Movatterモバイル変換


[0]ホーム

URL:


CN108595946B - A method and terminal for protecting privacy - Google Patents

A method and terminal for protecting privacy
Download PDF

Info

Publication number
CN108595946B
CN108595946BCN201810269038.7ACN201810269038ACN108595946BCN 108595946 BCN108595946 BCN 108595946BCN 201810269038 ACN201810269038 ACN 201810269038ACN 108595946 BCN108595946 BCN 108595946B
Authority
CN
China
Prior art keywords
terminal
interface
password information
target
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810269038.7A
Other languages
Chinese (zh)
Other versions
CN108595946A (en
Inventor
史振杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co LtdfiledCriticalVivo Mobile Communication Co Ltd
Priority to CN201810269038.7ApriorityCriticalpatent/CN108595946B/en
Publication of CN108595946ApublicationCriticalpatent/CN108595946A/en
Application grantedgrantedCritical
Publication of CN108595946BpublicationCriticalpatent/CN108595946B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本发明实施例提供一种保护隐私的方法及终端,应用于终端技术领域,可以解决终端解锁屏幕时用户的隐私泄露的问题。该方案包括:在终端处于锁屏状态的情况下,该终端接收目标密码信息输入;若目标密码信息符合预设密码信息,则终端解锁屏幕并显示目标界面,该目标界面为终端的界面中除待保护界面之外的界面,或者该目标界面为对待保护界面进行模糊处理后的界面,待保护界面为终端锁定屏幕前最后显示的界面。该方案具体应用于终端解锁屏幕时对该终端锁定屏幕前最后显示的界面的处理过程中。

Figure 201810269038

Embodiments of the present invention provide a method and a terminal for protecting privacy, which are applied to the technical field of terminals and can solve the problem of user privacy leakage when the terminal unlocks the screen. The solution includes: when the terminal is in a screen-locked state, the terminal receives the input of target password information; if the target password information matches the preset password information, the terminal unlocks the screen and displays the target interface, where the target interface is in addition to the interface of the terminal. The interface other than the interface to be protected, or the target interface is an interface after the interface to be protected is blurred, and the interface to be protected is the last interface displayed before the terminal locks the screen. The solution is specifically applied to the process of processing the last interface displayed before the terminal locks the screen when the terminal unlocks the screen.

Figure 201810269038

Description

Privacy protection method and terminal
Technical Field
The embodiment of the invention relates to the technical field of terminals, in particular to a method and a terminal for protecting privacy.
Background
With the development of communication technology, the intelligent degree of terminals such as mobile phones and tablet computers is continuously improved so as to meet various requirements of users. For example, a user may need to protect the content in some applications (e.g., payment applications) displayed by the terminal.
When the user public place controls the terminal to unlock the screen, the terminal displays the page of the application function program operated by the foreground, and the page may include the privacy content of the user. In this way, the private content displayed by the terminal may be seen by others, thereby causing the private content of the user to be leaked.
Disclosure of Invention
The embodiment of the invention provides a method and a terminal for protecting privacy, and aims to solve the problem that the privacy of a user is revealed when the terminal unlocks a screen.
In order to solve the above technical problem, the embodiment of the present invention is implemented as follows:
in a first aspect, an embodiment of the present invention provides a method for protecting privacy, where the method includes: under the condition that the terminal is in a screen locking state, the terminal receives target password information input; and if the target password information accords with the preset password information, the terminal unlocks the screen and displays a target interface, wherein the target interface is an interface except for the interface to be protected in the interface of the terminal, or the target interface is an interface after the interface to be protected is subjected to fuzzy processing, and the interface to be protected is the interface displayed last before the terminal locks the screen.
In a second aspect, an embodiment of the present invention further provides a terminal, where the terminal includes: the device comprises a receiving module and a display module; the receiving module is used for receiving the input of the target password information under the condition that the terminal is in a screen locking state; and the display module is used for unlocking the screen and displaying a target interface if the target password information received by the receiving module conforms to the preset password information, wherein the target interface is an interface except for the interface to be protected in the interface of the terminal, or the target interface is an interface after the interface to be protected is subjected to fuzzy processing, and the interface to be protected is the interface displayed last before the terminal locks the screen.
In a third aspect, an embodiment of the present invention provides a terminal, including a processor, a memory, and a computer program stored in the memory and being executable on the processor, where the computer program, when executed by the processor, implements the steps of the method for protecting privacy according to the first aspect.
In a fourth aspect, the embodiments of the present invention provide a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the method for protecting privacy according to the second aspect.
In the embodiment of the invention, the interface displayed last before the terminal locks the screen (namely the interface to be protected) can be processed when the terminal unlocks the screen, so that the interface displayed after the terminal unlocks the screen is the interface except the interface to be protected in the interface of the terminal or the interface after the interface to be protected is subjected to fuzzy processing; therefore, the interface displayed first after the terminal unlocks the screen does not contain the privacy information of the user. Therefore, the problem that privacy of a user is leaked when the terminal unlocks the screen can be solved.
Drawings
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for protecting privacy according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an interface displayed by a terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a hardware structure of a terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that "/" in this context means "or", for example, A/B may mean A or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. "plurality" means two or more than two.
It should be noted that, in the embodiments of the present invention, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In a scenario where a user needs to perform privacy protection on content in an interface (recorded as an interface to be protected) displayed last before a screen is locked by the terminal, the privacy content in the protected interface or all content in the interface to be protected may not be displayed after the screen is unlocked by the terminal, so as to perform privacy protection on the content in the interface to be protected.
The terminal in the embodiment of the present invention may be a terminal having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present invention are not limited in particular.
The following describes a software environment applied by the method for protecting privacy according to the embodiment of the present invention, taking an android operating system as an example.
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention. In fig. 1, the architecture of the android operating system includes 4 layers, which are respectively: an application layer, an application framework layer, a system runtime layer, and a kernel layer (specifically, a Linux kernel layer).
The application program layer comprises various application programs (including system application programs and third-party application programs) in an android operating system.
The application framework layer is a framework of the application, and a developer can develop some applications based on the application framework layer under the condition of complying with the development principle of the framework of the application. For example, applications such as a system setup application, a system chat application, and a system camera application. And the third-party setting application, the third-party camera application, the third-party chatting application and other application programs.
The system runtime layer includes libraries (also called system libraries) and android operating system runtime environments. The library mainly provides various resources required by the android operating system. The android operating system running environment is used for providing a software environment for the android operating system.
The kernel layer is an operating system layer of an android operating system and belongs to the bottommost layer of an android operating system software layer. The kernel layer provides kernel system services and hardware-related drivers for the android operating system based on the Linux kernel.
Taking an android operating system as an example, in the embodiment of the present invention, a developer may develop a software program for implementing the method for protecting privacy, which is provided by the embodiment of the present invention, based on the system architecture of the android operating system shown in fig. 1, so that the method for protecting privacy may run based on the android operating system shown in fig. 1. Namely, the processor or the terminal device can implement the method for protecting privacy provided by the embodiment of the invention by running the software program in the android operating system.
The following describes the method for protecting privacy according to an embodiment of the present invention in detail with reference to the flowchart of the method for protecting privacy shown in fig. 2. Wherein, although a logical order of methods of protecting privacy provided by embodiments of the present invention is shown in a method flow diagram, in some cases, the steps shown or described may be performed in an order different than here. For example, the method of protecting privacy illustrated in fig. 2 may include S201 and S202:
s201, under the condition that the terminal is in a screen locking state, the terminal receives input of target password information.
Specifically, the input may be an unlocking operation for unlocking the screen by the user, and the target password information is input by the user through the unlocking operation.
Optionally, the terminal provided in the embodiment of the present invention is in a screen lock state, which may be a state where the terminal is in a screen lock interface display state. The screen locking interface can prompt a user of a screen unlocking mode of the terminal, such as unlocking modes of biological characteristic information, character password information, image password information or key password information. The biometric information may be fingerprint information of a user, face feature information, or iris feature information of a human eye, and the like, which is not limited in the embodiment of the present invention.
Optionally, the terminal provided in the embodiment of the present invention is in a screen lock state, which may be that a screen of the terminal is in a screen off state. At this time, the mode of the terminal to unlock the screen may be biometric information or key password information.
It should be noted that, in the first application scenario of the embodiment of the present invention, the preset password information may include preset unlocking password information, where the preset unlocking password information is used to instruct the terminal to unlock the screen.
The target password information may include biometric information, character password information, image password information, or key password information input by a user.
Similarly, the preset password information (e.g., the preset unlocking password information) may include preset biometric information, preset character password information, preset image password information, or key password information.
Of course, the preset unlocking password information may further include information indicating a start position and/or a movement trajectory of the preset unlocking operation.
Similarly, the target password information may further include information indicating a start position and/or a movement trajectory of the unlocking operation input by the user.
In the following, the method for protecting privacy provided by the embodiment of the present invention is described by taking an example that the preset unlocking password information includes preset face feature information.
The unlocking operation of the user can be the operation of controlling the camera of the terminal to move, so that the terminal can acquire the face feature information of the user through the camera, and the target password information comprises the face feature information.
At this time, the target password information conforms to the preset password information, that is, the target password information conforms to the preset unlocking password information. Specifically, the face feature information included in the target password information conforms to the face biometric feature information in the preset unlocking password information.
It should be noted that, when one piece of face feature information conforms to another piece of face feature information, it means that the two pieces of face feature information are the same, or the similarity between the two pieces of face feature information is higher than a certain threshold.
It should be noted that, in the method for protecting privacy provided in the embodiment of the present invention, description of other preset unlocking password information may refer to the above description of the preset unlocking password information including the preset face feature information, and details are not described in the embodiment of the present invention.
In addition, the terminal provided by the embodiment of the invention can be provided with a touch screen and a fingerprint identifier. The operation (i.e., the unlocking operation) for inputting the target password information to the terminal by the user may be a touch screen operation or a fingerprint operation. The touch screen operation may be touch operations such as a pressing operation, a long pressing operation, a sliding operation, a clicking operation, a floating operation (an operation of a user near the touch screen) and the like of the touch screen of the terminal by the user; the fingerprint operation can be fingerprint operation such as sliding fingerprint, long-time pressing fingerprint, single-click fingerprint and double-click fingerprint of the fingerprint identifier of the terminal by the user. Specifically, the unlocking operation mode in the embodiment of the present invention is not limited, and may be any realizable mode.
S202, if the target password information accords with the preset password information, the terminal unlocks the screen and displays a target interface.
Specifically, the target interface may be an interface other than the interface to be protected in the interface of the terminal, or the target interface is an interface after the interface to be protected is subjected to the fuzzy processing, and the interface to be protected is an interface displayed last before the terminal locks the screen. For example, the interface to be protected is an interface of a desktop or a foreground running application program when the terminal locks a screen.
The target password information accords with preset password information, and the fact that a user who carries out unlocking operation on the terminal currently has the authority of unlocking the terminal is indicated.
It can be understood that the interface displayed last before the terminal locks the screen may include the user's privacy information, that is, the interface to be protected may include the user's privacy information. The private information of the user may include a private picture, a private video, a private text, or a private application program. For example, the privacy text is an amount that can be an account number of the user, and the like.
Specifically, when all the contents in the interface to be protected include the privacy information of the user, the target interface may be an interface other than the interface to be protected in the interface of the terminal; and when part of content in the interface to be protected contains the privacy information of the user, the target interface is the interface subjected to fuzzy processing on the interface to be protected.
Optionally, the terminal performs fuzzy processing on the interface to be protected, and may perform scrambling processing or mosaic-like fuzzy processing on the content containing the privacy information in the interface to be protected.
Exemplarily, as shown in fig. 3, a schematic diagram of an interface displayed by a terminal according to an embodiment of the present invention is provided.Interface 301 in fig. 3 shows the interface displayed last beforeterminal 30 locks the screen, andinterface 301 is the interface of application 1. Theinterface 302 in fig. 3 is the interface displayed first after the terminal 30 unlocks the screen, and theinterface 302 is the desktop of the terminal 30. Obviously, theinterface 302 displayed by the terminal 30 after unlocking the screen is not the interface of the application 1, that is, the content in theinterface 301 is not included in theinterface 302.
It should be noted that, with the method for protecting privacy provided in the embodiment of the present invention, when the terminal unlocks the screen, the interface displayed last before the terminal locks the screen (i.e., the interface to be protected) may be processed, so that the interface displayed after the terminal unlocks the screen is an interface other than the interface to be protected in the interface of the terminal, or an interface after the interface to be protected is subjected to the fuzzy processing; therefore, the interface displayed first after the terminal unlocks the screen does not contain the privacy information of the user. Therefore, the problem that privacy of a user is leaked when the terminal unlocks the screen can be solved.
In a possible implementation manner, in a second application scenario of the method for protecting privacy provided in the embodiment of the present invention, the preset password information may include preset unlocking password information and preset additional password information. The additional encryption information is used for indicating the terminal to display the target interface after unlocking the screen.
It is understood that the additional encryption information may also include preset biometric information, preset character password information, preset image password information, or key password information. Of course, the preset additional password information may further include information indicating a start position and/or a movement track of an operation (denoted as an operation of turning on the privacy) of inputting the additional password information by the user.
It is emphasized that the preset unlocking password information and the preset additional password information are different.
Illustratively, the preset additional password information provided by the embodiment of the present invention includes information indicating a double-click operation of the volume up key by the user. Similarly, the target password information may further include information indicating a double-click operation of the volume up key by the user.
It is to be understood that the user's unlocking operation and privacy-opening operation indicated in the target password information may be input by the user at the same time, or may be input by the user separately within a time period less than a certain time threshold.
In the second application scenario provided in the embodiment of the present invention, when the target password information received from the user conforms to the preset password information, the terminal may first display the target interface after unlocking the screen subsequently.
It should be noted that, in the second application scenario provided in the embodiment of the present invention, when the unlocking password information received by the terminal conforms to the preset unlocking password information and the received additional password information conforms to the preset additional password information, the terminal may first display a target interface that does not include the privacy information of the user after the subsequent unlocking screen. And when the unlocking password information received by the terminal accords with the preset unlocking password information and additional password information input by a user is not received, the terminal firstly displays the interface displayed last before the terminal locks the screen after the subsequent unlocking screen without processing the interface. Therefore, unnecessary operation when the terminal unlocks the screen can be avoided, and the flexibility of protecting the privacy of the user when the terminal unlocks the screen is improved.
In a possible implementation manner, the interface to be protected is an interface in a target application, and at this time, the target application is an application that runs in the foreground when the terminal locks the screen. Specifically, S202 provided in the above embodiment may be replaced with S202 a:
s202a, if the target password information accords with the preset password information and the target application program accords with the preset application program, the terminal unlocks the screen and displays the target interface.
It should be noted that the type of the preset application program may be a chat type, a payment type, or a game type. In addition, the identifier of the preset application program is in a preset white list.
The preset white list may be set by a user through a system in the terminal or by a third party in the terminal. Wherein, the identifier of a preset application program can uniquely indicate the preset application program.
Optionally, the preset white list may be obtained by the terminal from a network side, for example, obtained from a server.
It should be noted that, with the method for protecting privacy provided by the embodiment of the present invention, the terminal can determine whether the application program running in the foreground when the screen of the terminal is locked is the application program that the user needs to protect privacy. Therefore, the terminal avoids processing the application program which does not need privacy protection when the screen is subsequently unlocked, unnecessary operation when the screen is unlocked by the terminal can be avoided, and the flexibility of protecting the privacy of the user when the screen is unlocked by the terminal is further improved.
In a possible implementation manner, the target interface may be a desktop of the terminal. Specifically, the method for protecting privacy provided by the embodiment of the present invention may further include, after S201 and before S202, S203 or S203a, or may further include, after S201 and before S202a, S203 or S203 a:
and S203, the terminal closes the target application program.
And S203a, the terminal switches the target application program to a background to run.
It can be understood that after the terminal closes the target application program or switches the target application program to background operation, the target interface is a desktop, and the desktop does not include all contents in the interface of the target application program.
In addition, the target interface may be an interface of the interface to be protected after the fuzzy processing. Specifically, the method for protecting privacy provided by the embodiment of the present invention may further include, after S201 and before S202, S203b, or may further include, after S201 and before S202a, S203 b:
and S203b blurring the interface to be protected by the terminal.
It is understood that S203, S203a and S203b provided in the embodiment of the present invention may be respectively a processing rule. For example, "the terminal closes the target application" is recorded as processing rule 1, "the terminal switches the target application to the background operation" is recorded as processing rule 2, and "the terminal fuzzily processes the interface to be protected" is recorded as processing rule 3.
Optionally, the terminal may set a preset application program according to the type of the application program and the identifier of the application program, and may set a preset processing rule for each preset application program.
Optionally, the preset application programs with the same type correspond to the same processing rule; alternatively, a predetermined application corresponds to a processing rule.
For example, the preset application program of the chat type corresponds to the processing rule 2, and the preset application program of the payment type corresponds to the processing rule 3. The preset application identified as "bank a" corresponds to the above processing rule 1.
It should be noted that, with the method for protecting privacy provided in the embodiment of the present invention, since the terminal can support the user to set different processing rules for different application programs, when the terminal subsequently unlocks the screen, the terminal can process the program according to the processing rules preset by the user, and after unlocking the screen, the terminal first displays the interface that is finally displayed before locking the screen. Therefore, the flexibility of protecting the privacy of the user when the terminal unlocks the screen can be further improved.
In a possible implementation manner, the method for protecting privacy provided by the embodiment of the present invention may further include, after the step S201, step S204:
and S204, if the target password information accords with the preset password information and the target application program does not accord with the preset application program, the terminal unlocks the screen and displays an interface to be protected.
It is understood that the target application does not conform to the preset application, indicating that the target application is not a program for which privacy protection is required by the user.
Therefore, according to the method for protecting privacy provided by the embodiment of the invention, when the application program running in the foreground is not a program which requires privacy protection for the user when the screen is locked by the terminal, the terminal does not need to process the application program, and can firstly display the interface displayed last before the screen is locked by the terminal after the screen is unlocked. Therefore, the flexibility of protecting the privacy of the user when the terminal unlocks the screen can be further improved.
Fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention. The terminal 40 shown in fig. 4 includes: a receivingmodule 401 and adisplay module 402; areceiving module 401, configured to receive input of target password information when the terminal 40 is in a screen lock state; adisplay module 402, configured to unlock the screen and display a target interface if the target password information received by the receivingmodule 401 meets preset password information, where the target interface is an interface other than the interface to be protected in the interface of the terminal 40, or the target interface is an interface after the interface to be protected is subjected to the fuzzy processing, and the interface to be protected is an interface displayed last before the terminal 40 locks the screen.
Optionally, the preset password information includes preset unlocking password information and preset additional password information; the preset unlocking password information is used for indicating the terminal 40 to unlock the screen, and the additional password information is used for indicating the terminal 40 to display a target interface behind the unlocking screen.
Optionally, the interface to be protected is an interface in the target application program; thedisplay module 402 is specifically configured to unlock the screen and display a target interface if the target password information received by the receivingmodule 401 matches the preset password information and the target application program matches the preset application program.
Optionally, the target interface is a desktop of the terminal 40; the terminal 40 further includes: a processing module 403; and the processing module 403 is configured to close the target application program or switch the target application program to a background operation before thedisplay module 402 unlocks the screen and displays the target interface.
Optionally, thedisplay module 402 is further configured to, after thereceiving module 401 receives the input of the target password information, if the target password information conforms to the preset password information and the target application program does not conform to the preset application program, unlock the screen and display the interface to be protected by the terminal 40.
According to the terminal provided by the embodiment of the invention, because the terminal can process the interface (namely the interface to be protected) displayed last before the terminal locks the screen when the screen is unlocked, the interface displayed after the terminal unlocks the screen is the interface except the interface to be protected in the interface of the terminal or the interface after the interface to be protected is subjected to fuzzy processing; therefore, the interface displayed first after the terminal unlocks the screen does not contain the privacy information of the user. Therefore, the problem that privacy of a user is leaked when the terminal unlocks the screen can be solved. The terminal 30 and the terminal 40 provided in the embodiments of the present invention can implement each process implemented by the terminal in the above-described method embodiments, and are not described herein again to avoid repetition.
Fig. 5 is a schematic diagram of a hardware structure of a terminal according to an embodiment of the present invention, where the terminal 100 includes, but is not limited to:radio frequency unit 101,network module 102,audio output unit 103,input unit 104,sensor 105,display unit 106,user input unit 107,interface unit 108,memory 109,processor 110, and power supply 111. Those skilled in the art will appreciate that the terminal configuration shown in fig. 5 is not intended to be limiting, and that the terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
Theuser input unit 107 is configured to receive input of target password information when the terminal 100 is in the screen lock state; thedisplay unit 106 is configured to unlock the screen and display a target interface if the target password information received by theuser input unit 107 meets preset password information, where the target interface is an interface other than the interface to be protected in the interface of the terminal 100, or the target interface is an interface after the interface to be protected is subjected to the fuzzy processing, and the interface to be protected is an interface displayed last before the terminal 100 locks the screen.
According to the terminal provided by the embodiment of the invention, because the terminal can process the interface (namely the interface to be protected) displayed last before the terminal locks the screen when the screen is unlocked, the interface displayed after the terminal unlocks the screen is the interface except the interface to be protected in the interface of the terminal or the interface after the interface to be protected is subjected to fuzzy processing; therefore, the interface displayed first after the terminal unlocks the screen does not contain the privacy information of the user. Therefore, the problem that privacy of a user is leaked when the terminal unlocks the screen can be solved.
It should be understood that, in the embodiment of the present invention, theradio frequency unit 101 may be used for receiving and sending signals during a message transmission or call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by theprocessor 110; in addition, the uplink data is transmitted to the base station. Typically,radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, theradio frequency unit 101 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user through thenetwork module 102, such as helping the user send and receive e-mails, browse web pages, access streaming media, and the like.
Theaudio output unit 103 may convert audio data received by theradio frequency unit 101 or thenetwork module 102 or stored in thememory 109 into an audio signal and output as sound. Also, theaudio output unit 103 may also provide audio output related to a specific function performed by the terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). Theaudio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
Theinput unit 104 is used to receive an audio or video signal. Theinput Unit 104 may include a Graphics Processing Unit (GPU) 1041 and amicrophone 1042, and theGraphics processor 1041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on thedisplay unit 106. The image frames processed by thegraphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via theradio frequency unit 101 or thenetwork module 102. Themicrophone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via theradio frequency unit 101 in case of a phone call mode.
The terminal 100 also includes at least onesensor 105, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of thedisplay panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off thedisplay panel 1061 and/or a backlight when the terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; thesensors 105 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
Thedisplay unit 106 is used to display information input by a user or information provided to the user. TheDisplay unit 106 may include aDisplay panel 1061, and theDisplay panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
Theuser input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, theuser input unit 107 includes atouch panel 1071 andother input devices 1072.Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or neartouch panel 1071 using a finger, stylus, or any suitable object or attachment). Thetouch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to theprocessor 110, and receives and executes commands sent by theprocessor 110. In addition, thetouch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to thetouch panel 1071, theuser input unit 107 may includeother input devices 1072. Specifically,other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, thetouch panel 1071 may be overlaid on thedisplay panel 1061, and when thetouch panel 1071 detects a touch operation thereon or nearby, thetouch panel 1071 transmits the touch operation to theprocessor 110 to determine the type of the touch event, and then theprocessor 110 provides a corresponding visual output on thedisplay panel 1061 according to the type of the touch event. Although in fig. 5, thetouch panel 1071 and thedisplay panel 1061 are two independent components to implement the input and output functions of the terminal, in some embodiments, thetouch panel 1071 and thedisplay panel 1061 may be integrated to implement the input and output functions of the terminal, and is not limited herein.
Theinterface unit 108 is an interface for connecting an external device to the terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. Theinterface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal 100 or may be used to transmit data between the terminal 100 and the external device.
Thememory 109 may be used to store software programs as well as various data. Thememory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, thememory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
Theprocessor 110 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in thememory 109 and calling data stored in thememory 109, thereby performing overall monitoring of the terminal.Processor 110 may include one or more processing units; preferably, theprocessor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into theprocessor 110.
The terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to theprocessor 110 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system.
In addition, the terminal 100 includes some functional modules that are not shown, and thus, the detailed description thereof is omitted.
Preferably, an embodiment of the present invention further provides a terminal, which includes aprocessor 110, amemory 109, and a computer program stored in thememory 109 and capable of running on theprocessor 110, where the computer program is executed by theprocessor 110 to implement the processes of the foregoing method embodiments, and can achieve the same technical effects, and details are not repeated here to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the processes of the method embodiments, and can achieve the same technical effects, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (6)

1. A method of protecting privacy, comprising:
under the condition that the terminal is in a screen locking state, the terminal receives input of target password information;
if the target password information accords with preset password information and the target application program accords with the preset application program, the terminal unlocks a screen and displays a target interface, wherein the target interface is determined by the processing rule corresponding to the preset application program, and different preset application programs correspond to different processing rules;
if the target password information accords with the preset password information and the target application program does not accord with the preset application program, the terminal unlocks the screen and displays an interface to be protected;
if the target password information conforms to preset unlocking password information and does not conform to preset additional password information, and the target application program conforms to a preset application program, the terminal unlocks the screen and displays the interface to be protected;
the interface to be protected is an interface in the target application program which is displayed last before the terminal locks a screen; the preset password information comprises preset unlocking password information and preset additional password information, the preset unlocking password information is used for indicating the terminal to unlock the screen, and the preset additional password information is used for indicating the terminal to display the target interface after unlocking the screen; the additional cryptographic information comprises any one of: the additional password information also comprises information indicating the initial position and the motion track of the operation of inputting the additional password information by the user.
2. The method of claim 1, wherein the target interface is a desktop of the terminal;
before the terminal unlocks the screen and displays the target interface, the method further comprises the following steps:
and the terminal closes the target application program, or the terminal switches the target application program to a background to run.
3. A terminal, comprising: the device comprises a receiving module and a display module;
the receiving module is used for receiving the input of the target password information under the condition that the terminal is in a screen locking state;
the display module is used for unlocking a screen and displaying a target interface if the target password information received by the receiving module conforms to preset password information and a target application program conforms to a preset application program, wherein the target interface is determined by the processing rule corresponding to the preset application program, and different preset application programs correspond to different processing rules;
the display module is further configured to, after the receiving module receives the input of the target password information, unlock the screen and display an interface to be protected if the target password information conforms to the preset password information and the target application program does not conform to the preset application program;
the display module is further used for unlocking a screen and displaying the interface to be protected by the terminal after the receiving module receives the input of the password information and if the target password information conforms to the preset password information and does not conform to the preset additional password information and the target application program conforms to the preset application program;
the interface to be protected is an interface in the target application program displayed last before the terminal locks the screen, and the preset password information comprises preset unlocking password information and preset additional password information; the preset unlocking password information is used for indicating the terminal unlocking screen, and the preset additional password information is used for indicating the terminal to display the target interface after the terminal unlocks the screen; the additional cryptographic information comprises any one of: the additional password information also comprises information indicating the initial position and the motion track of the operation of inputting the additional password information by the user.
4. The terminal of claim 3, wherein the target interface is a desktop of the terminal;
the terminal further comprises: a processing module;
and the processing module is used for closing the target application program or switching the target application program to a background for running before the display module unlocks the screen and displays a target interface.
5. A terminal comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method of protecting privacy of any one of claims 1 or 2.
6. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of protecting privacy of any one of claims 1 or 2.
CN201810269038.7A2018-03-292018-03-29 A method and terminal for protecting privacyActiveCN108595946B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810269038.7ACN108595946B (en)2018-03-292018-03-29 A method and terminal for protecting privacy

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810269038.7ACN108595946B (en)2018-03-292018-03-29 A method and terminal for protecting privacy

Publications (2)

Publication NumberPublication Date
CN108595946A CN108595946A (en)2018-09-28
CN108595946Btrue CN108595946B (en)2021-07-06

Family

ID=63624935

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810269038.7AActiveCN108595946B (en)2018-03-292018-03-29 A method and terminal for protecting privacy

Country Status (1)

CountryLink
CN (1)CN108595946B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109828732B (en)*2018-12-262022-07-01维沃移动通信有限公司 A display control method and terminal device
CN110781513B (en)*2019-09-172024-05-03上海掌门科技有限公司 Information display method and device
CN112989292A (en)*2019-12-172021-06-18中移(成都)信息通信科技有限公司Interface display method, device and medium
CN111857464A (en)*2020-06-302020-10-30维沃移动通信有限公司 Information display method, device, electronic device and readable storage medium
CN113515254A (en)*2021-07-292021-10-19上海传英信息技术有限公司Interface display method, terminal and storage medium
CN115022446B (en)*2021-10-092023-06-13荣耀终端有限公司User interface management method and terminal equipment
CN114218318B (en)*2022-02-212022-05-17国网山东省电力公司乳山市供电公司 A data processing system and method for electric power big data

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104021350A (en)*2014-05-132014-09-03小米科技有限责任公司Privacy-information hiding method and device
CN106529339A (en)*2016-11-302017-03-22广东欧珀移动通信有限公司 Picture display method, device and terminal
CN106687969A (en)*2015-10-082017-05-17华为技术有限公司 A method and terminal equipment for protecting private information
CN107563168A (en)*2017-09-052018-01-09广东欧珀移动通信有限公司 Unlocking method and device for mobile terminal and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104021350A (en)*2014-05-132014-09-03小米科技有限责任公司Privacy-information hiding method and device
CN106687969A (en)*2015-10-082017-05-17华为技术有限公司 A method and terminal equipment for protecting private information
CN106529339A (en)*2016-11-302017-03-22广东欧珀移动通信有限公司 Picture display method, device and terminal
CN107563168A (en)*2017-09-052018-01-09广东欧珀移动通信有限公司 Unlocking method and device for mobile terminal and mobile terminal

Also Published As

Publication numberPublication date
CN108595946A (en)2018-09-28

Similar Documents

PublicationPublication DateTitle
CN108595946B (en) A method and terminal for protecting privacy
CN109542282B (en)Interface display method and terminal equipment
CN110062105B (en)Interface display method and terminal equipment
CN110908557B (en) Information display method and terminal device
CN109241775B (en)Privacy protection method and terminal
CN109800602B (en)Privacy protection method, mobile terminal and computer readable storage medium
CN110851031A (en)Display control method and electronic equipment
CN111163260B (en)Camera starting method and electronic equipment
CN110007822B (en) Interface display method and terminal device
CN110012151B (en) Information display method and terminal device
CN108710806B (en) Terminal unlocking method and mobile terminal
CN110232266B (en)Screen unlocking method and terminal equipment
CN109032406A (en)A kind of control method and mobile terminal
CN109992941B (en)Authority management method and terminal equipment
CN108958582A (en)A kind of application program launching method and terminal
CN111125680A (en) Permission setting method and terminal device
CN111049991B (en)Content sharing method and electronic equipment
CN113987602B (en)Image data processing method and electronic equipment
CN110232275B (en) A control method and terminal device
CN109547330B (en)Information sharing method and device
CN111159687A (en) Account information processing method, electronic device and server
CN110908562A (en)Icon display method and device, electronic equipment and medium
CN111381753B (en)Multimedia file playing method and electronic equipment
CN110795746B (en)Information processing method and electronic equipment
CN111124537B (en)Application starting method and electronic equipment

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp