance verified to final step will not be shown, other people can not also continue checking, further ensure information security.
In another application scenarios of the present embodiment, little Hua is in order to prevent the short message record of oneself and lover from being looked into by other people
See, little Hua is provided with 3 layers of checking to short message record, first layer authentication mechanism is password authentification, and second layer authentication mechanism is gesture
Checking, third layer authentication mechanism is verified for combination button, and first layer authentication mechanism and second layer authentication mechanism pass through camouflage
The information content is pretended to short message record.Then when other people are using little Hua mobile phones and attempt out of curiosity to hiding short message
When being verified, even if other people may be verified to first layer authentication mechanism, but it can only also view in the information of camouflage
Hold, and real camouflage content can not be viewed;And other people also differ and surely continue to be verified second layer authentication mechanism,
Even if other people are also verified in the case of minimum probability to second layer authentication mechanism, then the content that he sees is still pseudo-
The information content of dress, and it is not the true content of short message record, improve the safety of short message record.Simultaneously as third layer
Authentication mechanism is using recessive verification operation, and terminal does not provide checking entrance, so not knowing that also third layer is tested in advance at other people
During card, the content for thinking currently to show that other people can very certainly is the true content of short message, further increases information peace
Entirely.
It should be added that, step 404 to step 407 can be the step of step 403 is performed one time afterwards, also may be used
Multiple step is performed with the Posterior circle for being step 403, the present embodiment is not limited this.
In summary, the method for information display provided in the embodiment of the present disclosure, by receiving to preceding n-1 layers of verification machine
The first kind verification operation that any layer authentication mechanism in system is verified, and when being verified to first kind verification operation, only
The display camouflage information content;And the Equations of The Second Kind verification operation verified to n-th layer authentication mechanism is being received, and to Equations of The Second Kind
When verification operation is verified, original information content can be just shown;The security for solving information in correlation technique poor is asked
Topic;Having reached can be pretended by pretending the information content to original information content, so cause other people be difficult know it is original
The information content, improves the effect of Information Security.
Under normal circumstances, user is conducted interviews checking to hiding content, and terminal is shown after corresponding content, Yong Hudou
Will be considered that the content now shown is exactly hiding content, so the present embodiment is by setting n-layer authentication mechanism to encrypt, and it is preceding
N-1 layers of authentication mechanism pretend original information content using the camouflage information content, even if having reached that other users coerce user's sheet
People verifies that other users can not also view the true content in original information content, improve letter to hiding content
Cease the security of content.
Meanwhile, the present embodiment is verified by being set to last layer of authentication mechanism by recessive verification operation, recessive
The checking entrance of verification operation is the checking entrance of non-dominant prompting so that other users are to the of preceding n-1 layers of authentication mechanism
After the checking of one class checking information, other users can not also know also one layer checking, further increase the safety of the information content.
It should be noted that after terminal shows original information content, terminal can also carry out in following steps extremely
A few step:
First, obtain the display duration of original information content;Detect whether the display duration got exceedes scheduled duration;
If showing that duration exceedes scheduled duration, n-layer authentication mechanism is reactivated;
When terminal starts display original information content, terminal can record the display duration of original information content, and in fact
When detection record display duration whether exceed scheduled duration such as ' 30S ', when testing result be more than scheduled duration when, terminal
User can be asked to verify again.When actually realizing, terminal can show the checking entrance of first kind verification operation, work as user
Apply the first kind verification operation verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism, accordingly,
Terminal can reactivate n-layer authentication mechanism.So, avoid user and checked that hiding original information content is forgotten to exit
When, the problem of original information content that terminal is shown is stolen a glance at by other people.
Second, if when showing original information content, receiving the trigger signal for interrupting display, then reactivating n-layer and test
Card mechanism.
Wherein, the trigger signal for interrupting display can be the request signal of new calling incoming call or user under
Informing is drawn to switch to the switching signal at other interfaces from informing.
Such as, when terminal shows original information content, when having new calling incoming call and end of calling, terminal will show the
The checking entrance of one class verification operation, when any layer in preceding n-1 layers of authentication mechanism during user applies to n-layer authentication mechanism is carried out
During the first kind verification operation of checking, terminal reactivates n-layer authentication mechanism.
