CN112000999A - Information protection method and device - Google Patents

Information protection method and device Download PDF

Info

Publication number
CN112000999A
CN112000999A CN202010809845.0A CN202010809845A CN112000999A CN 112000999 A CN112000999 A CN 112000999A CN 202010809845 A CN202010809845 A CN 202010809845A CN 112000999 A CN112000999 A CN 112000999A
Authority
CN
China
Prior art keywords
page
screen
application
information
displayed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010809845.0A
Other languages
Chinese (zh)
Other versions
CN112000999B (en
Inventor
张卉
田燕红
刘金凤
杨洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010809845.0A priority Critical patent/CN112000999B/en
Publication of CN112000999A publication Critical patent/CN112000999A/en
Application granted granted Critical
Publication of CN112000999B publication Critical patent/CN112000999B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Controls And Circuits For Display Device (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure provides an information protection method, and relates to the field of information security. The method comprises the following steps: when an application page needs to be displayed for a target application, acquiring configuration parameters set for the target application; and if the acquired configuration parameter representation needs to perform information protection processing on the page, modifying the screen parameter and/or increasing page protection information, and then displaying the application page. The present disclosure also provides an information protection apparatus, an electronic device, and a computer-readable storage medium.

Description

Information protection method and device
Technical Field
The present disclosure relates to the field of information security, and in particular, to an information protection method and apparatus.
Background
At present, screens of electronic equipment such as mobile phones and computers are usually peeped-proof by using a physical technology. Specifically, the screen may be attached with a privacy sheet using a micro louver optical technique. After the peep-proof sheet is used, a user can see the screen content in a visible area (usually within a range of 60 degrees), and can only see a black painting in a non-visible area. Therefore, the physical device can effectively protect the privacy of the user.
However, in the process of implementing the embodiments of the present disclosure, the inventors found that the peep-proof sheet has certain disadvantages: firstly, the peep-proof purpose can be achieved only by means of the peep-proof structure of the ultra-fine shutter, and if the peep-proof sheet is damaged, the peep-proof sheet needs to be replaced, so that the use is inconvenient; second, electronic equipment does not need to carry out whole journey peep-proof and intervene in the use, but to the peep-proof piece, either the selection is not used, or the selection is used to just must carry out whole journey peep-proof and intervene in case use the peep-proof piece, lead to screen luminance to reduce from this, long-term use easily leads to user's visual fatigue, thereby can produce harmful effects to the eyesight.
Disclosure of Invention
One aspect of the present disclosure provides an information protection method, including: when an application page needs to be displayed for a target application, acquiring configuration parameters set for the target application; and if the acquired configuration parameter representation needs to perform information protection processing on the page, modifying the screen parameter and/or adding page protection information, and then displaying the application page.
Optionally, if the obtained configuration parameter represents that information protection processing needs to be performed on the page, determining whether to perform information protection processing on the page by using a default information protection strategy; in response to determining that the page is information protected using the default information protection policy, performing the following operations prior to displaying each application page: determining whether the application page to be displayed currently needs to be subjected to information protection processing; in response to determining that the application page to be displayed currently needs to be subjected to information protection processing, determining whether the current screen parameter is an original screen parameter; modifying the screen parameters in response to determining that the current screen parameters are the original screen parameters; and/or adding page protection information in response to determining that the application page to be displayed currently needs to be subjected to information protection processing.
Optionally, the method further comprises: in response to determining that the current screen parameter is not the original screen parameter, no screen parameter modification is performed.
Optionally, the method further comprises: determining whether the current screen parameter is an original screen parameter in response to determining that the application page to be displayed currently does not need to be subjected to information protection processing; in response to determining that the current screen parameter is an original screen parameter, not making a screen parameter modification; or in response to determining that the current screen parameter is not the original screen parameter, changing the screen parameter back to the original screen parameter.
Optionally, the method further comprises: in response to determining not to perform information protection processing on the page using the default information protection policy, performing the following: when the first application page is displayed, screen parameters are modified and/or page protection information is added, and then the application page is displayed.
Optionally, the method further comprises: when a second application page behind the first application page is displayed, screen parameters are not modified, and the display of the application page is directly performed; or when the second application page is displayed, the screen parameters are not modified, page protection information is added firstly, and then the application page is displayed.
Optionally, the method further comprises: and changing the screen parameters back to the original screen parameters after responding to that the target application is closed or switched to other applications which do not need information protection processing on the page.
Optionally, the determining whether the application page to be currently displayed needs to be subjected to information protection processing includes: detecting whether an application page to be displayed currently contains preset keywords and/or preset page elements; and determining that the current application page to be displayed needs information protection processing in response to detecting that the current application page to be displayed contains the preset keywords and/or the preset page elements.
Optionally, the method further comprises: covering the added page protection information on the whole application page; or the added page protection information is covered on the area of the application page, which is associated with the preset keyword and/or the preset page element.
Optionally, the page protection information includes: page watermarking; when the added page watermark is overlaid on the whole application page, the size and/or the spacing of the elements in the page watermark are controlled so as to enable part or all of the sensitive information on the area associated with the preset keyword and/or the preset page element to be shielded.
Optionally, the element is in a translucent state.
Optionally, the method further comprises: and if the acquired configuration parameter representation does not need to perform information protection processing on the page, directly displaying the application page.
Optionally, the screen brightness after the screen parameter is modified is lower than the screen brightness before the screen parameter is modified; and/or the screen resolution after modifying the screen parameters is lower than the screen resolution before modifying the screen parameters.
Another aspect of the present disclosure provides an information protection apparatus including: the system comprises an acquisition module, a display module and a display module, wherein the acquisition module is used for acquiring configuration parameters set for a target application when the application page needs to be displayed for the target application; and the processing module is used for modifying the screen parameters and/or increasing the page protection information firstly and then displaying the application page under the condition that the acquired configuration parameter represents that the information protection processing needs to be carried out on the page.
Another aspect of the present disclosure provides an electronic device including: one or more processors; a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods of the embodiments of the present disclosure.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions that, when executed, implement the method of embodiments of the present disclosure.
Another aspect of the present disclosure provides a computer program comprising computer executable instructions that when executed perform the method of embodiments of the present disclosure.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario suitable for an information protection method and apparatus according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of an information protection method according to an embodiment of the present disclosure;
3A-3C schematically illustrate application scenarios that require and do not require information protection in accordance with embodiments of the present disclosure;
FIG. 4 schematically illustrates an effect diagram of adding a page watermark according to an embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow diagram of an information protection method according to yet another embodiment of the present disclosure;
FIG. 6 schematically illustrates a block diagram of an information protection apparatus according to an embodiment of the present disclosure; and
fig. 7 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It is to be understood that such description is merely illustrative and not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). Additionally, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
As described above, in the process of implementing the embodiments of the present disclosure, the inventors found that there are certain disadvantages in the peep-proof sheet: firstly, the peep-proof purpose can be achieved only by means of the peep-proof structure of the ultra-fine shutter, and if the peep-proof sheet is damaged, the peep-proof sheet needs to be replaced, so that the use is inconvenient; second, electronic equipment does not need to carry out whole journey peep-proof and intervene in the use, but to the peep-proof piece, either the selection is not used, or the selection is used to just must carry out whole journey peep-proof and intervene in case use the peep-proof piece, lead to screen brightness to reduce from this, long-term use easily leads to user's visual fatigue, thereby can produce harmful effects to eyesight.
In order to overcome the technical problem that the peep-proof function in the related art is inconvenient to use, the embodiment of the disclosure provides that a software peep-proof means is used for controlling the display effect of a screen to replace a hardware peep-proof means. For example, the screen brightness is reduced or the screen resolution is reduced by adjusting the screen parameters to achieve the peep-proof effect. For example, protection information such as page watermarks is added to the application pages to reduce the image recognition rate, and further the peep-proof effect is achieved.
Further, in order to overcome the defect that the vision of a user is tired and even the vision of the user is affected due to the fact that the whole-course peep-proof intervention is carried out in the related art, the embodiment of the disclosure provides that the peep-proof function can be flexibly turned on or turned off according to actual requirements. For example, the peep-proof function is turned on when peep-proof intervention is required, and the peep-proof function is turned off when peep-proof intervention is not required, so that the service time of the peep-proof function can be effectively shortened, and the adverse effects of the peep-proof function on the use experience and the eyesight of a user are reduced.
Based on this, the disclosed embodiments provide an information protection method and an information protection device to which the method can be applied. The method comprises the steps of acquiring configuration parameters set for a target application when the application page needs to be displayed for the target application; and if the acquired configuration parameter representation needs to perform information protection processing on the page, modifying the screen parameter and/or increasing page protection information, and then displaying the application page.
Fig. 1 schematically illustrates an application scenario suitable for the information protection method and apparatus according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of an application scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, in the application scenario, the user needs to input a mobile phone number "159 × 2559" in the application page. Since the mobile phone number "159 × 2559" relates to privacy of an individual, information protection processing is generally required.
The information protection method and device provided by the embodiment of the disclosure can be applied to such scenes. The method and the device can ensure that the peep-proof function is more convenient to use on the basis of protecting information safety, and can effectively reduce the service time of the peep-proof function, thereby reducing the adverse effect of the peep-proof function on the use experience and the eyesight of a user.
The present disclosure will be described in detail below with reference to the drawings and specific embodiments.
Fig. 2 schematically shows a flow chart of an information protection method according to an embodiment of the present disclosure.
As shown in fig. 2, the method may include operations S201 to S202.
In operation S201, when the application page needs to be exposed for the target application, the configuration parameters set for the target application are acquired.
In operation S202, if the acquired configuration parameter indicates that information protection processing needs to be performed on the page, the screen parameter may be modified and/or page protection information may be added, and then the application page may be displayed.
Or, in the embodiment of the present disclosure, if the obtained configuration parameter representation does not need to perform information protection processing on the page, the display of the application page may be directly performed, that is, the page of the application may be normally displayed.
It should be understood that, in the embodiments of the present disclosure, the target application may include any application installed on the electronic device, and the embodiments of the present disclosure are not limited herein.
Specifically, in operation S201, when the target application is started or switched to the target application by another application, it may be determined that the relevant page of the target application needs to be displayed. At this time, the configuration parameters preset by the user for the target application may be read from the data warehouse, or the configuration parameters temporarily set by the user for the target application may be read.
It should be noted that, in the embodiment of the present disclosure, the configuration parameters may include setting parameters that indicate that the peep-proof function is turned on, the peep-proof function is turned off, and the peep-proof function is a default setting.
Further, after operation S201, it may also be determined which type of setting parameters the obtained configuration parameters include, and then it is determined whether information protection processing needs to be performed on the page of the target application based on the setting parameters included in the configuration parameters, and then operation S202 is performed.
In one embodiment of the disclosure, if it is determined that the peep prevention function is turned on or is set as a default based on the configuration parameter, the page of the target application needs to be subjected to information protection processing. Otherwise, if the peep prevention function is determined to be closed based on the configuration parameters, the representation does not need to perform information protection processing on the page of the target application.
Further, at least three embodiments may be included in operation S202.
For example, in embodiment 1, if the information protection process is required, only the screen parameter may be adjusted before the application page is presented.
In the disclosed embodiment, the screen parameter may include, but is not limited to, at least one of screen brightness, screen resolution, and the like. Specifically, in the embodiment of the present disclosure, the screen brightness after the screen parameter is modified is lower than the screen brightness before the screen parameter is modified; and/or the screen resolution after modifying the screen parameters is lower than the screen resolution before modifying the screen parameters. Therefore, the method can effectively interfere the sensitive information of the user related to privacy, safety and the like which is spied by outsiders.
For example, in embodiment 2, if the information protection processing is required, only the page protection information may be added before the application page is presented. In the embodiment of the disclosure, the page protection information may include all information that can reduce the image recognition rate, such as a page watermark or other semi-transparent gray layer, which is covered on the application page, so as to effectively interfere outsiders to snoop sensitive information of the user relating to privacy, security, and the like.
For example, in embodiment 3, if the information protection processing is required, the screen parameters may be adjusted while adding the page protection information before the application page is displayed. Therefore, the effect of the intervention outsiders on snooping sensitive information of the user in terms of privacy, safety and the like can be enhanced.
In addition, in the embodiment of the present disclosure, the modified screen parameters and the page protection information that needs to be added may be default for the system or may be set by the user. Wherein user settings may be preferentially used if there are both system defaults and user settings. Further, in the embodiment of the present disclosure, whether the system is default or set by the user, the modified screen parameters and the page protection information to be added may be stored in the data warehouse, and may be directly read from the data warehouse when in use.
Through this disclosed embodiment, adopt the software peep-proof means to control the display effect of screen and replace the hardware peep-proof means, the user can set up the peep-proof function according to actual demand is nimble. For example, the peep-proof function is turned on when peep-proof intervention is required, and turned off when peep-proof intervention is not required. Therefore, the service time of the peep-proof function can be effectively shortened, the adverse effects of the peep-proof function on the user experience and eyesight are reduced, and the flexibility of the use of the peep-proof function can be improved.
In addition, in the embodiment of the present disclosure, a list of applications with a default peep-proof function being turned on (for example, applications related to payment) and search rules of peep-proof pages (for example, pages related to keywords such as registration, login, and payment) may be stored in the data repository, and page protection information such as a default screen brightness value, a default resolution value, and a watermark pattern shape, and page protection information such as an alternative watermark pattern shape may be stored.
It should be understood that, in the embodiment of the present disclosure, the default screen brightness value may be a relative screen brightness value. Therefore, when modifying the screen brightness value, the brightness value of the actual peep-proof screen can be obtained by subtracting the relative screen brightness value stored in advance from the current screen brightness value obtained by the system detection. Similarly, in the disclosed embodiment, the default screen resolution value may be a resolution percentage. Thus, in modifying the screen resolution value, the resolution of the actual privacy screen may be obtained by multiplying the current screen resolution obtained through the system detection by the pre-stored resolution percentage. In addition, in the embodiment of the present disclosure, the page watermark patterns may be set to be gray by default, and the current time is displayed in a fixed-interval arrangement. While the system may also provide other watermarking patterns.
For example, news clients typically do not involve user-sensitive information in terms of privacy, security, etc., nor do users typically turn on privacy protection for such applications. As shown in fig. 3A, when a user opens a news client as marked by a dashed box, each application page of the client can be directly displayed without modifying the phase parameters of the screen and adding related protection information to the page.
For example, bank clients and payment clients generally involve user-sensitive information in terms of privacy, security, and the like, and a user may or may not forget to turn on a privacy function for an application such as this. As shown in fig. 3B, when the user opens the bank client marked with a dotted line frame, or as shown in fig. 3C, when switching from the news client to the bank client, for an application scenario in which the user has started the privacy protection function, before displaying each application page of the bank client, the facies parameter of the screen may be modified and/or related protection information may be added to each application page.
For example, shopping clients and social clients may also relate to user sensitive information in terms of privacy, security, etc., but there may be few pages that relate to sensitive information. For example, only when the payment page relates to sensitive information such as a user name, a user password, a user detailed address and a contact way, in this case, the peep-proof function may not be turned on or turned off, but the system default peep-proof function is utilized, that is, only when the application page related to the sensitive information is displayed, the phase parameter of the screen is modified and/or the related protection information is added to each application page.
Specifically, in the embodiment of the present disclosure, a user may set, through the peep-proof setting module, to turn on and turn off the peep-proof function, set an application list for turning on the peep-proof function and an application list for turning off the peep-proof function, and set a screen brightness value, a screen resolution value, a watermark pattern shape, and the like corresponding to the turning on of the peep-proof function. In addition, the user can also upload related protection information such as page watermarks and the like through the peep-proof setting module. Wherein the peep-proof setting module also provides the setting functions of watermark patterns, watermark colors, pattern spacing and the like.
Through the embodiment of the disclosure, the peep-proof purpose can be achieved without physical equipment (such as a peep-proof sheet), and the use is more convenient. In addition, various parameters (such as screen parameters and the like) can be configured according to the requirements of users, so that the requirements of different users are met. Moreover, the peep-proof function can be turned on and off at any time according to the needs of the user, the influence of the peep-proof function on the user experience and the eyesight is reduced as much as possible, and the visual fatigue problem caused by the peep-proof function is reduced as much as possible.
As an optional embodiment, if the obtained configuration parameter indicates that information protection processing needs to be performed on the page, it is determined whether to perform information protection processing on the page using a default information protection policy. In response to determining to perform information protection processing on the pages using a default information protection policy, performing the following operations prior to exposing each application page: determining whether the application page to be displayed currently needs information protection processing; in response to determining that the application page to be displayed currently needs to be subjected to information protection processing, determining whether the current screen parameter is an original screen parameter; modifying the screen parameters in response to determining that the current screen parameters are the original screen parameters; and/or adding page protection information in response to determining that the application page to be displayed currently needs to be subjected to information protection processing.
Further, as another optional embodiment, the method may further include: in response to determining that the current screen parameter is not the original screen parameter, no screen parameter modification is performed.
Specifically, in the embodiment of the present disclosure, if the obtained configuration parameter indicates that the user does not start the peep-proof function nor the peep-proof function for the target application, it may be detected whether the target application has a record in the default application list. And if the target application is detected to have a record in the default application list, considering that the information protection processing can be carried out on the relevant page of the target application by using a default information protection strategy.
Since not all pages of the application recorded in the default application list relate to user sensitive information such as privacy and security, when information protection processing is performed on the relevant pages of the application in the list by using a default information protection policy, it may be determined whether each page to be displayed relates to user sensitive information. And if the page is determined to relate to the user sensitive information, displaying the page by using the screen display effect in the peep-proof mode. Otherwise, if the page is determined not to relate to the user sensitive information, displaying the page by using the screen display effect in the normal mode.
Illustratively, in the embodiment of the present disclosure, if the pages a to C are three pages that need to be presented continuously, and the pages a and C relate to user sensitive information, and the page B does not relate to the user sensitive information, the modified screen parameters need to be used and/or page protection information needs to be added to the page a when the page a is presented. When jumping from page a to page B, the modified screen parameters need to be restored to the screen parameters before modification (original screen parameters). When the page B jumps to the page C, the original screen parameters need to be modified again to the modified screen parameters (screen parameters in the peep-proof mode) and/or page protection information needs to be added to the page C.
Or exemplarily, in the embodiment of the present disclosure, if the pages a to C are three pages that need to be presented continuously, and the page a does not relate to the user-sensitive information, and the pages B and C relate to the user-sensitive information, the original screen parameters may be directly used when the page a is presented. When the page A jumps to the page B, the original screen parameter needs to be modified into the screen parameter in the peep-proof mode and/or page protection information needs to be added to the page B. When jumping from the page B to the page C, the screen parameters in the peep-proof mode can be kept unchanged and/or page protection information can be added to the page C.
As an alternative embodiment, the method may further comprise: in response to determining that the application page to be currently displayed does not need to be subjected to information protection processing, determining whether the current screen parameter is an original screen parameter; in response to determining that the current screen parameter is an original screen parameter, not modifying the screen parameter; or in response to determining that the current screen parameter is not the original screen parameter, changing the screen parameter back to the original screen parameter.
Specifically, in the embodiment of the present disclosure, if the application page to be currently displayed does not relate to user sensitive information in the aspects of privacy, security, and the like, the information protection processing may not be performed. For example, the pages are not watermarked, nor are the brightness and resolution of the screen adjusted down. However, since the application page (previous page) presented before the application page (present page) to be presented may or may not involve user-sensitive information, it is necessary to refer to the case of the previous page to determine whether the screen parameters need to be modified. If the previous page relates to the user sensitive information and the screen parameters in the peep-proof mode are used when the previous page is displayed, the screen parameters need to be modified when the page is displayed, namely the screen parameters are modified into the original screen parameters. And if the previous page does not relate to the user sensitive information and the original screen parameters are used when the previous page is displayed, the original screen parameters are continuously used without modifying the screen parameters when the page is displayed.
By the aid of the method and the device, the screen display effect can be adjusted according to whether each page contains the user sensitive information. And the screen parameters before adjustment (original screen parameters) may be saved before the screen parameters are adjusted to the default or user-set screen parameters in the privacy mode. In this way, the screen parameters can be quickly restored to the original screen parameters when a page is presented that does not contain user sensitive information.
As an alternative embodiment, the method may further comprise: in response to determining not to perform information protection processing on the page using the default information protection policy, performing the following: when the first application page is displayed, screen parameters are modified and/or page protection information is added, and then the application page is displayed.
Further, as another optional embodiment, the method may further include: when a second application page behind the first application page is displayed, screen parameters are not modified, and the display of the application page is directly performed; or when the second application page is displayed, the screen parameters are not modified, page protection information is added firstly, and then the application page is displayed.
Specifically, in the embodiment of the present disclosure, if the obtained configuration parameter indicates that the user has started the peep prevention function for the target application, it is considered that information protection processing may be performed on all pages of the target application. In the application scene, the information protection processing is not performed on the related page of the target application by using a default information protection strategy.
For example, in the embodiment of the present disclosure, if the user turns on the peep prevention function for the target application, the peep prevention mode needs to be turned on for each page of the target application for presentation. Specifically, in the application scenario, the screen display effect may be adjusted to a low-brightness and low-resolution privacy mode when the target application is opened or switched to, and the screen display effect is restored to the previous screen display effect until the target application is closed by the user or switched to another application that does not involve user sensitive information.
Further, as another optional embodiment, the method may further include: and changing the screen parameters back to the original screen parameters in response to the target application being closed or being switched to other applications which do not need information protection processing on the page.
Specifically, in the embodiment of the present disclosure, for a target application with a peep-proof function, when the target application is closed or switched to another application without information protection processing by a user, the screen display effect can be restored to the previous screen display effect, that is, the screen parameter in the current peep-proof mode is changed back to the previous original screen parameter, so as to prevent the user from using the peep-proof screen display effect for a long time to cause visual fatigue, and further affect the eyesight and the use experience of the user.
In addition, in the embodiment of the present disclosure, after the target application is switched to another application that needs to perform information protection processing on a page, the display effect of the privacy screen may be kept unchanged, that is, the screen parameter in the privacy mode may be kept unchanged.
As an alternative embodiment, determining whether the application page to be currently displayed needs to be subjected to the information protection processing may include: detecting whether an application page to be displayed currently contains preset keywords and/or preset page elements; and determining that the current application page to be displayed needs information protection processing in response to detecting that the current application page to be displayed contains preset keywords and/or preset page elements.
Specifically, in the embodiment of the present disclosure, in the process of performing information protection processing on a page by using a default information protection policy, if an application page to be currently displayed includes a preset keyword (for example, information such as a user name, a password, an identity card number, a mobile phone number, an address, and the like) and/or a preset page element (for example, a text box for describing information such as an input user name, a password, an identity card number, a mobile phone number, an address, and the like), the information protection processing is performed on the page. Otherwise, the page is not subjected to information protection processing, but is displayed as a normal screen display effect.
Further, as an optional embodiment, the method may further include: covering the added page protection information on the whole application page; or overlaying the added page protection information on an area associated with the preset keyword and/or the preset page element in the application page.
It should be appreciated that the process of overlaying the page protection information on the entire application page is simple, but may affect the user's review of other non-sensitive information. The page protection information is covered in the area for displaying the sensitive information in the application page, so that the user can not be influenced to look up other non-sensitive information, and the aim of accurate peep prevention can be fulfilled. However, the page protection information is covered on the area for displaying the sensitive information in the application page, the position of the area needs to be accurately calculated, and the calculation logic is relatively complex.
Further, as an optional embodiment, the page protection information may include: and (4) watermarking the page. In embodiments of the present disclosure, when overlaying the added page watermark over the entire application page, the size and/or spacing of elements (e.g., motifs) in the page watermark may be controlled so as to cause some or all of the sensitive information on the areas associated with the preset keywords and/or preset page elements to be obscured.
It will be appreciated that in embodiments of the present disclosure, if the patterns in the page watermark are too small and spaced apart, the sensitive information that is covered may be limited, or even completely uncovered, and it is clear that this may not be, or may be very limited. If the patterns in the page watermark are too large and the intervals are small, the covered sensitive information is much, even the non-sensitive information is completely covered, and obviously, although the situation can play a role in peep prevention, the situation can also influence the user to look up the non-sensitive information. Based on this, in the embodiment of the present disclosure, when a page watermark is added, the size and/or the distance of elements (such as patterns) in the page watermark may be adjusted, so as to shield part or all of sensitive information on a region associated with a preset keyword and/or a preset page element, thereby affecting as little as possible other use experiences of a user on the basis of achieving a peep-proof effect.
Further, as an alternative embodiment, the elements in the page watermark may be in a translucent state. Therefore, the user can conveniently look up the related information while preventing peeping of other people. Specifically, as shown in fig. 4, the watermark pattern may default to a gray translucent state and display the current time in a fixed-pitch arrangement (i.e., the watermark pattern is the current time). In addition, in the embodiment of the present disclosure, the user may also set other watermark patterns.
The present disclosure will be described in detail below with reference to a specific embodiment shown in fig. 5.
As shown in fig. 5, the information protection method may include the following operations:
operation S510, when the user opens the application, go to the data warehouse to retrieve configuration information set by the user;
operation S520, determining whether the application needs to perform a privacy protection process based on the retrieved configuration information, if so, performing operation S530 if the application belongs to a situation that the user turns on a privacy protection function, otherwise, performing operation S560 if the application does not need the privacy protection function, otherwise, performing operation S580 if the application belongs to a default situation;
operation S530, adjusting and controlling a screen display effect, such as reducing screen brightness and screen resolution, increasing page watermarks, and the like;
operation S540, showing each page of the application;
operation S550, when the user closes the application, restoring the screen display effect to the screen display effect before the adjustment, that is, adjusting the screen parameters to the original screen parameters;
operation S560, directly displaying the application page without controlling the screen display effect;
operation S570, when the user closes the application, the screen display effect does not need to be restored;
operation S580, before displaying the page, determining whether the page needs to be peeped-proof, if so, performing operation S590, and if not, performing operation S5130;
operation S590 is performed to regulate and control a screen display effect, such as reducing screen brightness and screen resolution, increasing page watermarks, and the like;
operation S5100, before displaying the next page, determines whether the page needs to be peeped-proof, if so, performs operation S5110, and if not, performs operation S5120;
operation S5110, continue to use the current screen display effect;
operation S5120, restoring the screen display effect to the screen display effect before the adjustment, that is, adjusting the screen parameters to the original screen parameters;
in operation S5130, the original screen parameters are used.
It should be understood that, in the embodiment of the present disclosure, after operation S5110, if the user closes the application, the original screen display effect needs to be restored, and after operation S5120, if the user closes the application, the original screen display effect is currently the result, and the restoration process does not need to be performed.
Specifically, in the embodiment of the present disclosure, when using the peep-proof software for peeping-proof, a user may configure and turn on the peep-proof function before use. The peep-proof software can continuously run in the background after the peep-proof is started, the user operation is monitored, when a certain application is opened by a user, the user setting is checked firstly, and whether the peep-proof function is started/closed to the application all the time or the peep-proof default setting is used is checked. And then checking an opening/closing peep-proof list and other peep-proof parameters from the data warehouse, wherein if the user setting conflicts with the data warehouse, the user setting is used as the standard. If the application is set to be always started with the peep-proof function, recording the original screen parameters, setting the display parameters of the peep-proof screen according to the configuration parameters, and restoring the display parameters of the screen to the original screen parameter setting when the application is closed. If the application is set to always turn off the peep-proof function, no intervention is made in the use process of the application. And if the current application is not set to always turn on the peep-proof function or to always turn off the peep-proof function, monitoring according to pages. That is, each time a new page is loaded, anti-peeping detection is required to be performed to check the data warehouse parameters. If the peep-proof keyword is hit on the current page, recording the original screen parameters, starting display setting of the peep-proof screen, positioning the position of the keyword, and enabling the watermark to cover sensitive information display or filling areas (such as display or filling areas of information such as user names, passwords, identity card numbers, mobile phone numbers, addresses and the like) as much as possible on the premise of meeting the setting rule. And when the peep-proof keyword is not hit, the original screen display parameter setting is restored. And opening the page after completing the detection process once when a new page is opened every time until the current application is closed or the application is switched to the background to run, and restoring the screen display parameter setting.
Through this disclosed embodiment, adopt the software peep-proof means to control the display effect of screen and replace the hardware peep-proof means, the user can set up the peep-proof function according to actual demand is nimble. For example, the peep-proof function is turned on when peep-proof intervention is required, and turned off when peep-proof intervention is not required. Therefore, the service time of the peep-proof function can be effectively shortened, the adverse effects of the peep-proof function on the user experience and eyesight are reduced, and the flexibility of the use of the peep-proof function can be improved.
Fig. 6 schematically shows a block diagram of an information protection apparatus according to an embodiment of the present disclosure.
As shown in fig. 6, the information protection apparatus 600 includes an acquisition module 601 and a processing module 602. The information protection apparatus 600 may perform the method described above with reference to the method embodiment, and is not described herein again.
Specifically, the obtaining module 601 is configured to obtain the configuration parameters set for the target application when the application page needs to be displayed for the target application.
The processing module 602 is configured to, when the obtained configuration parameter indicates that information protection processing needs to be performed on the page, modify a screen parameter and/or increase page protection information, and then display the application page.
Through this disclosed embodiment, adopt the software peep-proof means to control the display effect of screen and replace the hardware peep-proof means, the user can set up the peep-proof function according to actual demand is nimble. For example, the peep-proof function is turned on when peep-proof intervention is required, and turned off when peep-proof intervention is not required. Therefore, the service time of the peep-proof function can be effectively shortened, the adverse effects of the peep-proof function on the user experience and eyesight are reduced, and the flexibility of the use of the peep-proof function can be improved.
As an optional embodiment, the processing module is further configured to determine whether to perform information protection processing on the page using a default information protection policy under the condition that the obtained configuration parameter represents that information protection processing needs to be performed on the page; in response to determining to information protect the pages using the default information protection policy, performing the following prior to exposing each application page: determining whether an application page to be displayed currently needs to be subjected to information protection processing; in response to determining that the application page to be displayed currently needs to be subjected to information protection processing, determining whether the current screen parameter is an original screen parameter; modifying the screen parameters in response to determining that the current screen parameters are the original screen parameters; and/or adding page protection information in response to determining that the application page to be displayed currently needs to be subjected to information protection processing.
As an alternative embodiment, the processing module is further configured to not modify the screen parameter in response to determining that the current screen parameter is not the original screen parameter.
As an alternative embodiment, the processing module is further configured to: determining whether the current screen parameter is an original screen parameter in response to determining that the application page to be displayed currently does not need to be subjected to information protection processing; in response to determining that the current screen parameter is an original screen parameter, not modifying the screen parameter; or in response to determining that the current screen parameter is not the original screen parameter, changing the screen parameter back to the original screen parameter.
As an alternative embodiment, the processing module is further configured to: in response to determining not to use the default information protection policy for information protection processing of a page, performing the following: when the first application page is displayed, firstly, screen parameters are modified and/or page protection information is added, and then the application page is displayed.
As an optional embodiment, the processing module is further configured to: when a second application page behind the first application page is displayed, screen parameters are not modified, and the display of the application page is directly performed; or when the second application page is displayed, the screen parameters are not modified, page protection information is added firstly, and then the application page is displayed.
As an alternative embodiment, the processing module is further configured to: and changing the screen parameters back to the original screen parameters in response to the target application being closed or being switched to other applications which do not need information protection processing on the page.
As an alternative embodiment, the processing module performs the following operations when determining whether the application page to be currently displayed needs to be subjected to the information protection processing: detecting whether an application page to be displayed currently contains preset keywords and/or preset page elements; and determining that the current application page to be displayed needs information protection processing in response to detecting that the current application page to be displayed contains the preset keywords and/or the preset page elements.
As an alternative embodiment, the processing module is further configured to: covering the added page protection information on the whole application page; or the added page protection information is covered on an area of the application page, which is associated with the preset keyword and/or the preset page element.
As an alternative embodiment, the page protection information includes: and (4) page watermarking. The processing module is further configured to: controlling the size and/or spacing of elements in the page watermark when overlaying the added page watermark over the entire application page so as to cause some or all of the sensitive information on the area associated with the preset keywords and/or the preset page elements to be obscured.
As an alternative embodiment, the element is in a translucent state.
As an alternative embodiment, the processing module is further configured to: and directly displaying the application page under the condition that the acquired configuration parameter representation does not need to perform information protection processing on the page.
As an alternative embodiment, the screen brightness after the screen parameter is modified is lower than the screen brightness before the screen parameter is modified; and/or the screen resolution after modifying the screen parameters is lower than the screen resolution before modifying the screen parameters.
It should be noted that the embodiments of the apparatus portion and the embodiments of the method portion of the present disclosure are the same or similar, and the achieved technical effects are also the same or similar, which are not described herein again.
Any of the modules, units, or at least part of the functionality of any of them according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, units according to the embodiments of the present disclosure may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by any other reasonable means of hardware or firmware by integrating or packaging the circuits, or in any one of three implementations of software, hardware and firmware, or in any suitable combination of any of them. Alternatively, one or more of the modules, units according to embodiments of the present disclosure may be implemented at least partly as computer program modules, which, when executed, may perform the respective functions.
For example, any number of the obtaining module 601 and the processing module 602 may be combined and implemented in one module, or any one of the modules may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the obtaining module 601 and the processing module 602 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware by any other reasonable way of integrating or packaging a circuit, or in any one of three implementations of software, hardware, and firmware, or in a suitable combination of any of them. Alternatively, at least one of the obtaining module 601 and the processing module 602 may be at least partly implemented as a computer program module, which when executed may perform a corresponding function.
Fig. 7 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure. The electronic device shown in fig. 7 is only an example, and should not bring any limitation to the function and the scope of use of the embodiments of the present disclosure.
As shown in fig. 7, electronic device 700 includes a processor 710, a computer-readable storage medium 720. The electronic device 700 may perform a method according to an embodiment of the present disclosure.
In particular, processor 710 may comprise, for example, a general purpose microprocessor, an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 710 may also include on-board memory for caching purposes. Processor 710 may be a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
Computer-readable storage medium 720, for example, may be a non-volatile computer-readable storage medium, specific examples including, but not limited to: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and so on.
The computer-readable storage medium 720 may include a computer program 721, which computer program 721 may include code/computer-executable instructions that, when executed by the processor 710, cause the processor 710 to perform a method according to an embodiment of the disclosure, or any variation thereof.
The computer program 721 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 721 may include one or more program modules, including 721A, modules 721B, … …, for example. It should be noted that the division and number of the modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, so that the processor 710 may execute the method according to the embodiment of the present disclosure or any variation thereof when the program modules are executed by the processor 710.
According to an embodiment of the present disclosure, at least one of the obtaining module 601 and the processing module 602 may be implemented as a computer program module described with reference to fig. 7, which, when executed by the processor 710, may implement the respective operations described above.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium described above carries one or more programs which, when executed, implement a method according to an embodiment of the present disclosure.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It will be understood by those skilled in the art that while the present disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (16)

1. An information protection method, comprising:
when an application page needs to be displayed for a target application, acquiring configuration parameters set for the target application; and
and if the acquired configuration parameter representation needs to perform information protection processing on the page, modifying screen parameters and/or increasing page protection information, and then displaying the application page.
2. The method of claim 1, wherein: if the obtained configuration parameter representation needs to perform information protection processing on the page, then
Determining whether to use a default information protection strategy to perform information protection processing on a page;
in response to determining to perform information protection processing on the pages using the default information protection policy, performing the following operations prior to presenting each application page:
determining whether the application page to be displayed currently needs to be subjected to information protection processing;
in response to determining that the application page to be displayed currently needs to be subjected to information protection processing, determining whether the current screen parameter is an original screen parameter; modifying the screen parameters in response to determining that the current screen parameters are the original screen parameters; and/or
And in response to the fact that the application page to be displayed currently needs to be subjected to information protection processing, adding page protection information.
3. The method of claim 2, further comprising:
in response to determining that the current screen parameter is not the original screen parameter, no screen parameter modification is performed.
4. The method of claim 2 or 3, further comprising:
determining whether the current screen parameter is an original screen parameter in response to determining that the application page to be displayed currently does not need to be subjected to information protection processing;
in response to determining that the current screen parameter is an original screen parameter, not modifying the screen parameter; or
In response to determining that the current screen parameter is not the original screen parameter, changing the screen parameter back to the original screen parameter.
5. The method of claim 2, further comprising:
in response to determining not to use the default information protection policy for information protection processing of a page, performing the following:
when the first application page is displayed, screen parameters are modified and/or page protection information is added, and then the application page is displayed.
6. The method of claim 5, further comprising:
when a second application page is continuously displayed after the first application page is displayed, screen parameters are not modified, and the display of the application page is directly performed; alternatively, the first and second electrodes may be,
and when the second application page is continuously displayed after the first application page is displayed, screen parameters are not modified, page protection information is added, and then the application page is displayed.
7. The method of claim 5 or 6, further comprising:
and changing the screen parameters back to the original screen parameters after the target application is closed or switched to other applications which do not need information protection processing on the page.
8. The method of claim 2, wherein the determining whether the application page to be currently displayed needs to be subjected to information protection processing comprises:
detecting whether an application page to be displayed currently contains preset keywords and/or preset page elements; and
and determining that the current application page to be displayed needs information protection processing in response to detecting that the current application page to be displayed contains the preset keywords and/or the preset page elements.
9. The method of claim 8, further comprising:
covering the added page protection information on the whole application page; or
And covering the added page protection information on an area which is related to the preset keyword and/or the preset page element in the application page.
10. The method of claim 9, wherein:
the page protection information includes: page watermarking;
when overlaying the added page watermark over the entire application page, controlling the size and/or spacing of elements in the page watermark such that part or all of the sensitive information on the area associated with the preset keywords and/or the preset page elements is obscured.
11. The method of claim 10, wherein the element is in a translucent state.
12. The method of claim 1, further comprising:
and if the acquired configuration parameter representation does not need to perform information protection processing on the page, directly displaying the application page.
13. The method of claim 1, wherein:
the screen brightness after the screen parameters are modified is lower than the screen brightness before the screen parameters are modified; and/or
The screen resolution after modifying the screen parameters is lower than the screen resolution before modifying the screen parameters.
14. An information protection apparatus comprising:
the system comprises an acquisition module, a display module and a display module, wherein the acquisition module is used for acquiring configuration parameters set for a target application when the application page needs to be displayed for the target application; and
and the processing module is used for firstly modifying the screen parameters and/or firstly increasing page protection information and then displaying the application page under the condition that the acquired configuration parameter represents that the information protection processing needs to be carried out on the page.
15. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-13.
16. A computer-readable storage medium storing computer-executable instructions for implementing the method of any one of claims 1 to 13 when executed.
CN202010809845.0A 2020-08-12 2020-08-12 Information protection method and device Active CN112000999B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010809845.0A CN112000999B (en) 2020-08-12 2020-08-12 Information protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010809845.0A CN112000999B (en) 2020-08-12 2020-08-12 Information protection method and device

Publications (2)

Publication Number Publication Date
CN112000999A true CN112000999A (en) 2020-11-27
CN112000999B CN112000999B (en) 2024-03-01

Family

ID=73463119

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010809845.0A Active CN112000999B (en) 2020-08-12 2020-08-12 Information protection method and device

Country Status (1)

Country Link
CN (1) CN112000999B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115270191A (en) * 2022-09-26 2022-11-01 闪捷信息科技有限公司 Dynamic information protection method and device based on API (application program interface)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653041A (en) * 2016-01-29 2016-06-08 北京小米移动软件有限公司 Display state adjusting method and device
CN109165059A (en) * 2018-07-11 2019-01-08 小草数语(北京)科技有限公司 page locking method and device thereof
CN111382399A (en) * 2020-03-06 2020-07-07 北京明朝万达科技股份有限公司 Method and device for adding watermark

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653041A (en) * 2016-01-29 2016-06-08 北京小米移动软件有限公司 Display state adjusting method and device
CN109165059A (en) * 2018-07-11 2019-01-08 小草数语(北京)科技有限公司 page locking method and device thereof
CN111382399A (en) * 2020-03-06 2020-07-07 北京明朝万达科技股份有限公司 Method and device for adding watermark

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115270191A (en) * 2022-09-26 2022-11-01 闪捷信息科技有限公司 Dynamic information protection method and device based on API (application program interface)
CN115270191B (en) * 2022-09-26 2022-12-27 闪捷信息科技有限公司 Dynamic information protection method and device based on API (application program interface)

Also Published As

Publication number Publication date
CN112000999B (en) 2024-03-01

Similar Documents

Publication Publication Date Title
US9466266B2 (en) Dynamic display markers
US9684803B2 (en) Protecting content displayed on a mobile device
US10114968B2 (en) Proximity based content security
US20180239931A1 (en) Automatic adjustment of a display to obscure data
EP2695033B1 (en) Devices and methods for providing access to internal component
US7253791B2 (en) Selective viewing enablement system
CN109697377B (en) Anti-peeping method and device, electronic equipment and computer readable storage medium
US8938780B2 (en) Display authentication
US11574081B2 (en) User interface manipulation in a foldable screen device
CN111143906A (en) Control method and control device
CN112040145B (en) Image processing method and device and electronic equipment
KR101974618B1 (en) Method for preventing screen capture, application and user terminal performing same
KR102365995B1 (en) Display device capable of automatically adjusting displayed image and method thereof
CN112000999B (en) Information protection method and device
US11222612B2 (en) Augmented reality based virtual dashboard implementations
JP2008293191A (en) Information terminal equipment, information display method, and its program
CN115906201A (en) Anti-peeping screen method and device and computer readable storage medium
KR101911947B1 (en) Screen design method and screen design system for improving information readability and harmonizing background image
CN118176505A (en) Secure vision and computing boundaries for resource subsets on computing machines
US20230012574A1 (en) Multi-zone display privacy based on location and content
CN116583838A (en) Preventing user interaction hijacking attacks by preventing interactions with shading components
Roesner et al. Augmented reality: challenges & opportunities for security and privacy
WO2019126389A1 (en) Automatic obfuscation engine for computer-generated digital images
US11868596B2 (en) Color-based system for generating notifications
US20230260481A1 (en) Device having a camera overlaid by display

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant