CN113434899A - Method and terminal for displaying private information - Google Patents

Method and terminal for displaying private information Download PDF

Info

Publication number
CN113434899A
CN113434899A CN202110699618.1A CN202110699618A CN113434899A CN 113434899 A CN113434899 A CN 113434899A CN 202110699618 A CN202110699618 A CN 202110699618A CN 113434899 A CN113434899 A CN 113434899A
Authority
CN
China
Prior art keywords
touch
pressure
private information
preset
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110699618.1A
Other languages
Chinese (zh)
Inventor
柳林东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Advanced New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN202110699618.1A priority Critical patent/CN113434899A/en
Publication of CN113434899A publication Critical patent/CN113434899A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application discloses a method and a terminal for displaying private information. The method comprises the following steps: displaying a hidden symbol of private information, the hidden symbol being visible; detecting pressure touch in a preset range, and when the pressure touch reaches or exceeds a first preset pressure threshold, and the pressure touch reaching or exceeding the preset pressure threshold is kept and reaches a preset duration, displaying the true value of the private information; and when the pressure touch is detected to move and disappears or falls below a second preset pressure threshold value, switching and displaying the real value as a hidden symbol in the display area of the private information. By utilizing the embodiment of the application, the private information can be rapidly and conveniently switched and displayed between the real value and the hidden symbol.

Description

Method and terminal for displaying private information
This document is a divisional application of "a method and a terminal for displaying private information", and the application number of the parent application is "201610190817.9", and the application date is "2016-03-30".
Technical Field
The application relates to the technical field of terminal touch, in particular to a method and a terminal for displaying private information.
Background
In the scenes that a user uses various terminals or uses network services and the like, some private information related to the user is possibly not displayed on the used terminal or page all the time, so that others beside the user can not be snooped. Examples of private information are certificate numbers (e.g. identification numbers), passwords, personal financial product values (e.g. payroll displayed on a web page, balance in a wechat wallet, balance in a pay bank application, etc.). This information is generally sensitive to the user and is not intended to be revealed.
One method of displaying private information in the prior art is to set a button (or switch) next to the private information. When the button is not pressed, the private information is displayed as an asterisk (, a), or the like; when the button is pressed, the private information can display a true value; when the button is pressed again, the private information is restored to the asterisk, i.e., the true value is no longer displayed.
In the display mode in the prior art, the user needs to frequently switch the buttons in the process of displaying the real value of the private information and recovering to display the asterisk, so that the operation is complicated. Moreover, when the user presses the button, the actual value of the private information is displayed, and the user often performs other operations without pressing the button again in time. In this way, it is still possible to cause leakage of private information of the user.
Disclosure of Invention
The embodiment of the application aims to provide a method and a terminal for displaying private information, so that the private information can be displayed quickly and conveniently.
In order to solve the above technical problem, the embodiment of the present application is implemented as follows:
a method of displaying private information, comprising:
displaying a hidden symbol of private information, the hidden symbol being visible;
detecting pressure touch in a preset range, and when the pressure touch reaches or exceeds a first preset pressure threshold, and the pressure touch reaching or exceeding the preset pressure threshold is kept and reaches a preset duration, displaying the true value of the private information;
and when the pressure touch is detected to move and disappears or falls below a second preset pressure threshold value, switching and displaying the real value as a hidden symbol in the display area of the private information.
A terminal for displaying private information, comprising:
the display unit is used for displaying a hidden symbol or a real value of the private information, and the hidden symbol is visible;
the touch detection unit is used for detecting pressure touch in a preset range, and when the pressure touch reaches or exceeds a first preset pressure threshold value, and the pressure touch reaching or exceeding the preset pressure threshold value is kept and reaches a preset duration, triggering the display unit to display the true value of the private information; and when the pressure touch is detected to move and disappears or falls below a second preset pressure threshold value, triggering the display unit to switch and display the real value as a hidden symbol in the display area of the private information. By the technical scheme provided by the embodiment of the application, the private information can be displayed as a real value only when the user touches the touch screen or the touch pad with certain force and keeps a certain time length, and the hidden symbol of the private information is restored and displayed when the pressure touch disappears or drops below a second preset pressure threshold value, so that the private information can be rapidly and conveniently switched and displayed between the real value and the hidden symbol.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flowchart illustrating an embodiment of a method for displaying private information according to the present application;
fig. 2 is a block diagram of an embodiment of a terminal for displaying private information according to the present application.
Detailed Description
The embodiment of the application provides a method and a terminal for displaying private information.
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
An embodiment of the present application provides a method for displaying private information, as shown in fig. 1, including:
s110: a hidden symbol of the private information is displayed.
Similar to the prior art, private information of a user, such as some certificate numbers (e.g., identification numbers), passwords, personal financial product values (e.g., wages displayed on a web page, balance in a wechat wallet, balance in a pay bank application, etc.), may be displayed on a web page and in an application supporting a touch device. This information is generally sensitive to the user and is not intended to be revealed. The private information may appear as a hidden symbol such as an asterisk (a-x, etc.). The hidden symbol may also be blank, i.e. set to the same color as the background color or another color so that private information is not displayed, for example.
S120: and detecting pressure touch control within a preset range, and when the pressure touch control reaches or exceeds a first preset pressure threshold value, and the pressure touch control reaching or exceeding the first preset pressure threshold value is kept and reaches a preset duration, displaying the true value of the private information.
The pressure sensing screen technology has been widely adopted in the prior art. The pressure induction screen technology can expand the touch screen from traditional two-dimensional operation to three-dimensional operation, and different operations are realized by identifying the force different in size in the direction perpendicular to the touch screen, so that the touch screen can identify the pressing force of a user and provide different service options. The pressure sensing screen technology has better experience, makes up the limitation of the size of a touch screen, and has better tactile feedback and more real emotional interaction. The appearance of the pressure sensing screen technology enables users to have a brand new mode of interacting with mobile phones.
Pressure sensitive screen technologies such as Force Touch, 3D Touch, ClearForce, etc.
Force Touch and 3D Touch are based on the same technology. The operation experience of 3D Touch is better than that of Force Touch, and the method can be called as an upgrade version of Force Touch. Apple release with 3D Touch appearing on 9/10/2015 is carried on iPhone 6s, and has two new gestures, Peek (light press) and Pop (heavy press). Apple is called a new generation of multi-touch technology. In short, the Apple strengthens the Force Touch scheme on Apple Watch, and further strengthens the interaction formed by Touch control by using different Force induced by a pressure induction screen.
The ClearForce pressure-sensing touch solution is a new man-machine interaction mode which is provided for customers by a leading developer, Synaptics and the like of a man-machine interaction solution facing the market. For example, by applying different forces with a finger or stylus, adjusting scrolling speed and zoom scale, implementing continuously variable game control, and different text or photo editing modalities, device manufacturers may be enabled to implement smartphone differentiation. After giving a complete set of solutions by Synaptics, android phones also start to use the technology in a large area, for example, the technology is adopted in hua math (math) S which comes into the market 9/2015.
In addition to pressure-sensitive screen technology, there are also pressure Touch pads, such as apple-on-notebook integrated Force Touch pads. Compared with the common Touch control panel, the Force Touch control panel is internally integrated with a Force sensor. Compared with the conventional Touch pad, the Force Touch pad can not only identify the pressing position, but also sense the pressing Force.
Taking the example of a touch screen pressure detector, the touch screen pressure detector may detect not only the presence of pressure against the touch screen display, but also the amount of pressure applied to the touch screen display. By detecting pressure as a continuously variable input rather than simply as an on/off binary input, the touch screen pressure detector can distinguish between soft touch and hard touch, similar to the aforementioned Peek (light press), Pop (heavy press), in addition to detecting direction and speed of contact with the touch screen. The touch screen pressure detector can provide three-dimensional input by detecting where the screen pressure is applied (i.e., the x-dimension and the y-dimension) and the amount of pressure applied to that point (i.e., the z-dimension). Thus, the same pressure applied to different points on the surface of the touch screen (e.g., lower left or upper right corner) can produce different input signals, as well as the same pressure applied to the same point on the surface of the touch screen (e.g., hard or soft pressure on a point on the screen).
In general, the terminal device may detect a pressure touch within a preset range of the touch screen, for example, detect a pressure touch in an area where a hidden symbol is displayed. Of course, the pressure touch may be detected in a predetermined area other than the hidden symbol, for example, one or a string of predetermined symbols indicating pressing with force. The symbol prompting hard pressing may be located adjacent to the region where the hidden symbol is displayed.
The pressure touch may be generated by pressing with a finger of a user, or may be generated by a touch device, such as a stylus.
And when the pressure touch reaches or exceeds a first preset pressure threshold and the pressure touch reaching or exceeding the first preset pressure threshold reaches a preset duration, displaying the real value of the private information. The first predetermined pressure threshold may be set to a pressure threshold that generates Peek (light press) or may be set to a pressure threshold that generates Pop (heavy press). The pressure touch input of the user may be further differentiated by duration. In some embodiments, the touch screen pressure detector can detect the time of the pressure touch to generate different input signals. The duration of the generated pressure touch, such as the amount that remains at or above the first predetermined pressure threshold, may be further considered. The duration may be an input parameter in a fourth dimension (e.g., a pressure touch, such as a duration t that remains at or above a predetermined pressure threshold by an amount, as a dimension other than x, y, z, as described above).
The first preset pressure threshold is set to be Peek (light press) and can be selected to be 5-10 gf (gram force), and the first preset pressure threshold is set to be Pop (heavy press) and can be selected to be 15-20 gf. The preset time t may be set to 40ms to 60ms, preferably 50ms, so as to generate a sensitive touch feedback.
Furthermore, the pressure touch can be generated by pressing of a finger on the touch screen by a user or by pressing of a touch device on the touch screen by the user; the pressure touch control may be generated by pressing a finger on the touch pad by a user when the cursor is located within a preset range of the screen, or generated by pressing the touch pad by the user when the cursor is located within the preset range of the screen; but also by a user pressing a predetermined area on the touch pad with a finger or by a user pressing a predetermined area on the touch pad with a touch device.
In one case, the pressure touch within the preset range may be generated by pressing a finger on the touch screen by a user, or generated by pressing a touch device on the touch screen by the user, and the pressed area may be located in a partial area of the private information. When the pressure touch in such a range is detected, the pressure touch reaches or exceeds a first predetermined pressure threshold, and the pressure touch reaching or exceeding the first predetermined pressure threshold is maintained and reaches a preset duration, the actual value of the private information may be displayed in a screen area corresponding to the pressing area. For a larger area of the display of the private information, an area displaying the real value caused by the pressure touch may occupy a part of the display area of the private information. In this case, for example, a part of the private information is displayed as a real value due to the pressure touch, and the private information in other areas is still a hidden symbol. Correspondingly, as the user presses and moves on the touch screen through a finger, or the user presses and moves on the touch screen through the touch device, in the area to which the user presses and moves, if the pressure touch still reaches or exceeds the first predetermined pressure threshold, and the pressure touch reaching or exceeding the first predetermined pressure threshold is kept and reaches a preset time length, the hidden symbol can be switched and displayed as a real value in the private information display area.
S130: and when the pressure touch value is detected to disappear or fall below a second preset pressure threshold value, restoring and displaying the hidden symbol of the private information.
The user can view the real value of the displayed private information through the step S120.
After the user finishes viewing, the user can lift up the touch device such as a finger or a touch pen generating pressure touch.
The terminal device can detect pressure touch in a preset range of the touch screen, and when the pressure touch value disappears or falls below a second preset pressure threshold value, the hidden symbol of the private information is restored and displayed. When the first predetermined pressure threshold is set to Peek (tap), for example, the second predetermined pressure threshold may be set to 1 gf. The second predetermined pressure threshold may be set to 11gf, when the first predetermined pressure threshold is set to Pop (heavy pressure), for example.
In this way, when the user lifts a touch device such as a finger or a stylus generating pressure touch, the terminal device detects that the pressure touch value disappears or falls below a second predetermined pressure threshold, so that the private information can be immediately restored and displayed as a hidden symbol.
As mentioned above, in the case where the pressing area is located in a partial area of the private information, for a larger area of the private information display, the area where the real value is displayed due to the pressure touch may occupy a part of the private information display area. In this case, for example, when the pressure touch value disappears or falls below the second predetermined pressure threshold, a part of the private information is restored and displayed as a hidden symbol. Correspondingly, as the user presses and moves on the touch screen through a finger, or the user presses and moves on the touch screen through the touch device, in the area just passed by the movement, when the pressure touch value disappears or falls below a second predetermined pressure threshold value, the real value can be switched and displayed as a hidden symbol in the private information display area.
Through the embodiment, the private information can be displayed as the real value only when the user touches the touch screen with certain force and keeps a certain time, and the hidden symbol of the private information is restored and displayed when the pressure touch disappears or drops below the second preset pressure threshold, so that the private information can be rapidly and conveniently switched and displayed between the real value and the hidden symbol.
The present application further provides a terminal for displaying private information, as shown in fig. 2, including:
a display unit 21 for displaying a hidden symbol or a real value of private information;
the touch detection unit 22 is configured to detect a pressure touch within a preset range, and when the pressure touch reaches or exceeds a first preset pressure threshold, and the pressure touch reaching or exceeding the preset pressure threshold is maintained and reaches a preset duration, trigger the display unit to display a true value of the private information; and when the pressure touch is detected to disappear or fall below a second preset pressure threshold value, triggering the display unit to restore and display the hidden symbol of the private information.
Preferably, the touch detection unit detects a pressure touch in an area where the hidden symbol is displayed; or detecting pressure touch in a symbol area prompting to press with force, wherein the symbol area prompting to press with force is located in an adjacent area of the displayed and hidden symbol area.
Preferably, the first predetermined pressure threshold is set to a pressure threshold that generates a light press, or to a pressure threshold that generates a heavy press.
Preferably, the pressure threshold value for generating the light press is selected to be 5-10 gram force.
Preferably, the pressure threshold value for generating the heavy pressure is selected to be 15-20 gram force.
Preferably, the preset time period t is set to 40ms to 60 ms.
Preferably, the preset time period t is set to 50 ms.
Preferably, the pressure touch is generated by pressing of a finger by a user or by the user through a touch device.
Preferably, the pressure touch is generated by pressing of a finger on the touch screen by a user, or by pressing of a touch device on the touch screen by the user;
or the like, or, alternatively,
the pressure touch control is generated by pressing a finger on the touch pad by a user when the cursor is positioned in a preset range of the screen, or is generated by pressing the touch pad by the user when the cursor is positioned in the preset range of the screen;
or the like, or, alternatively,
the pressure touch is generated by a user pressing a predetermined area on the touch pad with a finger or by a user pressing a predetermined area on the touch pad with a touch device.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method of displaying private information, comprising:
displaying a hidden symbol of private information, the hidden symbol being visible;
detecting pressure touch in a preset range, and when the pressure touch reaches or exceeds a first preset pressure threshold, and the pressure touch reaching or exceeding the preset pressure threshold is kept and reaches a preset duration, displaying the true value of the private information;
and when the pressure touch is detected to move and disappears or falls below a second preset pressure threshold value, switching and displaying the real value as a hidden symbol in the display area of the private information.
2. The method of claim 1, wherein the detecting the pressure touch within a preset range comprises:
detecting a pressure touch in an area where the hidden symbol is displayed;
or the like, or, alternatively,
and detecting pressure touch in a symbol area prompting to press forcibly, wherein the symbol area prompting to press forcibly is located in an adjacent area of the display hiding symbol area.
3. The method of claim 1, wherein the first predetermined pressure threshold is set to a pressure threshold that produces a light press or set to a pressure threshold that produces a heavy press.
4. The method of claim 3, wherein the pressure threshold for generating a tap is selected to be 5-10 grams force.
5. The method of claim 3, wherein the threshold pressure to generate the weight is selected to be 15-20 grams force.
6. The method of claim 1, wherein the preset time period t is set to 40ms to 60 ms.
7. The method of claim 1, wherein the preset time period t is set to 50 ms.
8. The method of claim 1, wherein the pressure touch is generated by a user pressing with a finger or by a user through a touch device.
9. The method of claim 1, wherein:
the pressure touch is generated by pressing of a finger on the touch screen by a user or pressing of the touch screen by a touch device by the user;
or the like, or, alternatively,
the pressure touch control is generated by pressing a finger on the touch pad by a user when the cursor is positioned in a preset range of the screen, or is generated by pressing the touch pad by the user when the cursor is positioned in the preset range of the screen;
or the like, or, alternatively,
the pressure touch is generated by a user pressing a predetermined area on the touch pad with a finger or by a user pressing a predetermined area on the touch pad with a touch device.
10. A terminal for displaying private information, comprising:
the display unit is used for displaying a hidden symbol or a real value of the private information, and the hidden symbol is visible;
the touch detection unit is used for detecting pressure touch in a preset range, and when the pressure touch reaches or exceeds a first preset pressure threshold value, and the pressure touch reaching or exceeding the preset pressure threshold value is kept and reaches a preset duration, triggering the display unit to display the true value of the private information; and when the pressure touch is detected to move and disappears or falls below a second preset pressure threshold value, triggering the display unit to switch and display the real value as a hidden symbol in the display area of the private information.
CN202110699618.1A 2016-03-30 2016-03-30 Method and terminal for displaying private information Pending CN113434899A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110699618.1A CN113434899A (en) 2016-03-30 2016-03-30 Method and terminal for displaying private information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610190817.9A CN107292185B (en) 2016-03-30 2016-03-30 Method and terminal for displaying private information
CN202110699618.1A CN113434899A (en) 2016-03-30 2016-03-30 Method and terminal for displaying private information

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201610190817.9A Division CN107292185B (en) 2016-03-30 2016-03-30 Method and terminal for displaying private information

Publications (1)

Publication Number Publication Date
CN113434899A true CN113434899A (en) 2021-09-24

Family

ID=60087917

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610190817.9A Active CN107292185B (en) 2016-03-30 2016-03-30 Method and terminal for displaying private information
CN202110699618.1A Pending CN113434899A (en) 2016-03-30 2016-03-30 Method and terminal for displaying private information

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201610190817.9A Active CN107292185B (en) 2016-03-30 2016-03-30 Method and terminal for displaying private information

Country Status (1)

Country Link
CN (2) CN107292185B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI847555B (en) 2023-02-17 2024-07-01 三竹資訊股份有限公司 Device and method of adding invisible information to the text content of a message

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113542478B (en) * 2021-07-16 2022-10-14 南昌黑鲨科技有限公司 Pressure-sensitive control protection system and method and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103810414A (en) * 2012-11-04 2014-05-21 国际商业机器公司 Password Presentation Management
US20150100908A1 (en) * 2013-10-05 2015-04-09 Yahoo! Inc Alternate screen reveal for instant privacy
CN105117123A (en) * 2015-07-30 2015-12-02 努比亚技术有限公司 Device and method for displaying hidden object
KR20160005388A (en) * 2014-07-07 2016-01-15 황윤택 System and Method of Protecting Privacy While Using Portable Terminal
US20160042165A1 (en) * 2014-08-07 2016-02-11 Lenovo (Singapore) Pte, Ltd. Secure handwriting input for password fields
CN105353947A (en) * 2015-10-26 2016-02-24 努比亚技术有限公司 Mobile terminal and application display content controlling method

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4297068B2 (en) * 2005-03-17 2009-07-15 沖電気工業株式会社 Customer-operated terminal device
US7650641B2 (en) * 2005-07-01 2010-01-19 Microsoft Corporation Lightweight privacy cover for displayed sensitive information
JP2011118842A (en) * 2009-12-07 2011-06-16 Canon Inc Information processing apparatus, display control method, and program
WO2013169870A1 (en) * 2012-05-09 2013-11-14 Yknots Industries Llc Device, method, and graphical user interface for transitioning between display states in response to gesture
CN102841749A (en) * 2012-07-16 2012-12-26 宇龙计算机通信科技(深圳)有限公司 Terminal and integrated operational zone control method
CN103164120A (en) * 2013-01-31 2013-06-19 广东欧珀移动通信有限公司 Hidden APK icon fast display method and mobile terminal
CN103605456B (en) * 2013-11-19 2017-08-25 Tcl集团股份有限公司 Hiding and display methods and the intelligent terminal of a kind of system bar
US20150213274A1 (en) * 2014-01-29 2015-07-30 Samsung Electronics Co., Ltd. Device and method of shielding region of display screen
CN105320906B (en) * 2014-06-10 2019-05-17 腾讯科技(深圳)有限公司 The method and apparatus of information of mobile terminal safeguard protection
CN104219053B (en) * 2014-08-27 2017-11-07 小米科技有限责任公司 Method for information display, information concealing method and device
CN104571813B (en) * 2014-12-12 2019-03-29 百度在线网络技术(北京)有限公司 A kind of display methods and device of information
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN105120054B (en) * 2015-06-25 2018-06-26 努比亚技术有限公司 Information processing method and mobile terminal
CN105117663B (en) * 2015-09-23 2018-07-06 广东欧珀移动通信有限公司 The encrypted object display methods and device of a kind of application
CN105320898A (en) * 2015-09-30 2016-02-10 联想(北京)有限公司 Information processing method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103810414A (en) * 2012-11-04 2014-05-21 国际商业机器公司 Password Presentation Management
US20150100908A1 (en) * 2013-10-05 2015-04-09 Yahoo! Inc Alternate screen reveal for instant privacy
KR20160005388A (en) * 2014-07-07 2016-01-15 황윤택 System and Method of Protecting Privacy While Using Portable Terminal
US20160042165A1 (en) * 2014-08-07 2016-02-11 Lenovo (Singapore) Pte, Ltd. Secure handwriting input for password fields
CN105117123A (en) * 2015-07-30 2015-12-02 努比亚技术有限公司 Device and method for displaying hidden object
CN105353947A (en) * 2015-10-26 2016-02-24 努比亚技术有限公司 Mobile terminal and application display content controlling method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI847555B (en) 2023-02-17 2024-07-01 三竹資訊股份有限公司 Device and method of adding invisible information to the text content of a message

Also Published As

Publication number Publication date
CN107292185A (en) 2017-10-24
CN107292185B (en) 2021-05-28

Similar Documents

Publication Publication Date Title
KR102061360B1 (en) User interface indirect interaction
KR101756579B1 (en) Method, electronic device, and computer readable storage medium for detecting touch at bezel edge
CN105359083B (en) For the dynamic management of edge input of the user on touch apparatus
US9575568B2 (en) Multi-function keys providing additional functions and previews of functions
KR101156610B1 (en) Method for input controlling by using touch type, and computer-readable recording medium with controlling program using touch type
US20120169776A1 (en) Method and apparatus for controlling a zoom function
CN104145236A (en) Method and apparatus for moving contents in terminal
CN104777957B (en) A kind of display methods and electronic equipment
US11334237B2 (en) Software defined icon interactions with multiple and expandable layers
KR20150083730A (en) Method for copying contents in a computing device, method for pasting contents in a computing device, and the computing device
US20120319959A1 (en) Device interaction through barrier
CN111158811B (en) Advertisement processing method and device, electronic equipment and storage medium
CN107292185B (en) Method and terminal for displaying private information
CN105094503B (en) Information processing method and deformable electronic equipment
US20150145781A1 (en) Displaying a panel overlay on a computing device responsive to input provided through a touch-sensitive housing
KR20160071626A (en) The Apparatus and Method for Portable Device displaying index information
KR20090017828A (en) Method for controling interface, and apparatus for implementing the same
CN103677606A (en) Page browsing position marking method, page browsing position marking device and mobile terminal
US20150020009A1 (en) Joystick Controller Swipe Method
CN106814940B (en) Numerical value input method and device
KR101706909B1 (en) Finger Input Devices
CN109582163A (en) The intercept method of area image
TWI393024B (en) Method of modifying use of pointing device in a graphical user interface and related programmable apparatus and computer readable medium
US11922009B2 (en) Using a stylus to input typed text into text boxes
CN110119485B (en) Interface access method and device based on bookmark

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination