CN111177770B - Sensitive information protection method, mobile equipment and storage device - Google Patents

Sensitive information protection method, mobile equipment and storage device Download PDF

Info

Publication number
CN111177770B
CN111177770B CN201811347982.6A CN201811347982A CN111177770B CN 111177770 B CN111177770 B CN 111177770B CN 201811347982 A CN201811347982 A CN 201811347982A CN 111177770 B CN111177770 B CN 111177770B
Authority
CN
China
Prior art keywords
sensitive information
instruction
state
information
mobile device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811347982.6A
Other languages
Chinese (zh)
Other versions
CN111177770A (en
Inventor
郭庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Network Scientific Shenzhen Co ltd
Original Assignee
Qiku Internet Network Scientific Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Network Scientific Shenzhen Co ltd filed Critical Qiku Internet Network Scientific Shenzhen Co ltd
Priority to CN201811347982.6A priority Critical patent/CN111177770B/en
Publication of CN111177770A publication Critical patent/CN111177770A/en
Application granted granted Critical
Publication of CN111177770B publication Critical patent/CN111177770B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a method for protecting sensitive information, mobile equipment and a storage device, wherein the method comprises the steps that the mobile equipment judges whether the sensitive information is in a foreground display state or not; if the sensitive information is in the foreground display state, judging whether the display state of the sensitive information is in a non-hidden state; if the display state of the sensitive information is a non-hidden state, detecting whether the mobile equipment is in an authorized user controllable state, and when the mobile equipment is detected to be not in the authorized user controllable state, performing protection processing on the sensitive information. By the mode, the protection efficiency of the sensitive information can be improved.

Description

Sensitive information protection method, mobile equipment and storage device
Technical Field
The present application relates to the field of electronic devices, and in particular, to a method for protecting sensitive information, a mobile device, and a storage device.
Background
With the rapid development of the mobile internet and the rapid popularization of mobile intelligent electronic devices, users submit various living and working demands of social contact, entertainment, business and the like to the mobile internet and the mobile intelligent electronic devices, and simultaneously store more sensitive information in the mobile intelligent electronic devices. The information can be prevented from leaking in the daily use process, so that the safety protection of the sensitive information is particularly necessary.
Disclosure of Invention
The application mainly solves the technical problem of providing a protection method, mobile equipment and a storage device for sensitive information, and can improve the protection efficiency of the sensitive information.
In order to solve the technical problems, the application adopts a technical scheme that: the method comprises the steps that mobile equipment judges whether the sensitive information is in a foreground display state or not; if the sensitive information is in the foreground display state, judging whether the display state of the sensitive information is in a non-hidden state; if the display state of the sensitive information is a non-hidden state, detecting whether the mobile equipment is in an authorized user controllable state, and when the mobile equipment is detected to be not in the authorized user controllable state, performing protection processing on the sensitive information.
Judging whether an instruction for storing sensitive information is received or not; if an instruction for storing the sensitive information is received, the storage instruction is not responded, or the sensitive information is protected when the storage instruction is executed.
The instruction for storing the sensitive information is to intercept a screen picture, and the protection processing of the sensitive information when the storing instruction is executed comprises the following steps: in the intercepted screen, the sensitive information has been blocked, replaced or mosaiced.
Judging whether an instruction for accessing the sensitive information is received or not; judging the access right of the access instruction, and when the visitor does not have the access right, not responding to the access instruction or performing protection processing on the sensitive information when executing the access sensitive information instruction.
The sensitive information is group chat information, the access authority of the access instruction is judged, and when the visitor does not have the access authority, the non-response access instruction comprises: the sensitive information carries the identification information, only the user matched with the identification information can receive the sensitive information, and other users can not receive the sensitive information.
Detecting whether a user leaves the mobile device or whether a new user joins the mobile device; and when detecting that the user leaves the mobile device or a new user joins the viewing mobile device, switching the display state of the sensitive information into a hidden state.
If the sensitive information is in a hidden state, detecting whether an instruction for decrypting the sensitive information is received; and if the decryption instruction is received, verifying the decryption instruction, and converting the sensitive information into non-hidden display after the verification is passed.
Wherein the sensitive information is replaced by random characters by a predetermined algorithm, and the characters used for each replacement are different.
In order to solve the technical problems, the application adopts another technical scheme that: there is provided a mobile device comprising a processor and a display, the processor coupled to the display, the processor configured to: judging whether the sensitive information is in a foreground display state or not; if the sensitive information is in the foreground display state, judging whether the display state of the sensitive information is in a non-hidden state; if the display state of the sensitive information is a non-hidden state, detecting whether the mobile equipment is in an authorized user controllable state, and when the mobile equipment is detected to be not in the authorized user controllable state, performing protection processing on the sensitive information.
In order to solve the technical problems, the application adopts another technical scheme that: there is provided an apparatus having a storage function, the apparatus storing a program which, when executed, enables the above-described protection method of sensitive information.
The beneficial effects of the application are as follows: in the method, the display state of the sensitive information is detected, the control state of the sensitive information is detected by a user, and the sensitive information which is displayed in a non-hidden state and is not in an authorized user controllable state is protected, so that the sensitive information can be selectively processed, and the protection efficiency of the sensitive information is improved.
Drawings
FIG. 1 is a flow chart of a first embodiment of a method for protecting sensitive information according to the present application;
fig. 2 is a schematic structural diagram of a first embodiment of the mobile device of the present application;
fig. 3 is a schematic structural view of a first embodiment of the device with memory function of the present application.
Detailed Description
In order to make the objects, technical solutions and effects of the present application clearer and more specific, the present application will be described in further detail below with reference to the accompanying drawings and examples.
The application provides a method for protecting sensitive information, which regulates and controls the protection processing of the sensitive information by monitoring the control state of an authorized user on the sensitive information. By the method, the processing efficiency of the sensitive information is improved, and a user can check the sensitive information more conveniently.
Referring to fig. 1, fig. 1 is a flow chart of a first embodiment of a method for protecting sensitive information according to the present application. In this embodiment, the method for protecting sensitive information includes the steps of:
s101: the mobile device determines whether the sensitive information is in a foreground display state.
Wherein, the mobile device stores a plurality of sensitive information, and not all the information is displayed on the foreground interface. When it is in the background or stored only in memory, there is a protection policy of the memory or of the application. When the sensitive information is in a foreground display state, the sensitive information is easy to be seen by other people, so that secret leakage or embarrassment is caused. There is a need to enhance protection of sensitive information.
S102: if the sensitive information is in the foreground display state, judging whether the display state of the sensitive information is in the non-hidden state.
Based on the prior art, when the sensitive information is displayed, the sensitive information is hidden for protecting the sensitive information, and the real information content is not displayed. Only after the user authorization is verified can normal display be performed (non-hidden state display).
S103: if the display state of the sensitive information is a non-hidden state, detecting whether the mobile equipment is in an authorized user controllable state, and when the mobile equipment is detected to be not in the authorized user controllable state, performing protection processing on the sensitive information.
After the authorized user verifies and displays the sensitive information, the sensitive information is truly displayed, and if the authorized user leaves at the moment, the mobile equipment is in an unsupervised state, and at the moment, the mobile equipment is easily peeped or photographed and stored by other people when the authorized user is in a gap, so that information leakage is caused. On the other hand, if all the information is set to be displayed in a hidden mode, even if the mobile device is in a user-controllable state, verification is needed to display the information, for example, the user chatts in a personal room group, the information is not checked for a while in the middle, and one-step verification is needed when the user checks again, so that the effect is unchanged. Therefore, the control cannot be performed according to the actual environmental conditions.
The method for protecting the sensitive information can detect and judge the control state of the user on the sensitive information, and can avoid hiding the sensitive information in the control range of the user, thereby reducing the processing flow and omitting the decryption flow of the user. I.e. the user can manage the sensitive information without being hidden in case of leakage through the screen view. When the sensitive information is detected to be separated from the supervision of the user, the sensitive information is subjected to hiding processing.
In one embodiment, whether an instruction for storing sensitive information is received is judged; if an instruction for storing the sensitive information is received, the storage instruction is not responded, or the sensitive information is protected when the storage instruction is executed.
In particular, save means that the sensitive information may be stored elsewhere or otherwise, which may be out of the control of the user, so that the save instruction may be regarded as a signal that the sensitive information is about to be out of the control of the user. When this signal is received, the sensitive information may be protected either unresponsive or when a save instruction is executed. When the save instruction is not executed, the popup window can remind the user whether to try to save the information, whether to operate the user or not, and whether to execute the operation, and when the user approval is obtained, the operation is executed again. When the storage instruction is executed, the sensitive information is protected, namely, the stored information is subjected to hiding treatment, the real information content is not stored, and if the real information content needs to be acquired and stored, approval and approval of a user are required.
In one embodiment, the instruction for storing the sensitive information is to intercept a screen picture, and the protecting the sensitive information when executing the storing instruction includes: in the intercepted screen, the sensitive information has been blocked, replaced or mosaiced. Specifically, if the sensitive information is actually displayed on the screen, the sensitive information becomes a picture form after being stored by the screenshot, cannot be modified and possibly is leaked and transmitted, so that when the operation is performed, the sensitive information is hidden at the instant of storing the screenshot if the operation is not authorized by a user. For example, when the screenshot is recorded in chat, the sensitive information content, the user head portrait for sending the sensitive information, the group chat name and the like can be mosaic-dropped. If the user wants to intercept the real content, the user needs to authorize.
In one embodiment, whether an instruction for accessing the sensitive information is received is determined; judging the access right of the access instruction, and when the visitor does not have the access right, not responding to the access instruction or performing protection processing on the sensitive information when executing the access sensitive information instruction. In particular, the access information is aware that other users want to learn the content of the sensitive information, and the sensitive information may be out of the control of the user, so the access instruction may be regarded as a signal that the sensitive information is out of the control of the user. When this signal is received, the sensitive information may be protected from response or when an access instruction is executed. When the access instruction is not executed, the popup window can remind the user that the user is attempting to access the sensitive information, whether the user is allowed to execute the operation or not is agreed to execute the operation, and when the user approval is obtained, the operation is executed again. When the access instruction is executed, the sensitive information is protected, namely, the information accessed by the visitor is subjected to hiding processing, the real information content is not displayed, and if the real information content needs to be acquired and checked, approval and approval of the user are required.
In one embodiment, the sensitive information is group chat information, the access authority of the access instruction is judged, and when the visitor does not have the access authority, the non-response access instruction comprises: the sensitive information carries the identification information, only the user matched with the identification information can receive the sensitive information, and other users can not receive the sensitive information. In group chat, in principle, each user can view group chat information, however, if one wants to see a certain piece of information only for a certain person, for example, only one member is thought to do one thing, the information can be identified, only one member can be seen, after the information is sent out, other member information can not see the information, only one piece of information is reminded to be received, and the information content is not displayed; or the information is not received directly. For example, when the information is sent, the information can be displayed in a @ @ three way, wherein @ three way can be used for identifying that the information reminds the three way to view, and the information can be displayed in a still more than one @ way, so that the information can only be viewed in the three way.
Wherein in one embodiment, it is detected whether the user leaves the mobile device or whether a new user joins the viewing mobile device; and when detecting that the user leaves the mobile device or a new user joins the viewing mobile device, switching the display state of the sensitive information into a hidden state. Specifically, when the user leaves the mobile device, it means that if someone comes to view the sensitive information at this time, the user cannot prevent the sensitive information from being out of the control of the user, so the user leaving the mobile device can be regarded as a signal that the sensitive information is about to be out of the control of the user. When this signal is received, the sensitive information is switched to the hidden state. When a new user is detected to be added to watch the mobile device, if a person steals the information after standing behind the user, the user may not find the information at this time, so that sensitive information is leaked. The front camera of the mobile device, a sound receiver and other modes can be utilized to monitor whether a person approaches or gets away; the whole environment around the user can be detected by means of the indoor camera.
In this way, the sensitive information does not need to be encrypted from time to time, each piece of sensitive information does not need to be encrypted, and the protection processing is performed only when the sensitive information is possibly checked for leakage. The information processing efficiency is improved.
In one embodiment, the protecting the sensitive information includes: the sensitive information is replaced by random characters by a predetermined algorithm, and the characters used for each replacement are different. Specifically, when the special character is used for replacement, certain information or information of a certain person can be replaced by the same character, so that a user can conveniently and quickly judge the information type; but this approach is easy to decipher for a long time; a predetermined algorithm may be set by which replacement characters are randomly generated for each piece of information; the replacement character can be any combination of numbers, characters and special symbols; and the characters which are replaced each time are controlled to be different, so that other people can be prevented from decoding and analyzing the sensitive information according to the encryption rule.
In one embodiment, if the sensitive information is in a hidden state, detecting whether an instruction for decrypting the sensitive information is received; and if the decryption instruction is received, verifying the decryption instruction, and converting the sensitive information into non-hidden display after the verification is passed. Specifically, password unlocking can be set, or password unlocking can be set, the system detects that the user clicks the keyword area, if no password is set, the original text is directly displayed, and if the password is set, the password unlocking frame is pulled up, or face recognition unlocking, voice control unlocking and the like are performed for unlocking.
On the basis, the application also provides a mobile device, please refer to fig. 2, fig. 2 is a schematic structural diagram of a first embodiment of the mobile device of the application. In this embodiment, the mobile device 20 includes a processor 201 and a display 202, the processor 201 is coupled to the display 202, and the processor 201 is configured to determine whether the sensitive information is in a foreground display state; if the sensitive information is in the foreground display state, judging whether the display state of the sensitive information is in a non-hidden state; if the display state of the sensitive information is a non-hidden state, detecting whether the mobile equipment is in an authorized user controllable state, and when the mobile equipment is detected to be not in the authorized user controllable state, performing protection processing on the sensitive information. When the mobile device processes the sensitive information, the protection method of the sensitive information can be executed, and the specific implementation process refers to the description of the above embodiment, which is not repeated herein. The mobile device can be a mobile phone, a tablet computer, a portable computer, an intelligent wearable device and the like.
The present application also provides a device with a storage function, please refer to fig. 3, fig. 3 is a schematic structural diagram of a first embodiment of the device with a storage function. In this embodiment, the storage device 30 stores a program 301, and the program 301 realizes the above-described protection method of sensitive information when executed. The specific working process is identical to that of the above method embodiment, so that the detailed description thereof will be omitted herein, and the detailed description of the corresponding method steps will be referred to above. The device having the storage function may be a portable storage medium such as a U-disk, an optical disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or the like, or may be a terminal, a server, or the like.
According to the scheme, the method for protecting the sensitive information is provided, in the method, the display state of the sensitive information is detected, meanwhile, the control state of the sensitive information is detected for a user, the sensitive information which is displayed in a non-hidden state and is not in an authorized user controllable state is protected, the sensitive information can be selectively processed, and the protection efficiency of the sensitive information is improved.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application.
The foregoing description is only of embodiments of the present application, and is not intended to limit the scope of the application, and all equivalent structures or equivalent processes using the descriptions and the drawings of the present application or directly or indirectly applied to other related technical fields are included in the scope of the present application.

Claims (10)

1. The method for protecting the sensitive information is characterized in that the sensitive information is group chat information, and the method comprises the following steps:
the mobile device judges whether the sensitive information is in a foreground display state or not;
if the sensitive information is in a foreground display state, judging whether the display state of the sensitive information is in a non-hidden state or not;
if the display state of the sensitive information is a non-hidden state, detecting whether the mobile equipment is in an authorized user controllable state, and when the mobile equipment is detected to be not in the authorized user controllable state, performing protection processing on the sensitive information;
if the display state of the sensitive information is a non-hidden state, detecting whether the mobile device is in an authorized user controllable state, and when detecting that the mobile device is not in the authorized user controllable state, performing protection processing on the sensitive information comprises:
judging whether an instruction for storing the sensitive information is received or not, and if the instruction for storing the sensitive information is received, executing the instruction for storing the sensitive information and protecting the sensitive information;
or judging whether an instruction for accessing the sensitive information is received or not, judging the access authority of the instruction for accessing the sensitive information, and performing protection processing on the sensitive information when the instruction for accessing the sensitive information is executed when the visitor does not have the access authority.
2. The method for protecting sensitive information according to claim 1, wherein if the display state of the sensitive information is a non-hidden state, detecting whether the mobile device is in an authorized user controllable state, and when detecting that the mobile device is not in the authorized user controllable state, protecting the sensitive information further comprises:
judging whether an instruction for storing the sensitive information is received or not;
and if the instruction for storing the sensitive information is received, not responding to the instruction for storing the sensitive information.
3. The method for protecting sensitive information according to claim 2, wherein the instruction for storing sensitive information is to intercept a screen, and the protecting the sensitive information when the storing instruction is executed includes:
in the intercepted screen, the sensitive information is blocked, replaced or mosaiced.
4. The method for protecting sensitive information according to claim 1, wherein if the display state of the sensitive information is a non-hidden state, detecting whether the mobile device is in an authorized user controllable state, and when detecting that the mobile device is not in the authorized user controllable state, protecting the sensitive information further comprises:
judging whether an instruction for accessing the sensitive information is received or not;
and judging the access authority of the access instruction, and when the visitor does not have the access authority, not responding to the instruction for accessing the sensitive information.
5. The method according to claim 4, wherein determining the access right of the access instruction, when the visitor does not have the access right, not responding to the access instruction, comprises:
the sensitive information carries identification information, only users matched with the identification information can receive the sensitive information, and other users cannot receive the sensitive information.
6. The method for protecting sensitive information according to claim 1, wherein if the display state of the sensitive information is a non-hidden state, detecting whether the mobile device is in an authorized user controllable state, and when detecting that the mobile device is not in the authorized user controllable state, protecting the sensitive information further comprises:
detecting whether a user leaves the mobile device or whether a new user joins in watching the mobile device;
and when detecting that the user leaves the mobile equipment or a new user joins in watching the mobile equipment, switching the display state of the sensitive information into a hidden state.
7. The method according to claim 1, wherein if the sensitive information is in a hidden state, detecting whether an instruction for decrypting the sensitive information is received;
and if the decryption instruction is received, verifying the decryption instruction, and converting the sensitive information into non-hidden display after the verification is passed.
8. The method for protecting sensitive information according to claim 1, wherein the protecting the sensitive information comprises:
the sensitive information is replaced by random characters by a predetermined algorithm, and the characters used for each replacement are different.
9. A mobile device comprising a processor and a display, the processor coupled to the display, the processor configured to:
judging whether the sensitive information is in a foreground display state or not, wherein the sensitive information is group chat information;
if the sensitive information is in a foreground display state, judging whether the display state of the sensitive information is in a non-hidden state or not;
if the display state of the sensitive information is a non-hidden state, detecting whether the mobile equipment is in an authorized user controllable state, and when the mobile equipment is detected to be not in the authorized user controllable state, performing protection processing on the sensitive information;
if the display state of the sensitive information is a non-hidden state, detecting whether the mobile device is in an authorized user controllable state, and when detecting that the mobile device is not in the authorized user controllable state, performing protection processing on the sensitive information comprises:
judging whether an instruction for storing the sensitive information is received or not, and if the instruction for storing the sensitive information is received, executing the instruction for storing the sensitive information and protecting the sensitive information;
or judging whether an instruction for accessing the sensitive information is received or not, judging the access authority of the instruction for accessing the sensitive information, and performing protection processing on the sensitive information when the instruction for accessing the sensitive information is executed when the visitor does not have the access authority.
10. An apparatus having a storage function, characterized in that the apparatus stores a program which, when executed, enables the protection method of sensitive information as claimed in any one of claims 1 to 8.
CN201811347982.6A 2018-11-13 2018-11-13 Sensitive information protection method, mobile equipment and storage device Active CN111177770B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811347982.6A CN111177770B (en) 2018-11-13 2018-11-13 Sensitive information protection method, mobile equipment and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811347982.6A CN111177770B (en) 2018-11-13 2018-11-13 Sensitive information protection method, mobile equipment and storage device

Publications (2)

Publication Number Publication Date
CN111177770A CN111177770A (en) 2020-05-19
CN111177770B true CN111177770B (en) 2023-09-01

Family

ID=70653729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811347982.6A Active CN111177770B (en) 2018-11-13 2018-11-13 Sensitive information protection method, mobile equipment and storage device

Country Status (1)

Country Link
CN (1) CN111177770B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115103055B (en) * 2022-06-17 2023-10-03 度小满科技(北京)有限公司 Loss processing method, loss processing device, mobile terminal and readable storage medium
CN115955325B (en) * 2022-10-26 2024-02-02 贝壳找房(北京)科技有限公司 Information management and control method and system and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426222A (en) * 2017-07-28 2017-12-01 广东欧珀移动通信有限公司 Information protecting method, device, storage medium and electronic equipment
CN107992730A (en) * 2017-11-28 2018-05-04 宇龙计算机通信科技(深圳)有限公司 A kind of screen message guard method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9406157B2 (en) * 2014-04-21 2016-08-02 Airwatch Llc Concealing sensitive information on a display

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426222A (en) * 2017-07-28 2017-12-01 广东欧珀移动通信有限公司 Information protecting method, device, storage medium and electronic equipment
CN107992730A (en) * 2017-11-28 2018-05-04 宇龙计算机通信科技(深圳)有限公司 A kind of screen message guard method and device

Also Published As

Publication number Publication date
CN111177770A (en) 2020-05-19

Similar Documents

Publication Publication Date Title
US20210073421A1 (en) Video-based privacy supporting system
US11106768B2 (en) Methods and systems for generating history data of system use and replay mode for identifying security events showing data and user bindings
US11093067B2 (en) User authentication
CN101529366B (en) Identification and visualization of trusted user interface objects
US10572694B2 (en) Event-based display information protection system
US10607035B2 (en) Method of displaying content on a screen of an electronic processing device
CN109274582B (en) Instant communication message display method, device, equipment and storage medium
KR102474243B1 (en) A Method and Apparatus For Providing a Secure Mode for User Device
US20210303717A1 (en) Live data viewing security
US20240056811A1 (en) Verification methods and apparatuses for electronic device insurance
CN109858274A (en) The method and apparatus that message is shown
CN111177770B (en) Sensitive information protection method, mobile equipment and storage device
CN111737774B (en) Privacy peep-proof method and intelligent equipment
Frankland et al. Side channels, compromising emanations and surveillance: Current and future technologies
CN112912882A (en) Control method and device of terminal equipment and storage medium
US11989336B2 (en) Electronic privacy filter activation
GB2566043A (en) A method of displaying content on a screen of an electronic processing device
US20230087884A1 (en) Controlling a screenshot function to obfuscate sensitive information in a screenshot
US20230101658A1 (en) Duress-based user account data protection
US20230342505A1 (en) Protecting user data privacy in a privacy zone
CN115203737A (en) Method for displaying data and electronic equipment
CN105991513A (en) Data protection method, device and mobile terminal
WO2016140548A1 (en) Method and apparatus for providing security mode to user device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant