WO2019007371A1 - 一种防止信息被盗的方法、存储设备及移动终端 - Google Patents

一种防止信息被盗的方法、存储设备及移动终端 Download PDF

Info

Publication number
WO2019007371A1
WO2019007371A1 PCT/CN2018/094521 CN2018094521W WO2019007371A1 WO 2019007371 A1 WO2019007371 A1 WO 2019007371A1 CN 2018094521 W CN2018094521 W CN 2018094521W WO 2019007371 A1 WO2019007371 A1 WO 2019007371A1
Authority
WO
WIPO (PCT)
Prior art keywords
recording
screen
mobile terminal
content
sensitive
Prior art date
Application number
PCT/CN2018/094521
Other languages
English (en)
French (fr)
Inventor
付仁杰
李香琴
赵德明
Original Assignee
惠州Tcl移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 惠州Tcl移动通信有限公司 filed Critical 惠州Tcl移动通信有限公司
Priority to US16/624,307 priority Critical patent/US20210150050A1/en
Publication of WO2019007371A1 publication Critical patent/WO2019007371A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Definitions

  • the present invention relates to the field of information security technologies for mobile terminals, and in particular, to a method for preventing information theft, a storage device, and a mobile terminal.
  • the embodiment of the invention provides a method for preventing information from being stolen, a storage device and a mobile terminal, which can solve the problem that the personal information is easily stolen due to being recorded in the background when the mobile terminal is in use in the prior art.
  • an embodiment of the present invention provides a method for preventing information from being stolen, and the method includes:
  • the sensitive character includes at least characters of numbers, letters, and Chinese characters.
  • the step of monitoring the current screen recording content when the mobile terminal starts the screen recording function includes:
  • the background detects whether the mobile terminal starts the recording function
  • the screen content is monitored in real time.
  • the monitoring content is compared with the sensitive characters in the sensitive character database. If sensitive characters appear in the monitoring content, the recording is paused or the recording result is displayed as a black screen.
  • the method for starting the recording screen includes: an active startup mode and a passive startup mode, and when the recording screen startup mode is the passive startup mode, an alert is issued.
  • an embodiment of the present invention provides a storage device in which a plurality of instructions are stored, the instructions being adapted to be loaded and executed by a processor:
  • the storage device there are stored a plurality of instructions adapted to be loaded by the processor and continue to execute:
  • the background detects whether the mobile terminal starts the recording function
  • the screen content is monitored in real time.
  • the storage device there are stored a plurality of instructions adapted to be loaded by the processor and continue to execute:
  • the monitoring content is compared with the sensitive characters in the sensitive character database. If sensitive characters appear in the monitoring content, the recording is paused or the recording result is displayed as a black screen.
  • the storage device there are stored a plurality of instructions adapted to be loaded by the processor and continue to execute:
  • an embodiment of the present invention provides a mobile terminal, including a processor, configured to implement each instruction, and a storage device, configured to store a plurality of instructions, the instruction being adapted to be loaded by the processor and performing the following steps:
  • the sensitive character includes at least characters of numbers, letters, and Chinese characters.
  • the step of monitoring the current screen recording content when the mobile terminal starts the screen recording function includes:
  • the background detects whether the mobile terminal starts the recording function
  • the screen content is monitored in real time.
  • the determining whether the recorded content has a sensitive character in the sensitive character database, and if so, suspending the recording or displaying the recording result as a black screen specifically include:
  • the monitoring content is compared with the sensitive characters in the sensitive character database. If sensitive characters appear in the monitoring content, the recording is paused or the recording result is displayed as a black screen.
  • the manner of starting the recording screen includes: an active startup mode and a passive startup mode, and when the recording screen startup mode is the passive startup mode, an alert is issued.
  • the step of issuing an alert when the screen start mode is the passive start mode specifically including ;
  • the mobile terminal When the recording mode is passive, the mobile terminal will pop up a dialog box to remind the user to send a warning to inform the user that the current mobile terminal is recording in the background.
  • the method for preventing information theft, the storage device, and the mobile terminal provided by the present invention, by setting a sensitive character database in the mobile terminal in advance, when the mobile terminal starts the screen recording function, monitoring the current screen recording content, and determining the Whether the sensitive content in the sensitive character database appears in the recorded content, if it occurs, the recording is paused or the recording result is displayed as a black screen, thereby avoiding the problem that the user's personal key information is stolen.
  • FIG. 1 is a flow chart of a preferred embodiment of a method for preventing information from being stolen according to the present invention.
  • FIG. 2 is a structural block diagram of a preferred embodiment of a storage device for preventing information from being stolen according to the present invention.
  • FIG. 3 is a schematic diagram of a specific structure of an embodiment of a mobile terminal provided by the present invention.
  • the present invention provides a method, a storage device, and a mobile terminal for preventing information from being stolen. To further clarify and clarify the objects, technical solutions, and effects of the present invention, the present invention will be further described in detail below. It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
  • figure 1 A flowchart of a preferred embodiment of a method for preventing information from being stolen according to the present invention 1 As shown, the method for preventing theft of information is suitable for execution in a computing device, including the steps of:
  • each operation step input by the user is recorded.
  • the personal information such as the account password and the user input may be easily caused.
  • the invention provides a method for preventing information from being stolen, by setting a sensitive character database in the mobile terminal in advance; when the mobile terminal starts the screen recording function, monitoring the current screen recording content; determining the content of the screen recording Whether the sensitive character in the sensitive character database appears, and if it occurs, the screen is paused or the screen recording result is displayed as a black screen.
  • the sensitive character includes at least characters of numbers, letters, and Chinese characters.
  • the key personal information currently involves digital-based identification such as identity card numbers, bank account numbers, and passwords; accounts registered on the network in digital and alphanumeric manners such as Weibo, WeChat, etc.;
  • digital-based identification such as identity card numbers, bank account numbers, and passwords
  • accounts registered on the network in digital and alphanumeric manners such as Weibo, WeChat, etc.
  • the verification information is usually also involved. Therefore, numbers, letters, and Chinese characters are defined as sensitive characters and vocabularies, so that the monitored content is more comprehensive, so as to better prevent information from being stolen.
  • the steps S200 Specifically include:
  • the screen content is monitored in real time.
  • the mobile terminal monitors the content of the screen in real time when the screen is started in the background, so that the key information is also recorded, thereby causing the personal information to be stolen.
  • steps S300 Specifically include:
  • the screen when the monitoring finds that a sensitive character appears, the screen will be paused immediately or the screen recording result will be displayed as a black screen.
  • the screen recording is continued, thereby ensuring recording.
  • the normal function of the screen also avoids the theft of personal key information.
  • the method for starting the recording screen comprises: an active starting mode and a passive starting mode, and when the recording screen starting mode is the passive starting mode, an alert is issued.
  • the manner in which the mobile terminal starts the recording screen in the background has an active manner.
  • the user uses the screen recording software to record the screen, and there is a passive startup method.
  • Such as hacking ADB The instruction is to record the screen.
  • Said ADB which is Android debug bridge( android Debug bridge )
  • Android debug bridge android Debug bridge
  • USB Debugging when the user connects the phone to the computer, if the computer is hacked, the hacker can simply use a simple command: Adb Shell screenrecord sdcard ⁇ 11.mp4 You can record your phone in the background.
  • the mobile terminal When it is found that the recording start mode is the passive start mode, the mobile terminal will pop up a dialog box for reminding the user to issue a warning to inform the user that the current mobile terminal is recording the screen in the background, so that the user can respond in time.
  • the program may be stored in a computer readable storage device, and the storage device may include: ROM( ROM Random access memory RAM ), disk or CD, etc.
  • FIG. 2 A block diagram of a preferred embodiment of a storage device for preventing information from being stolen based on the foregoing method, 2 Shown as a storage device 10 Having stored therein a plurality of instructions adapted to be processed by a processor 20 Loading and executing: setting a sensitive character database in the mobile terminal in advance; monitoring the current recording content when the mobile terminal starts the recording function; determining whether the sensitive character in the sensitive character database appears in the recorded content, If it appears, pause the recording or display the recording result as a black screen.
  • the instructions are adapted to be processed by a processor 20 Loading and continuing to execute:
  • the background detects whether the mobile terminal starts the recording function; when detecting the mobile terminal starting the recording function, the screen recording content is monitored in real time.
  • the instructions are adapted to be processed by a processor 20 Load and continue execution: When the user switches to the non-sensitive character interface, continue to record.
  • the instructions are adapted to be processed by a processor 20 Load and continue execution: When the screen start mode is passive start mode, an alert is issued.
  • the present invention further provides a mobile terminal, including: a processor (processor)20 Storage device (memory)10 Wherein the processor 20 Storage device 10 Completing communication with each other through the bus;
  • the processor 20 Used to call the storage device 10
  • the program instruction in the above in order to perform the foregoing method for preventing theft of information, for example, comprising: setting a sensitive character database in the mobile terminal in advance; monitoring the current screen recording content when the mobile terminal starts the screen recording function; determining the recording screen Whether the content has sensitive characters in the sensitive character database, if it occurs, pause the screen recording or display the screen recording result as a black screen.
  • FIG. 3 A specific structural block diagram of a mobile terminal provided by an embodiment of the present invention is shown, and the mobile terminal can be used to implement the method for preventing information theft provided in the foregoing embodiment.
  • the mobile terminal 1200 Can be a smartphone or tablet.
  • Mobile terminal 1200 Can include RF ( Radio Frequency , RF) circuit 110 Memory including one or more (only one of which is shown) computer readable storage medium 120 Input unit 130 ,Display unit 140 ,sensor 150 Audio circuit 160 Transmission module 170 , including one or more (only one shown in the figure) processing core processor 180 And power 190 And other components.
  • RF Radio Frequency , RF
  • Memory including one or more (only one of which is shown) computer readable storage medium
  • Input unit 130 Display unit 140
  • sensor 150 Audio circuit 160 Transmission module 170
  • processing core processor 180 And power 190 And other components including one or more (only one shown in the figure) processing core processor 180 And power 190 And other components.
  • FIG. 1200 can include more or fewer components than those illustrated, or some components may be combined, or different component arrangements. among them:
  • RF Circuit 110 It is used to receive and transmit electromagnetic waves, and realize mutual conversion between electromagnetic waves and electrical signals to communicate with communication networks or other devices.
  • RF Circuit 110 Can include a variety of existing circuit components for performing these functions, such as antennas, RF transceivers, digital signal processors, encryption / Decryption chip, user identity module ( SIM ) cards, memory, etc.
  • RF Circuit 110 It can communicate with various networks such as the Internet, intranets, wireless networks or with other devices over the wireless network.
  • the wireless network described above may include a cellular telephone network, a wireless local area network, or a metropolitan area network.
  • the above wireless networks may use various communication standards, protocols, and technologies, including but not limited to global mobile communication systems ( Global System for Mobile Communication, GSM ), enhanced mobile communication technology (Enhanced Data GSM Environment, EDGE) , wideband code division multiple access technology Wideband Code Division Multiple Access, WCDMA ), code division multiple access technology ( Code Division Access, CDMA ), time division multiple access technology ( Time Division Multiple Access, TDMA ), wireless fidelity technology ( Wireless Fidelity , Wi-Fi (such as the American Institute of Electrical and Electronics Engineers Standards) IEEE 802.11a , IEEE 802.11b, IEEE802.11g with / or IEEE 802.11n ),online telephone( Voice over Internet Protocol, VoIP ), global microwave interconnection access ( Worldwide Interoperability for Microwave Access , Wi-Max ), other protocols for mail, instant messaging, and short messages, as well as any other suitable communication protocol, and may even include protocols that are not currently being developed.
  • GSM Global System for Mobile Communication
  • EDGE Enhanced Data GSM Environment
  • WCDMA Wideband Code
  • Memory 120 It can be used to store software programs and modules, such as the program instructions corresponding to the method for preventing information theft in the above embodiments. / Module, processor 180 Stored in memory by running 120 Software programs and modules within, thereby performing various functional applications and data processing, that is, the function of preventing information from being stolen.
  • Memory 120 High speed random access memory may be included, and may also include non-volatile memory such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory.
  • the memory 120 Can further include relative to the processor 180 Remotely set up memory that can be connected to the mobile terminal via a network 1200 . Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • Input unit 130 It can be used to receive input numeric or character information, as well as to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
  • the input unit 130 Touch sensitive surface 131 And other input devices 132 .
  • Touch sensitive surface 131 also known as a touch display or trackpad, can collect touch operations on or near the user (such as the user using a finger, stylus, etc., any suitable object or accessory on the touch-sensitive surface 131 On or on a touch-sensitive surface 131 The nearby operation), and the corresponding connection device is driven according to a preset program.
  • touch-sensitive surface 131 The touch detection device and the touch controller can be included in two parts.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 180 can receive the processor 180 Send the order and execute it.
  • resistive, capacitive, infrared, and surface acoustic waves can be used to achieve touch-sensitive surfaces.
  • Input unit 130 Can also include other input devices 132 .
  • other input devices 132 It may include, but is not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • Display unit 140 Can be used to display information input by a user or information provided to a user and a mobile terminal 1200 Various graphical user interfaces, which can be composed of graphics, text, icons, video, and any combination thereof.
  • Display unit 140 Can include a display panel 141 Optional, can be used LCD (Liquid Crystal Display ,LCD Monitor ) , OLED (Organic Light-Emitting Diode, Organic light emitting diode ) And other forms to configure the display panel 141 .
  • LCD Liquid Crystal Display ,LCD Monitor
  • OLED Organic Light-Emitting Diode, Organic light emitting diode
  • the touch-sensitive surface 131 Coverage display panel 141
  • the touch-sensitive surface 131 Transfer to the processor after detecting a touch operation on or near it 180
  • the processor 180 According to the type of touch event in the display panel 141 Provide corresponding visual output on it.
  • the touch-sensitive surface can be 131 And display panel 141 Integration for input and output functions.
  • Mobile terminal 1200 Can also include at least one sensor 150 Such as light sensors, motion sensors and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the display panel according to the brightness of the ambient light.
  • 141 Brightness, proximity sensor available at the mobile terminal 1200 Close the display panel when moving to the ear 141 with / Or backlight.
  • the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc. ;
  • Other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are also configurable, are not described here.
  • Audio circuit 160 speaker 161 ,microphone 162 User and mobile terminal available 1200 The audio interface between. Audio circuit 160 The converted electrical signal can be transmitted to the speaker 161 By speaker 161 Converted to sound signal output; on the other hand, the microphone 162 Converting the collected sound signal into an electrical signal by the audio circuit 160 Converted to audio data after receiving, and then output audio data to the processor 180 After treatment RF Circuit 110 To send to, for example, another terminal, or to output audio data to the memory 120 For further processing. Audio circuit 160 It may also include an earbud jack to provide peripheral headphones and mobile terminals 1200 Communication.
  • Mobile terminal 1200 Transmission module 170 (E.g Wi-Fi Modules) help users send and receive email, browse the web and access streaming media, etc. It provides users with wireless broadband Internet access.
  • the figure 3 Transmission module 170 But understandably, it does not belong to the mobile terminal. 1200 It must be constructed and can be omitted as needed within the scope of not changing the essence of the invention.
  • processor 180 Mobile terminal 1200 Control center, using various interfaces and lines to connect the various parts of the entire phone, by running or executing stored in the memory 120 Software program and / Or module, and the call is stored in memory 120 Internal data, executing mobile terminal 1200 The various functions and processing data to monitor the phone as a whole.
  • processor 180 One or more processing cores may be included; in some embodiments, the processor 180 The application processor and the modem processor can be integrated, wherein the application processor mainly processes an operating system, a user interface, an application, etc., and the modem processor mainly processes wireless communication. It can be understood that the above modem processor may not be integrated into the processor. 180 in.
  • Mobile terminal 1200 also includes power supplies for powering individual components 190 (such as a battery), in some embodiments, the power supply can pass through the power management system and the processor 180 Logically connected to manage charging, discharging, and power management functions through a power management system.
  • power supply 190 It may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
  • Mobile terminal 1200 can also include a camera (such as a front camera, a rear camera), a Bluetooth module, etc., and will not be described here.
  • the display unit of the mobile terminal is a touch screen display
  • the mobile terminal further includes a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to be one or one
  • the above processor executes one or more programs that include instructions for performing the following operations:
  • the sensitive character includes at least characters of numbers, letters, and Chinese characters.
  • the step of monitoring the current screen recording content when the mobile terminal starts the screen recording function includes:
  • the background detects whether the mobile terminal starts the recording function
  • the screen content is monitored in real time.
  • the determining whether the recorded content has a sensitive character in the sensitive character database, and if so, suspending the recording or displaying the recording result as a black screen specifically include:
  • the monitoring content is compared with the sensitive characters in the sensitive character database. If sensitive characters appear in the monitoring content, the recording is paused or the recording result is displayed as a black screen.
  • the manner of starting the recording screen includes: an active startup mode and a passive startup mode, and when the recording screen startup mode is the passive startup mode, an alert is issued.
  • the step of issuing an alert when the screen start mode is the passive start mode specifically including ;
  • the mobile terminal When the recording mode is passive, the mobile terminal will pop up a dialog box to remind the user to send a warning to inform the user that the current mobile terminal is recording in the background.
  • the method for preventing information theft, the storage device, and the mobile terminal provided by the present invention, by setting a sensitive character database in the mobile terminal in advance, when the mobile terminal starts the screen recording function, monitors and judges the current screen recording content. Whether the sensitive content in the sensitive character database appears in the recorded content, if it occurs, the recording is paused or the recording result is displayed as a black screen, thereby avoiding the problem that the user's personal key information is stolen.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

本发明公开了防止信息被盗的方法、存储设备及移动终端,所述方法包括:预先在移动终端设置敏感字符数据库;当移动终端启动录屏功能时,对当前录屏内容进行监控;判断所述录屏内容中是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏。

Description

一种防止信息被盗的方法、存储设备及移动终端
本申请要求于2017年7月4日提交中国专利局、申请号为201710536558.5、发明名称为“一种防止信息被盗的方法、存储设备及移动终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及移动终端信息安全技术领域,尤其涉及防止信息被盗的方法、存储设备及移动终端。
背景技术
随着科学技术的发展,移动终端的功能也日益强大,为了使用的方便,用户越来越多的个人信息与移动终端建立起联系。如将银行卡账号、各种支付账户密码等个人信息与移动终端进行绑定,用户在享受使用便捷的同时,也存在着潜在的信息被盗用的问题。
因此,现有技术还有待于改进和发展。
技术问题
本发明实施例提供一种防止信息被盗的方法、存储设备及移动终端,能够解决现有技术中当移动终端在使用时,因被后台录屏而导致个人信息容易被盗取的问题。
技术解决方案
第一方面,本发明实施例提供一种防止信息被盗的方法,所述方法包括:
预先在移动终端设置敏感字符数据库;
当移动终端启动录屏功能时,对当前录屏内容进行监控;
判断所述录屏内容是否出现,所述敏感字符数据库中的所述敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏。
在所述的防止信息被盗的方法中,其中,所述敏感字符至少包括数字、字母和汉字的字符。
在所述的防止信息被盗的方法中,其中,所述当移动终端启动录屏功能时,对当前录屏内容进行监控的步骤,具体包括:
后台检测移动终端是否启动录屏功能;
当检测到移动终端启动录屏功能时,对录屏内容进行实时监控。
在所述的防止信息被盗的方法中,其中,所述判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏的步骤,具体包括:
获取录屏的监控内容;
将监控内容同所述敏感字符数据库中的敏感字符进行比对,若所述监控内容中出现敏感字符,则暂停录屏或将录屏结果显示为黑屏。
在所述的防止信息被盗的方法中,其中,所述启动录屏的方式包括:主动启动方式和被动启动方式,当录屏启动方式为所述被动启动方式时,发出警示。
第二方面,本发明实施例提供一种存储设备,其中存储有多条指令,所述指令适于由处理器加载并执行:
预先在移动终端设置敏感字符数据库;
当移动终端启动录屏功能时,对录屏内容进行检测;
判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏。
在所述的存储设备中,其中存储有多条指令,所述指令适于由处理器加载并继续执行:
后台检测移动终端是否启动录屏功能;
当检测到移动终端启动录屏功能时,对录屏内容进行实时监控。
在所述的存储设备中,其中存储有多条指令,所述指令适于由处理器加载并继续执行:
获取录屏的监控内容;
将监控内容同所述敏感字符数据库中的敏感字符进行比对,若所述监控内容中出现敏感字符,则暂停录屏或将录屏结果显示为黑屏。
在所述的存储设备中,其中存储有多条指令,所述指令适于由处理器加载并继续执行:
当录屏启动方式为被动启动方式时,发出警示。
第三方面,本发明实施例提供一种移动终端,包括处理器,适于实现各指令;以及存储设备,适于存储多条指令,所述指令适于由处理器加载并执行以下步骤:
预先在移动终端设置敏感字符数据库;
当移动终端启动录屏功能时,对当前录屏内容进行监控;
判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏;
当切换到无敏感字符页面时继续进行录屏。
在所述的移动终端中,其中,所述敏感字符至少包括数字、字母和汉字的字符。
在所述的移动终端中,其中,所述当移动终端启动录屏功能时,对当前录屏内容进行监控的步骤,具体包括:
后台检测移动终端是否启动录屏功能;
当检测到移动终端启动录屏功能时,对录屏内容进行实时监控。
在所述的移动终端中,其中,所述判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏的步骤,具体包括:
获取录屏的监控内容;
将监控内容同所述敏感字符数据库中的敏感字符进行比对,若所述监控内容中出现敏感字符,则暂停录屏或将录屏结果显示为黑屏。
在所述的移动终端中,其中,所述启动录屏的方式包括:主动启动方式和被动启动方式,当录屏启动方式为所述被动启动方式时,发出警示。
在所述的移动终端中,其中,所述当录屏启动方式为所述被动启动方式时,发出警示的步骤,具体包括 ;
当录屏启动方式为被动启动方式时,移动终端会弹出一个对话框,用于提醒用户发出警示,告知用户当前移动终端后台在进行录屏。
有益效果
有益效果:本发明提供的防止信息被盗的方法、存储设备及移动终端,通过预先在移动终端设置敏感字符数据库,当移动终端启动录屏功能时,对当前录屏内容进行监控,判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏,从而避免了用户的个人关键信息被盗取的问题。
附图说明
图1为本发明提供的一种防止信息被盗的方法的较佳实施例的流程图。
图2为本发明提供的一种防止信息被盗的存储设备的较佳实施例的结构框图。
图3是本发明提供的移动终端的实施例的具体结构示意图。
本发明的最佳实施方式
本发明提供一种防止信息被盗的方法、存储设备及移动终端,为使本发明的目的、技术方案及效果更加清楚、明确,以下对本发明进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
请参阅图 1 ,图 1 为本发明一种防止信息被盗的方法较佳实施例的流程图,如图 1 所示,所述一种防止信息被盗的方法,适于在计算设备中执行,包括步骤:
、预先在移动终端设置敏感字符数据库;
、当移动终端启动录屏功能时,对当前录屏内容进行监控;
、判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏。
在本发明实施例中,移动终端后台进行录屏时,会将用户所输入的每一操作步骤都进行录制,一旦所录制的内容被别人获得,则易导致用户输入的账号密码等个人信息被他人盗取;本发明提供一种防止信息被盗的方法,通过预先在移动终端设置敏感字符数据库;当移动终端启动录屏功能时,对当前录屏内容进行监控;判断所述录屏内容中,是否出现所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏。解决了现有技术中当移动终端在使用时被后台录屏而导致个人信息容易被盗取的问题。    
进一步,在本发明中,所述步骤 S100 中,所述敏感字符至少包括数字、字母和汉字的字符。
具体地,目前涉及关键的个人信息中以数字为主的如身份证号码、银行账号以及密码等;以数字和字母组合的方式在网络上注册的账号如微博、微信号等;以及在移动终端的页面上出现输入框时,也通常会涉及到验证信息,因此将数字、字母和汉字字符等定义为敏感字符、词汇,使监控的内容更加全面,以便更好的防止信息被盗取。
进一步,在本发明中,所述步骤 S200 具体包括:
、后台检测移动终端是否启动录屏功能;
、当检测到移动终端启动录屏功能时,对录屏内容进行实时监控。
通过上述步骤使得移动终端在后台启动录屏时,对录屏内容进行实时监控,以免关键信息也被录制下来,从而造成个人信息被盗取。
进一步,所述步骤 S300 具体包括:
、获取录屏的监控内容;
、将监控内容同所述敏感字符数据库中的敏感字符进行比对,若所述监控内容中出现敏感字符,则暂停录屏或将录屏结果显示为黑屏。
具体地,在录屏的过程中当监控发现有敏感字符出现后,会立即暂停录屏或将录屏结果显示为黑屏,当用户切换到无敏感字符页面时继续进行录屏,从而保证了录屏功能正常的同时也避免了个人关键信息被盗取。
进一步,本发明中,所述启动录屏的方式包括:主动启动方式和被动启动方式,当录屏启动方式为所述被动启动方式时,发出警示。
具体地,移动终端后台启动录屏的方式有主动方式 , 例如用户使用录屏软件对屏幕进行录制,还有被动的启动方式 , 例如黑客通过 ADB 指令进行录屏。所述 ADB android debug bridge( android 调试桥 ) ,现如今,伴随着移动终端助手的普及如手机助手,使用手机助手时需要打开 USB 调试,当用户将手机连接电脑时,若电脑被黑客入侵,不法黑客只需借助一个简单的命令: adb shell screenrecord sdcard\11.mp4 即可在后台对手机进行录屏。
当发现录屏启动方式为被动启动方式时,移动终端会弹出一个对话框,用于提醒用户发出警示,告知用户当前移动终端后台在进行录屏,以便于用户及时做出反应。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储设备中,存储设备可以包括:只读存储器( ROM )、随机存取存储器 RAM )、磁盘或光盘等。
请参阅图 2 ,图 2 为本发明基于上述方法,提供的一种防止信息被盗的存储设备较佳实施例的结构框图,如图 2 所示,一种存储设备 10 ,其中存储有多条指令,所述指令适于由处理器 20 加载并执行:预先在移动终端设置敏感字符数据库;当移动终端启动录屏功能时,对当前录屏内容进行监控;判断所述录屏内容中,是否出现所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏。
进一步,本发明中,所述指令适于由处理器 20 加载并继续执行:后台检测移动终端是否启动录屏功能;当检测到移动终端启动录屏功能时,对录屏内容进行实时监控。
进一步,本发明中,所述指令适于由处理器 20 加载并继续执行:当用户切换到无敏感字符界面时,继续进行录屏。
进一步,本发明中,所述指令适于由处理器 20 加载并继续执行:当录屏启动方式为被动启动方式时,发出警示。
进一步,如图 2 所示,本发明还提供一种移动终端,其中,包括:处理器 (processor)20 、存储设备 (memory)10 、其中,所述处理器 20 、存储设备 10 通过总线完成相互间的通信;
所述处理器 20 用于调用所述存储设备 10 中的程序指令,以执行上述基于防止信息被盗的方法,例如包括:预先在移动终端设置敏感字符数据库;当移动终端启动录屏功能时,对当前录屏内容进行监控;判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏。
3 示出了本发明实施例提供的移动终端的具体结构框图,该移动终端可以用于实施上述实施例中提供的防止信息被盗的方法。该移动终端 1200 可以为智能手机或平板电脑。
如图 3 所示,移动终端 1200 可以包括 RF Radio Frequency ,射频)电路 110 、包括有一个或一个以上(图中仅示出一个)计算机可读存储介质的存储器 120 、输入单元 130 、显示单元 140 、传感器 150 、音频电路 160 、传输模块 170 、包括有一个或者一个以上(图中仅示出一个)处理核心的处理器 180 以及电源 190 等部件。本领域技术人员可以理解,图 3 中示出的移动终端 1200 结构并不构成对移动终端 1200 的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:
电路 110 用于接收以及发送电磁波,实现电磁波与电信号的相互转换,从而与通讯网络或者其他设备进行通讯。 RF 电路 110 可包括各种现有的用于执行这些功能的电路元件,例如,天线、射频收发器、数字信号处理器、加密 / 解密芯片、用户身份模块( SIM )卡、存储器等等。 RF 电路 110 可与各种网络如互联网、企业内部网、无线网络进行通讯或者通过无线网络与其他设备进行通讯。上述的无线网络可包括蜂窝式电话网、无线局域网或者城域网。上述的无线网络可以使用各种通信标准、协议及技术,包括但并不限于全球移动通信***( Global System for Mobile Communication, GSM )、增强型移动通信技术( Enhanced Data GSM Environment, EDGE) ,宽带码分多址技术( Wideband Code Division Multiple Access, WCDMA ),码分多址技术( Code Division Access, CDMA )、时分多址技术( Time Division Multiple Access, TDMA ),无线保真技术( Wireless Fidelity Wi-Fi )(如美国电气和电子工程师协会标准 IEEE 802.11a IEEE 802.11b, IEEE802.11g / IEEE 802.11n )、网络电话( Voice over Internet Protocol, VoIP )、全球微波互联接入( Worldwide Interoperability for Microwave Access Wi-Max )、其他用于邮件、即时通讯及短消息的协议,以及任何其他合适的通讯协议,甚至可包括那些当前仍未被开发出来的协议。
存储器 120 可用于存储软件程序以及模块,如上述实施例中防止信息被盗的方法对应的程序指令 / 模块,处理器 180 通过运行存储在存储器 120 内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现防止信息被盗的功能。存储器 120 可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器 120 可进一步包括相对于处理器 180 远程设置的存储器,这些远程存储器可以通过网络连接至移动终端 1200 。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
输入单元 130 可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。具体地,输入单元 130 可包括触敏表面 131 以及其他输入设备 132 。触敏表面 131 ,也称为触摸显示屏或者触控板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触敏表面 131 上或在触敏表面 131 附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触敏表面 131 可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器 180 ,并能接收处理器 180 发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触敏表面 131 。除了触敏表面 131 ,输入单元 130 还可以包括其他输入设备 132 。具体地,其他输入设备 132 可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元 140 可用于显示由用户输入的信息或提供给用户的信息以及移动终端 1200 的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元 140 可包括显示面板 141 ,可选的,可以采用 LCD(Liquid Crystal Display ,液晶显示器 ) OLED(Organic Light-Emitting Diode, 有机发光二极管 ) 等形式来配置显示面板 141 。进一步的,触敏表面 131 可覆盖显示面板 141 ,当触敏表面 131 检测到在其上或附近的触摸操作后,传送给处理器 180 以确定触摸事件的类型,随后处理器 180 根据触摸事件的类型在显示面板 141 上提供相应的视觉输出。虽然在图 3 中,触敏表面 131 与显示面板 141 是作为两个独立的部件来实现输入和输入功能,但是在某些实施例中,可以将触敏表面 131 与显示面板 141 集成而实现输入和输出功能。
移动终端 1200 还可包括至少一种传感器 150 ,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板 141 的亮度,接近传感器可在移动终端 1200 移动到耳边时,关闭显示面板 141 / 或背光。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等 ; 至于移动终端 1200 还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路 160 、扬声器 161 ,传声器 162 可提供用户与移动终端 1200 之间的音频接口。音频电路 160 可将接收到的音频数据转换后的电信号,传输到扬声器 161 ,由扬声器 161 转换为声音信号输出;另一方面,传声器 162 将收集的声音信号转换为电信号,由音频电路 160 接收后转换为音频数据,再将音频数据输出处理器 180 处理后,经 RF 电路 110 以发送给比如另一终端,或者将音频数据输出至存储器 120 以便进一步处理。音频电路 160 还可能包括耳塞插孔,以提供外设耳机与移动终端 1200 的通信。
移动终端 1200 通过传输模块 170 (例如 Wi-Fi 模块)可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图 3 示出了传输模块 170 ,但是可以理解的是,其并不属于移动终端 1200 的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器 180 是移动终端 1200 的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器 120 内的软件程序和 / 或模块,以及调用存储在存储器 120 内的数据,执行移动终端 1200 的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器 180 可包括一个或多个处理核心;在一些实施例中,处理器 180 可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作***、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器 180 中。
移动终端 1200 还包括给各个部件供电的电源 190 (比如电池),在一些实施例中,电源可以通过电源管理***与处理器 180 逻辑相连,从而通过电源管理***实现管理充电、放电、以及功耗管理等功能。电源 190 还可以包括一个或一个以上的直流或交流电源、再充电***、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。
尽管未示出 ,移动终端 1200 还可以包括摄像头(如前置摄像头、后置摄像头)、蓝牙模块等,在此不再赘述。具体在本实施例中,移动终端的显示单元是触摸屏显示器,移动终端还包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置以由一个或者一个以上处理器执行述一个或者一个以上程序包含用于进行以下操作的指令:
预先在移动终端设置敏感字符数据库;
当移动终端启动录屏功能时,对当前录屏内容进行监控;
判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏;
当切换到无敏感字符页面时继续进行录屏。
在所述的移动终端中,其中,所述敏感字符至少包括数字、字母和汉字的字符。
在所述的移动终端中,其中,所述当移动终端启动录屏功能时,对当前录屏内容进行监控的步骤,具体包括:
后台检测移动终端是否启动录屏功能;
当检测到移动终端启动录屏功能时,对录屏内容进行实时监控。
在所述的移动终端中,其中,所述判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏的步骤,具体包括:
获取录屏的监控内容;
将监控内容同所述敏感字符数据库中的敏感字符进行比对,若所述监控内容中出现敏感字符,则暂停录屏或将录屏结果显示为黑屏。
在所述的移动终端中,其中,所述启动录屏的方式包括:主动启动方式和被动启动方式,当录屏启动方式为所述被动启动方式时,发出警示。
在所述的移动终端中,其中,所述当录屏启动方式为所述被动启动方式时,发出警示的步骤,具体包括 ;
当录屏启动方式为被动启动方式时,移动终端会弹出一个对话框,用于提醒用户发出警示,告知用户当前移动终端后台在进行录屏。
综上所述,本发明提供的防止信息被盗的方法、存储设备及移动终端,通过预先在移动终端设置敏感字符数据库,当移动终端启动录屏功能时,对当前录屏内容进行监控,判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏,从而避免了用户的个人关键信息被盗取的问题。
应当理解的是,本发明的应用不限于上述的举例,对本领域普通技术人员来说,可以根据上述说明加以改进或变换,所有这些改进和变换都应属于本发明所附权利要求的保护范围。

Claims (15)

  1. 一种防止信息被盗的方法,其中,所述方法包括:
    预先在移动终端设置敏感字符数据库;
    当移动终端启动录屏功能时,对当前录屏内容进行监控;
    判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏。
  2. 根据权利要求1所述的防止信息被盗的方法,其中,所述敏感字符至少包括数字、字母和汉字的字符。
  3. 根据权利要求1所述的防止信息被盗的方法,其中,所述当移动终端启动录屏功能时,对当前录屏内容进行监控的步骤,具体包括:
    后台检测移动终端是否启动录屏功能;
    当检测到移动终端启动录屏功能时,对录屏内容进行实时监控。
  4. 根据权利要求1所述的防止信息被盗的方法,其中,所述判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏的步骤,具体包括:
    获取录屏的监控内容;
    将监控内容同所述敏感字符数据库中的敏感字符进行比对,若所述监控内容中出现敏感字符,则暂停录屏或将录屏结果显示为黑屏。
  5. 根据权利要求1所述的防止信息被盗的方法,其中,所述启动录屏的方式包括:主动启动方式和被动启动方式,当录屏启动方式为所述被动启动方式时,发出警示。
  6. 一种存储设备,其中存储有多条指令,所述指令适于由处理器加载并执行:
    预先在移动终端设置敏感字符数据库;
    当移动终端启动录屏功能时,对录屏内容进行检测;
    判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏。
  7. 根据权利要求6所述的存储设备,其中存储有多条指令,所述指令适于由处理器加载并继续执行:
    后台检测移动终端是否启动录屏功能;
    当检测到移动终端启动录屏功能时,对录屏内容进行实时监控。
  8. 根据权利要求6所述的存储设备,其中存储有多条指令,所述指令适于由处理器加载并继续执行:
    获取录屏的监控内容;
    将监控内容同所述敏感字符数据库中的敏感字符进行比对,若所述监控内容中出现敏感字符,则暂停录屏或将录屏结果显示为黑屏。
  9. 根据权利要求6所述的存储设备,其中存储有多条指令,所述指令适于由处理器加载并继续执行:
    当录屏启动方式为被动启动方式时,发出警示。
  10. 一种移动终端,包括处理器,适于实现各指令;以及存储设备,适于存储多条指令,所述指令适于由处理器加载并执行以下步骤:
    预先在移动终端设置敏感字符数据库;
    当移动终端启动录屏功能时,对当前录屏内容进行监控;
        判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏;
    当切换到无敏感字符页面时继续进行录屏。
  11. 根据权利要求10所述的移动终端,其中,所述敏感字符至少包括数字、字母和汉字的字符。
  12. 根据权利要求10所述的移动终端,其中,所述当移动终端启动录屏功能时,对当前录屏内容进行监控的步骤,具体包括:
    后台检测移动终端是否启动录屏功能;
    当检测到移动终端启动录屏功能时,对录屏内容进行实时监控。
  13. 根据权利要求10所述的移动终端,其中,所述判断所述录屏内容是否出现有所述敏感字符数据库中的敏感字符,若出现,则暂停录屏或将录屏结果显示为黑屏的步骤,具体包括:
    获取录屏的监控内容;
    将监控内容同所述敏感字符数据库中的敏感字符进行比对,若所述监控内容中出现敏感字符,则暂停录屏或将录屏结果显示为黑屏。
  14. 根据权利要求10所述的移动终端,其中,所述启动录屏的方式包括:主动启动方式和被动启动方式,当录屏启动方式为所述被动启动方式时,发出警示。
  15. 根据权利要求14所述的移动终端,其中,所述当录屏启动方式为所述被动启动方式时,发出警示的步骤,具体包括;
        当录屏启动方式为被动启动方式时,移动终端会弹出一个对话框,用于提醒用户发出警示,告知用户当前移动终端后台在进行录屏。
PCT/CN2018/094521 2017-07-04 2018-07-04 一种防止信息被盗的方法、存储设备及移动终端 WO2019007371A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/624,307 US20210150050A1 (en) 2017-07-04 2018-07-04 Method for preventing information from being stolen, storage device, and mobile terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710536558.5 2017-07-04
CN201710536558.5A CN107180204A (zh) 2017-07-04 2017-07-04 一种防止信息被盗的方法、存储设备及移动终端

Publications (1)

Publication Number Publication Date
WO2019007371A1 true WO2019007371A1 (zh) 2019-01-10

Family

ID=59845911

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/094521 WO2019007371A1 (zh) 2017-07-04 2018-07-04 一种防止信息被盗的方法、存储设备及移动终端

Country Status (3)

Country Link
US (1) US20210150050A1 (zh)
CN (1) CN107180204A (zh)
WO (1) WO2019007371A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022087269A1 (en) * 2020-10-21 2022-04-28 Verint Americas Inc. System and method of automated determination of use of sensitive information and corrective action for improper use

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107180204A (zh) * 2017-07-04 2017-09-19 惠州Tcl移动通信有限公司 一种防止信息被盗的方法、存储设备及移动终端
CN108090173A (zh) * 2017-12-14 2018-05-29 广东欧珀移动通信有限公司 录屏文件的删除方法、装置、终端及存储介质
CN107958168A (zh) * 2017-12-19 2018-04-24 广东欧珀移动通信有限公司 录屏方法、装置及终端
CN108091332A (zh) * 2017-12-27 2018-05-29 盯盯拍(深圳)技术股份有限公司 基于行车记录仪的语音处理方法以及基于行车记录仪的语音处理装置
CN112905971B (zh) * 2021-03-25 2022-08-09 建信金融科技有限责任公司 一种处理信息的方法和装置
CN113747244B (zh) * 2021-07-28 2024-03-22 深圳市华曦达科技股份有限公司 多媒体数据的保护方法、终端设备及服务器

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007068993A1 (en) * 2005-12-16 2007-06-21 Nokia Corporation Method and device for controlling and providing indications of communication events
CN102279912A (zh) * 2011-06-03 2011-12-14 奇智软件(北京)有限公司 客户端程序监控方法、装置及客户端
CN103778377A (zh) * 2014-01-28 2014-05-07 宇龙计算机通信科技(深圳)有限公司 一种终端及防止敏感信息泄露的方法
CN106485170A (zh) * 2015-09-02 2017-03-08 阿里巴巴集团控股有限公司 一种信息输入方法和装置
CN106650441A (zh) * 2016-11-01 2017-05-10 宇龙计算机通信科技(深圳)有限公司 一种录屏方法以及装置
CN107180204A (zh) * 2017-07-04 2017-09-19 惠州Tcl移动通信有限公司 一种防止信息被盗的方法、存储设备及移动终端

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104281950A (zh) * 2013-07-11 2015-01-14 腾讯科技(深圳)有限公司 提高电子支付安全性的方法及装置
CN105635794B (zh) * 2015-10-21 2019-05-14 宇龙计算机通信科技(深圳)有限公司 一种录屏方法及***
US20170163664A1 (en) * 2015-12-04 2017-06-08 Bottomline Technologies (De) Inc. Method to secure protected content on a mobile device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007068993A1 (en) * 2005-12-16 2007-06-21 Nokia Corporation Method and device for controlling and providing indications of communication events
CN102279912A (zh) * 2011-06-03 2011-12-14 奇智软件(北京)有限公司 客户端程序监控方法、装置及客户端
CN103778377A (zh) * 2014-01-28 2014-05-07 宇龙计算机通信科技(深圳)有限公司 一种终端及防止敏感信息泄露的方法
CN106485170A (zh) * 2015-09-02 2017-03-08 阿里巴巴集团控股有限公司 一种信息输入方法和装置
CN106650441A (zh) * 2016-11-01 2017-05-10 宇龙计算机通信科技(深圳)有限公司 一种录屏方法以及装置
CN107180204A (zh) * 2017-07-04 2017-09-19 惠州Tcl移动通信有限公司 一种防止信息被盗的方法、存储设备及移动终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022087269A1 (en) * 2020-10-21 2022-04-28 Verint Americas Inc. System and method of automated determination of use of sensitive information and corrective action for improper use
US11972017B2 (en) 2020-10-21 2024-04-30 Verint Americas Inc. System and method of automated determination of use of sensitive information and corrective action for improper use

Also Published As

Publication number Publication date
US20210150050A1 (en) 2021-05-20
CN107180204A (zh) 2017-09-19

Similar Documents

Publication Publication Date Title
US11269981B2 (en) Information displaying method for terminal device and terminal device
US10708065B2 (en) Service processing method, device and system
WO2019007371A1 (zh) 一种防止信息被盗的方法、存储设备及移动终端
WO2017118412A1 (zh) 一种更新密钥的方法、装置和***
US20150294101A1 (en) Running applications, and authenticating users
CN106778175B (zh) 一种界面锁定方法、装置和终端设备
US11227042B2 (en) Screen unlocking method and apparatus, and storage medium
CN104852885B (zh) 一种进行验证码验证的方法、装置和***
WO2017020630A1 (zh) 一种处理订单信息的方法、装置和***
US10678942B2 (en) Information processing method and related products
WO2017084288A1 (zh) 身份验证方法及装置
WO2016078504A1 (zh) 身份鉴权方法和装置
WO2015062235A1 (zh) 电子设备、电池保护方法和装置
WO2016127795A1 (zh) 业务处理方法、服务器及终端
WO2015043194A1 (zh) 虚拟键盘显示方法、装置及终端
US11176228B2 (en) Application interface display method, apparatus, and terminal, and storage medium
WO2018209555A1 (zh) 连接蓝牙设备的方法及终端设备
WO2021057290A1 (zh) 信息控制方法及电子设备
CN103279272B (zh) 一种在电子装置中启动应用程序的方法及装置
WO2017206918A1 (zh) 终端加速唤醒方法以及相关产品
WO2019019837A1 (zh) 生物识别方法及相关产品
CN105162930B (zh) 移动终端的录音方法及装置
CN106447325B (zh) 一种基于nfc通信的处理方法、装置及移动终端
US10476889B2 (en) Information interaction method, apparatus and system
WO2017118421A1 (zh) 终端密钥生成方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18828242

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18828242

Country of ref document: EP

Kind code of ref document: A1