It is similar, when user is by pulling down informing, and then check new message, after new instant messaging information, terminal
The checking entrance of first kind verification operation can be shown, when in preceding n-1 layers of authentication mechanism during user applies to n-layer authentication mechanism
During the first kind verification operation that any layer is verified, terminal can reactivate n-layer authentication mechanism.
When actually realizing, when user exits the display of original information content, and want to check original information content again
When, terminal, which still needs, reactivates n-layer authentication mechanism.
Following is disclosure device embodiment, can be used for performing method of disclosure embodiment.It is real for disclosure device
The details not disclosed in example is applied, method of disclosure embodiment is refer to.
Fig. 5 is a kind of block diagram of information display device according to an exemplary embodiment, as shown in figure 5, the information
Display device can include but is not limited to:First operation receiving module 510, the camouflage operation of content display module 520, second are received
Module 530 and original contents display module 540.
First operation receiving module 510, being configured as receiving is used in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism
The first kind verification operation verified of any layer, n >=2;
Pretend content display module 520, be configured as verifying in the first kind for receiving the first operation receiving module 510
Operation demonstration by when, display camouflage the information content, camouflage the information content be used for original information content is pretended;
Second operation receiving module 530, being configured as receiving is used to test the Equations of The Second Kind that n-th layer authentication mechanism is verified
Card operation;
Original contents display module 540, is configured as verifying in the Equations of The Second Kind for receiving the second operation receiving module 530
Operation demonstration by when, show original information content.
In summary, the information display device provided in the embodiment of the present disclosure, by receiving to appointing in first n-1 layers
One layer of first kind verification operation for being verified, and when being verified to first kind verification operation, only the display camouflage information content;
And the Equations of The Second Kind verification operation verified to n-th layer is being received, and when being verified to Equations of The Second Kind verification operation, can just show
Show original information content;Solve information in correlation technique security it is poor the problem of;Having reached can be by pretending information
Content is pretended to original information content, and then make it that other people are difficult to know original information content, improves Information Security
Effect.
Fig. 6 is a kind of block diagram of information display device according to an exemplary embodiment, as shown in fig. 6, the information
Display device can include but is not limited to:First operation receiving module 610, the camouflage operation of content display module 620, second are received
Module 630 and original contents display module 640.
First operation receiving module 610, being configured as receiving is used in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism
The first kind verification operation verified of any layer, n >=2;
Pretend content display module 620, be configured as verifying in the first kind for receiving the first operation receiving module 610
Operation demonstration by when, display camouflage the information content, camouflage the information content be used for original information content is pretended;
Second operation receiving module 630, being configured as receiving is used to test the Equations of The Second Kind that n-th layer authentication mechanism is verified
Card operation;
Original contents display module 640, is configured as verifying in the Equations of The Second Kind for receiving the second operation receiving module 630
Operation demonstration by when, show original information content.
Optionally, the second operation receiving module 630, being configured as receiving is used for what n-th layer authentication mechanism was verified
Recessive verification operation, using recessive verification operation as Equations of The Second Kind verification operation, the checking entrance of recessive verification operation is non-dominant
The checking entrance of prompting.
Optionally, the second operation receiving module 630, is configured as:
Default shake operation is received by sensor, default shake operation is regard as recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, default gesture operation is regard as recessive verification operation;
And/or,
Default voice messaging is received by microphone, default voice messaging is regard as recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, using the button operation of default rule as
Recessive verification operation;
And/or,
Default tap is received by touch-screen to operate, and regard default percussion operation as recessive verification operation.
Optionally, pretend content display module 620, be configured as in preceding n-1 layers of authentication mechanism testing corresponding to i-th layer
When the first kind verification operation of card mechanism is verified, the display camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤
n-1。
Optionally, device also includes:
First trigger module 650, is configured as obtaining the display duration of original information content;When detecting the display got
It is long whether to exceed scheduled duration;If showing that duration exceedes scheduled duration, n-layer authentication mechanism is restarted;
And/or,
Second trigger module 660, if being configured as when showing original information content, receives the triggering letter for interrupting display
Number, then reactivate n-layer authentication mechanism.
In summary, the information display device provided in the embodiment of the present disclosure, by receiving to appointing in first n-1 layers
One layer of first kind verification operation for being verified, and when being verified to first kind verification operation, only the display camouflage information content;
And the Equations of The Second Kind verification operation verified to n-th layer is being received, and when being verified to Equations of The Second Kind verification operation, can just show
Show original information content;Solve information in correlation technique security it is poor the problem of;Having reached can be by pretending information
Content is pretended to original information content, and then make it that other people are difficult to know original information content, improves Information Security
Effect.
Under normal circumstances, user is conducted interviews checking to hiding content, and terminal is shown after corresponding content, Yong Hudou
Will be considered that the content now shown is exactly hiding content, so the present embodiment is by setting n-layer to encrypt, and first n-1 layers makes
Pretend original information content with the camouflage information content, even if having reached that other users stress user enters to hiding content
Row checking, other users can not also view the true content in original information content, improve the security of the information content.
Meanwhile, the present embodiment is verified by being set to last layer by recessive verification operation, recessive verification operation
Checking entrance be non-dominant prompting checking entrance so that other users are before progress after n-1 layers of checking, other users
Also one layer checking can not be known, the safety of the information content is further increased.
Fig. 7 is a kind of block diagram of information concealment device according to another exemplary embodiment, as shown in fig. 7, the letter
Breath concealing device can include but is not limited to:Authentication mechanism setup module 710 and camouflage curriculum offering module 720;
Authentication mechanism setup module 710, is configured as setting n-layer authentication mechanism, n >=2 to original information content;
Pretend curriculum offering module 720, be configured as in the n-layer authentication mechanism to the setting of authentication mechanism setup module 710
Preceding n-1 layers of authentication mechanism set camouflage the information content, camouflage information be used for carried out when preceding n-1 layers of authentication mechanism is verified
It has been shown that, the camouflage information content is used to pretend original information content.
In summary, the information concealment device provided in the embodiment of the present disclosure, by setting n-layer to test original information content
Card mechanism, and the camouflage information content is set to preceding n-1 layers of authentication mechanism;Even if so that corresponding to preceding n-1 layers of authentication mechanism
One class verification operation is known that other users can only also know the camouflage information pretended to original information content by other users
Content, can not know real original information content;Solve the problem of Information Security is poor in correlation technique;Reach
The effect of Information Security can be improved.
Fig. 8 is a kind of block diagram of information concealment device according to another exemplary embodiment, as shown in figure 8, the letter
Breath concealing device can include but is not limited to:Authentication mechanism setup module 810 and camouflage curriculum offering module 820;
Authentication mechanism setup module 810, is configured as setting n-layer authentication mechanism, n >=2 to original information content;
Pretend curriculum offering module 820, be configured as in the n-layer authentication mechanism to the setting of authentication mechanism setup module 810
Preceding n-1 layers of authentication mechanism set camouflage the information content, camouflage information be used for carried out when preceding n-1 layers of authentication mechanism is verified
It has been shown that, the camouflage information content is used to pretend original information content.
Optionally, authentication mechanism setup module 810, including:
First sets submodule 811, is configured as setting the preceding n-1 layers of checking verified by first kind verification operation
Mechanism;
Second sets submodule 812, is configured as setting the n-th layer verification machine verified by Equations of The Second Kind verification operation
System.
Optionally, second submodule 812 is set, is configured as setting the n-th layer verified by recessive verification operation
Authentication mechanism, using recessive verification operation as Equations of The Second Kind verification operation, the checking entrance of recessive verification operation is non-dominant prompting
Checking entrance.
Optionally, recessive verification operation includes:Default shake operation, default gesture operation, default voice messaging, default rule
At least one of the button operation of rule and default percussion operation.
Optionally, camouflage curriculum offering module 820, is configured to set corresponding in preceding n-1 layers of authentication mechanism
The camouflage information content of i-th layer of authentication mechanism, 1≤i≤n-1.
Optionally, camouflage curriculum offering module 820, including:
3rd sets submodule 821, is configured as obtaining the information content of system default, the information content got is made
For the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
4th sets submodule 822, is configured as obtaining the sensitive content in original information content, by original information content
In content in addition to sensitive content be used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
5th sets submodule 823, and it is the information content that original information content is set to be configured as receiving user, will be received
The information content arrived is used as the camouflage information content corresponding to i-th layer of authentication mechanism.
In summary, the information concealment device provided in the embodiment of the present disclosure, by setting n-layer to test original information content
Card mechanism, and the camouflage information content is set to preceding n-1 layers of authentication mechanism;Even if so that corresponding to preceding n-1 layers of authentication mechanism
One class verification operation is known that other users can only also know the camouflage information pretended to original information content by other users
Content, can not know real original information content;Solve the problem of Information Security is poor in correlation technique;Reach
The effect of Information Security can be improved.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
Fig. 9 is a kind of for presentation of information and the frame of the device 900 of Information hiding according to an exemplary embodiment
Figure.For example, device 900 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console is put down
Board device, Medical Devices, body-building equipment, personal digital assistant etc..
Reference picture 9, device 900 can include following one or more assemblies:Processing assembly 902, memory 904, power supply
Component 906, multimedia groupware 908, audio-frequency assembly 910, the interface 912 of input/output (I/O), sensor cluster 914, and
Communication component 916.
The integrated operation of the usual control device 900 of processing assembly 902, such as with display, call, data communication, phase
Machine operates the operation associated with record operation.Processing assembly 902 can refer to including one or more processors 918 to perform
Order, to complete all or part of step of above-mentioned method.In addition, processing assembly 902 can include one or more modules, just
Interaction between processing assembly 902 and other assemblies.For example, processing assembly 902 can include multi-media module, it is many to facilitate
Interaction between media component 908 and processing assembly 902.
Memory 904 is configured as storing various types of data supporting the operation in device 900.These data are shown
Example includes the instruction of any application program or method for being operated on device 900, and contact data, telephone book data disappears
Breath, picture, video etc..Memory 904 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable to compile
Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash
Device, disk or CD.
Power supply module 906 provides electric power for the various assemblies of device 900.Power supply module 906 can include power management system
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 900.
Multimedia groupware 908 is included in the screen of one output interface of offer between described device 900 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings
Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action
Border, but also detection touches or slide related duration and pressure with described.In certain embodiments, many matchmakers
Body component 908 includes a front camera and/or rear camera.When device 900 be in operator scheme, such as screening-mode or
During video mode, front camera and/or rear camera can receive the multi-medium data of outside.Each front camera and
Rear camera can be a fixed optical lens system or with focusing and optical zoom capabilities.
Audio-frequency assembly 910 is configured as output and/or input audio signal.For example, audio-frequency assembly 910 includes a Mike
Wind (MIC), when device 900 be in operator scheme, when such as call model, logging mode and speech recognition mode, microphone by with
It is set to reception external audio signal.The audio signal received can be further stored in memory 904 or via communication set
Part 916 is sent.In certain embodiments, audio-frequency assembly 910 also includes a loudspeaker, for exports audio signal.
I/O interfaces 912 is provide interface between processing assembly 902 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 914 includes one or more sensors, and the state for providing various aspects for device 900 is commented
Estimate.For example, sensor cluster 914 can detect opening/closed mode of device 900, the relative positioning of component is for example described
Component is the display and keypad of device 900, and sensor cluster 914 can be with 900 1 components of detection means 900 or device
Position change, the existence or non-existence that user contacts with device 900, the orientation of device 900 or acceleration/deceleration and device 900
Temperature change.Sensor cluster 914 can include proximity transducer, be configured to detect in not any physical contact
The presence of neighbouring object.Sensor cluster 914 can also include optical sensor, such as CMOS or ccd image sensor, for into
As being used in application.In certain embodiments, the sensor cluster 914 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 916 is configured to facilitate the communication of wired or wireless way between device 900 and other equipment.Device
900 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation
In example, communication component 916 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 916 also includes near-field communication (NFC) module, to promote junction service.Example
Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 900 can be believed by one or more application specific integrated circuits (ASIC), numeral
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 904 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 918 of device 900.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (24)
1. a kind of method for information display, it is characterised in that methods described includes:
The first kind verification operation for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism is received,
N >=2, the checking entrance of the first kind verification operation is the checking entrance of dominant prompting;
When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for original
The beginning information content is pretended;
The Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received, the Equations of The Second Kind verification operation is recessiveness
Verification operation;
When the Equations of The Second Kind verification operation is verified, the original information content is shown.
2. according to the method described in claim 1, it is characterised in that described to receive for being verified to n-th layer authentication mechanism
Equations of The Second Kind verification operation, including:
The recessive verification operation for being verified to n-th layer authentication mechanism is received, using the recessive verification operation as described
Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation is the checking entrance of non-dominant prompting.
3. method according to claim 2, it is characterised in that the reception is used for what is verified to n-th layer authentication mechanism
Recessive verification operation, including:
Default shake operation is received by sensor, the default shake operation is regard as the recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, the default gesture operation is regard as the recessive verification operation;
And/or,
Default voice messaging is received by microphone, the default voice messaging is regard as the recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, using the button operation of the default rule as
The recessive verification operation;
And/or,
Default tap is received by the touch-screen to operate, and regard the default percussion operation as the recessive verification operation.
4. according to the method described in claim 1, it is characterised in that described when the first kind verification operation is verified,
The display camouflage information content, including:
When the first kind verification operation in preceding n-1 layers of authentication mechanism corresponding to i-th layer of authentication mechanism is verified, show
Show the camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤n-1.
5. according to any described method of Claims 1-4, it is characterised in that methods described also includes:
Obtain the display duration of the original information content;Detect whether the display duration got exceedes scheduled duration;
If the display duration exceedes the scheduled duration, the n-layer authentication mechanism is reactivated;
And/or,
If when showing the original information content, receiving the trigger signal for interrupting display, then the n-layer checking is reactivated
Mechanism.
6. a kind of information concealing method, it is characterised in that methods described includes:
The preceding n-1 layers of authentication mechanism verified by first kind verification operation, the checking of the first kind verification operation are set
Entrance is the checking entrance of dominant prompting, n >=2;
The n-th layer authentication mechanism verified by Equations of The Second Kind verification operation is set, and the Equations of The Second Kind verification operation is tested for recessiveness
Card operation;
Preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism are set with the camouflage information content, the camouflage information is used in institute
Shown when n-1 layers of authentication mechanism are verified before stating, the camouflage information content is used to carry out puppet to original information content
Dress.
7. method according to claim 6, it is characterised in that the setting is verified by Equations of The Second Kind verification operation
N-th layer authentication mechanism, including:
The n-th layer authentication mechanism verified by recessive verification operation is set, the recessive verification operation is regard as described the
Two class verification operations, the checking entrance of the recessive verification operation is the checking entrance of non-dominant prompting.
8. method according to claim 7, it is characterised in that the recessive verification operation includes:It is default shake operation, pre-
If at least one of gesture operation, default voice messaging, the button operation of default rule and default percussion operation.
9. method according to claim 6, it is characterised in that the preceding n-1 layers of checking in the n-layer authentication mechanism
Mechanism sets the camouflage information content, including:
The camouflage information content of the i-th layer of authentication mechanism corresponded in the preceding n-1 layers of authentication mechanism, 1≤i≤n- are set respectively
1。
10. method according to claim 9, it is characterised in that described set respectively corresponds to the preceding n-1 layers of verification machine
The camouflage information content of i-th layer of authentication mechanism in system, including:
The information content of system default is obtained, using the described information content got as corresponding to i-th layer of authentication mechanism
The camouflage information content;
And/or,
Obtain the sensitive content in the original information content, by the original information content in addition to the sensitive content
Content is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
Receive user be the original information content set the information content, using the described information content received as corresponding to
The camouflage information content of i-th layer of authentication mechanism.
11. a kind of information display device, it is characterised in that described device includes:
First operation receiving module, being configured as receiving is used for any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism
The first kind verification operation verified, n >=2, the checking entrance of the first kind verification operation enters for the checking of dominant prompting
Mouthful;
Pretend content display module, be configured as verifying in the first kind for receiving the described first operation receiving module and grasp
When being verified, the display camouflage information content, the camouflage information content is used to pretend original information content;
Second operation receiving module, is configured as receiving the Equations of The Second Kind checking behaviour for being used to verify n-th layer authentication mechanism
Make, the Equations of The Second Kind verification operation is recessive verification operation;
Original contents display module, is configured as verifying in the Equations of The Second Kind for receiving the described second operation receiving module and grasps
When being verified, the original information content is shown.
12. device according to claim 11, it is characterised in that
The second operation receiving module, is configured as receiving the recessive checking behaviour for being used to verify n-th layer authentication mechanism
Make, using the recessive verification operation as the Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation is non-aobvious
Property prompting checking entrance.
13. device according to claim 12, it is characterised in that the second operation receiving module, is configured as:
Default shake operation is received by sensor, the default shake operation is regard as the recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, the default gesture operation is regard as the recessive verification operation;
And/or,
Default voice messaging is received by microphone, the default voice messaging is regard as the recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, using the button operation of the default rule as
The recessive verification operation;
And/or,
Default tap is received by the touch-screen to operate, and regard the default percussion operation as the recessive verification operation.
14. device according to claim 11, it is characterised in that
The camouflage content display module, is configured as corresponding in preceding n-1 layers of authentication mechanism the institute of i-th layer of authentication mechanism
When stating first kind verification operation and being verified, the camouflage information content corresponding with i-th layer, 1≤i≤n-1 are shown.
15. according to any described device of claim 11 to 14, it is characterised in that described device also includes:
First trigger module, is configured as obtaining the display duration of the original information content;Detect the display got
Whether duration exceedes scheduled duration;If the display duration exceedes the scheduled duration, the n-layer verification machine is reactivated
System;
And/or,
Second trigger module, if being configured as, when showing the original information content, receiving the trigger signal for interrupting display,
Then reactivate the n-layer authentication mechanism.
16. a kind of information concealment device, it is characterised in that described device includes:
Authentication mechanism setup module, is configured as setting the preceding n-1 layers of authentication mechanism verified by first kind verification operation,
The checking entrance of the first kind verification operation is the checking entrance of dominant prompting, n >=2;
The authentication mechanism setup module, is additionally configured to set the n-th layer verified by Equations of The Second Kind verification operation to verify
Mechanism, the Equations of The Second Kind verification operation is recessive verification operation;
Pretend curriculum offering module, be configured as in the n-layer authentication mechanism to authentication mechanism setup module setting
Preceding n-1 layers of authentication mechanism sets the camouflage information content, and the camouflage information is used to be verified in the preceding n-1 layers of authentication mechanism
Shi Jinhang shows that the camouflage information content is used to pretend original information content.
17. device according to claim 16, it is characterised in that
The authentication mechanism setup module, is additionally configured to set the n-th layer verification machine verified by recessive verification operation
System, the recessive verification operation is as the Equations of The Second Kind verification operation, and the checking entrance of the recessive verification operation is non-dominant
The checking entrance of prompting.
18. device according to claim 17, it is characterised in that the recessive verification operation includes:Default shake operation,
At least one of default gesture operation, default voice messaging, the button operation of default rule and default percussion operation.
19. device according to claim 16, it is characterised in that
The camouflage curriculum offering module, is configured to set i-th layer corresponded in the preceding n-1 layers of authentication mechanism to test
The camouflage information content of card mechanism, 1≤i≤n-1.
20. device according to claim 19, it is characterised in that the camouflage curriculum offering module, including:
3rd set submodule, be configured as obtain system default the information content, using the described information content got as
Corresponding to the camouflage information content of i-th layer of authentication mechanism;
And/or,
4th sets submodule, is configured as obtaining the sensitive content in the original information content, by the raw information
Content in appearance in addition to the sensitive content is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
5th sets submodule, and it is the information content that the original information content is set to be configured as receiving user, will be received
Described information content be used as the camouflage information content corresponding to i-th layer of authentication mechanism.
21. a kind of information display device, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The first kind verification operation for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism is received,
N >=2, the checking entrance of the first kind verification operation is the checking entrance of dominant prompting;
When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for original
The beginning information content is pretended;
The Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received, the Equations of The Second Kind verification operation is recessiveness
Verification operation;
When the Equations of The Second Kind verification operation is verified, the original information content is shown.
22. a kind of information concealment device, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The preceding n-1 layers of authentication mechanism verified by first kind verification operation, the checking of the first kind verification operation are set
Entrance is the checking entrance of dominant prompting, n >=2;
The n-th layer authentication mechanism verified by Equations of The Second Kind verification operation is set, and the Equations of The Second Kind verification operation is tested for recessiveness
Card operation;
Preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism are set with the camouflage information content, the camouflage information is used in institute
Shown when n-1 layers of authentication mechanism are verified before stating.
23. be stored with computer program, its feature on a kind of computer-readable recording medium, the computer-readable recording medium
It is, the computer program realizes method for information display as claimed in claim 1 when being executed by processor.
24. be stored with computer program, its feature on a kind of computer-readable recording medium, the computer-readable recording medium
It is, the computer program realizes information concealing method as claimed in claim 6 when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410429501.1A CN104219053B (en) | 2014-08-27 | 2014-08-27 | Method for information display, information concealing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410429501.1A CN104219053B (en) | 2014-08-27 | 2014-08-27 | Method for information display, information concealing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104219053A CN104219053A (en) | 2014-12-17 |
CN104219053B true CN104219053B (en) | 2017-11-07 |
Family
ID=52100217
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410429501.1A Active CN104219053B (en) | 2014-08-27 | 2014-08-27 | Method for information display, information concealing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104219053B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017028141A1 (en) * | 2015-08-16 | 2017-02-23 | 张焰焰 | Method and mobile terminal for logging in to account |
CN106897873A (en) * | 2015-12-21 | 2017-06-27 | 阿里巴巴集团控股有限公司 | A kind of frame display methods and device |
CN106896996B (en) * | 2015-12-21 | 2020-05-05 | 阿里巴巴集团控股有限公司 | Information image display method and device |
CN105933503B (en) * | 2016-03-29 | 2020-02-21 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN113434899A (en) * | 2016-03-30 | 2021-09-24 | 创新先进技术有限公司 | Method and terminal for displaying private information |
CN107635052A (en) * | 2016-07-18 | 2018-01-26 | 中兴通讯股份有限公司 | Message treatment method and device |
CN107644333A (en) * | 2016-07-22 | 2018-01-30 | 展讯通信(上海)有限公司 | Barcode scanning method of payment, device and payment terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101370209A (en) * | 2008-09-22 | 2009-02-18 | 深圳华为通信技术有限公司 | Information disguising method and system |
CN103559451A (en) * | 2013-10-21 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting and displaying privacy information |
CN103888607A (en) * | 2014-03-13 | 2014-06-25 | 惠州Tcl移动通信有限公司 | Method and system for viewing privacy short message services of mobile terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101499905A (en) * | 2008-02-02 | 2009-08-05 | 诚实科技股份有限公司 | Image password authentication system for mobile device and method therefor |
-
2014
- 2014-08-27 CN CN201410429501.1A patent/CN104219053B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101370209A (en) * | 2008-09-22 | 2009-02-18 | 深圳华为通信技术有限公司 | Information disguising method and system |
CN103559451A (en) * | 2013-10-21 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for protecting and displaying privacy information |
CN103888607A (en) * | 2014-03-13 | 2014-06-25 | 惠州Tcl移动通信有限公司 | Method and system for viewing privacy short message services of mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104219053A (en) | 2014-12-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104219053B (en) | Method for information display, information concealing method and device | |
CN103916233B (en) | A kind of information ciphering method and device | |
CN105138259B (en) | Operation executes method and device | |
CN105654302B (en) | Payment method and device | |
EP2605495B1 (en) | Mobile terminal and control method thereof | |
CN104391870B (en) | Logistics information acquisition methods and device | |
CN106210256A (en) | Mobile terminal and control method thereof | |
WO2016154898A1 (en) | Mobile terminal privacy protection method, protection apparatus, and mobile terminal | |
CN103455761B (en) | File encryption and decryption method and device and electronic device | |
CN103294941A (en) | Method for accessing private space and mobile device | |
CN104484593B (en) | terminal verification method and device | |
CN106020587A (en) | Method and device for message display | |
CN106896983A (en) | Interface display control method and device | |
CN106156561A (en) | Application locking method, application unlocking method and a device | |
CN106295294A (en) | Method for controlling mobile terminal and device | |
CN106529277A (en) | Message preview method and device | |
CN108111667A (en) | A kind of communication information encryption method, device and electronic equipment | |
CN107491681A (en) | Finger print information processing method and processing device | |
US20060218408A1 (en) | System and method for user authentication employing portable handheld electronic devices | |
CN107423378A (en) | Image display method and device | |
CN106845199A (en) | Object authentication method and device | |
CN107205198A (en) | The unlocking method and a device of microphone | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN107360322A (en) | Information cuing method and device | |
CN106778198A (en) | Perform the safety certifying method and device of operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |