[go: up one dir, main page]

CN104219053B - Method for information display, information concealing method and device - Google Patents

Method for information display, information concealing method and device Download PDF

Info

Publication number
CN104219053B
CN104219053B CN201410429501.1A CN201410429501A CN104219053B CN 104219053 B CN104219053 B CN 104219053B CN 201410429501 A CN201410429501 A CN 201410429501A CN 104219053 B CN104219053 B CN 104219053B
Authority
CN
China
Prior art keywords
information content
verification
layer
verification operation
authentication mechanism
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410429501.1A
Other languages
Chinese (zh)
Other versions
CN104219053A (en
Inventor
鲍协浩
戚冬杰
赵振海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410429501.1A priority Critical patent/CN104219053B/en
Publication of CN104219053A publication Critical patent/CN104219053A/en
Application granted granted Critical
Publication of CN104219053B publication Critical patent/CN104219053B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

本公开揭示了一种信息显示方法、信息隐藏方法和装置,属于信息安全技术领域。所述信息显示方法包括:接收用于对n层验证机制中前n‑1层验证机制中的任一层进行验证的第一类验证操作,n≥2;在所述第一类验证操作验证通过时,显示伪装信息内容,所述伪装信息内容用于对原始信息内容进行伪装;接收用于对第n层验证机制进行验证的第二类验证操作;在所述第二类验证操作验证通过时,显示所述原始信息内容。解决了相关技术中信息的安全性较差的问题;达到了可以通过伪装信息内容对原始信息内容进行伪装,进而使得他人很难获知原始信息内容,提高信息安全性的效果。

The disclosure discloses an information display method, an information hiding method and a device, and belongs to the technical field of information security. The information display method includes: receiving a first type of verification operation for verifying any layer in the first n-1 layer of verification mechanisms in the n-layer verification mechanism, n≥2; verifying in the first type of verification operation When passing, display the camouflage information content, the camouflage information content is used to camouflage the original information content; receive the second type of verification operation for verifying the nth layer verification mechanism; pass the verification in the second type of verification operation , display the original information content. The problem of poor information security in related technologies is solved; the original information content can be disguised by disguising the information content, thereby making it difficult for others to know the original information content and improving the information security.

Description

信息显示方法、信息隐藏方法和装置Information display method, information hiding method and device

技术领域technical field

本公开涉及信息安全技术领域,特别涉及一种信息显示方法、信息隐藏方法和装置。The present disclosure relates to the technical field of information security, in particular to an information display method, an information hiding method and a device.

背景技术Background technique

短信隐藏是一种在短信应用中增加验证机制,防止他人随意查看全部短信的功能。Text message hiding is a function that adds a verification mechanism to the text message application to prevent others from viewing all text messages at will.

相关技术中通常在短信应用中设置一私密入口,用户需要在该私密入口中输入正确的验证密码后,才能看到被隐藏的短信。但是在用户被他人胁迫的场景下,用户输入正确的验证密码后,他人也能读取到用户的隐藏短信。In related technologies, a private entry is usually set in the SMS application, and the user needs to enter a correct verification password in the private entry before he can see the hidden text message. However, in the scenario where the user is coerced by others, after the user enters the correct verification password, others can also read the user's hidden text message.

公开内容public content

为了解决相关技术中信息安全性较差的问题,本公开提供了一种信息显示方法、信息隐藏方法和装置。所述技术方案如下:In order to solve the problem of poor information security in related technologies, the present disclosure provides an information display method, an information hiding method and a device. Described technical scheme is as follows:

根据本公开实施例的第一方面,提供一种信息显示方法,包括:According to a first aspect of an embodiment of the present disclosure, an information display method is provided, including:

接收用于对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作,n≥2;Receive the first type of verification operation for verifying any layer in the first n-1 layer verification mechanisms in the n-layer verification mechanism, n≥2;

在所述第一类验证操作验证通过时,显示伪装信息内容,所述伪装信息内容用于对原始信息内容进行伪装;When the verification of the first type of verification operation is successful, display the camouflaged information content, and the camouflaged information content is used to camouflage the original information content;

接收用于对第n层验证机制进行验证的第二类验证操作;receiving a second type of verification operation for verifying the n-th layer verification mechanism;

在所述第二类验证操作验证通过时,显示所述原始信息内容。When the verification of the second type of verification operation is successful, the original information content is displayed.

可选的,所述接收用于对第n层验证机制进行验证的第二类验证操作,包括:Optionally, receiving the second type of verification operation for verifying the n-th layer verification mechanism includes:

接收用于对第n层验证机制进行验证的隐性验证操作,将所述隐性验证操作作为所述第二类验证操作,所述隐性验证操作的验证入口是非显性提示的验证入口。Receive an implicit verification operation for verifying the n-th layer verification mechanism, use the implicit verification operation as the second type of verification operation, and the verification entry of the implicit verification operation is a verification entry that is not explicitly prompted.

可选的,所述接收用于对第n层验证机制进行验证的隐性验证操作,包括:Optionally, receiving an implicit verification operation for verifying the n-th layer verification mechanism includes:

通过传感器接收预设摇动操作,将所述预设摇动操作作为所述隐性验证操作;receiving a preset shaking operation through a sensor, and using the preset shaking operation as the implicit verification operation;

和/或,and / or,

通过触摸屏接收预设手势操作,将所述预设手势操作作为所述隐性验证操作;receiving a preset gesture operation through the touch screen, and using the preset gesture operation as the implicit verification operation;

和/或,and / or,

通过麦克风接收预设语音信息,将所述预设语音信息作为所述隐性验证操作;receiving preset voice information through a microphone, and using the preset voice information as the implicit verification operation;

和/或,and / or,

通过物理按键或虚拟按键接收预设规律的按键操作,将所述预设规律的按键操作作为所述隐性验证操作;receiving preset regular key operations through physical keys or virtual keys, and using the preset regular key operations as the implicit verification operation;

和/或,and / or,

通过所述触摸屏接收预设敲击操作,将所述预设敲击操作作为所述隐性验证操作。A preset tapping operation is received through the touch screen, and the preset tapping operation is used as the implicit verification operation.

可选的,所述在所述第一类验证操作验证通过时,显示伪装信息内容,包括:Optionally, when the verification of the first type of verification operation is passed, displaying the content of the masquerade information includes:

在对前n-1层验证机制中对应于第i层验证机制的所述第一类验证操作验证通过时,显示与第i层验证机制对应的伪装信息内容,1≤i≤n-1。When the verification of the first type of verification operation corresponding to the i-th layer verification mechanism in the first n-1 layer verification mechanisms is passed, display the content of the camouflaged information corresponding to the i-th layer verification mechanism, 1≤i≤n-1.

可选的,所述方法还包括:Optionally, the method also includes:

获取所述原始信息内容的显示时长;检测获取到的所述显示时长是否超过预定时长;如果所述显示时长超过所述预定时长,则重新启用所述n层验证机制;Obtain the display duration of the original information content; detect whether the obtained display duration exceeds a predetermined duration; if the display duration exceeds the predetermined duration, re-enable the n-layer verification mechanism;

和/或,and / or,

若在显示所述原始信息内容时,接收到中断显示的触发信号,则重新启用所述n层验证机制。If a trigger signal for interrupting the display is received when the original information content is displayed, the n-layer verification mechanism is re-enabled.

根据本公开实施例的第二方面,提供一种信息隐藏方法,包括:According to a second aspect of an embodiment of the present disclosure, an information hiding method is provided, including:

对原始信息内容设置n层验证机制,n≥2;Set up an n-layer verification mechanism for the original information content, n≥2;

对所述n层验证机制中的前n-1层验证机制设置伪装信息内容,所述伪装信息用于在所述前n-1层验证机制验证通过时进行显示。Set camouflage information content for the first n-1 layer verification mechanisms in the n-layer verification mechanisms, and the camouflage information is used to display when the first n-1 layer verification mechanisms pass the verification.

可选的,所述对原始信息内容设置n层验证机制,包括:Optionally, the setting of an n-layer verification mechanism for the original information content includes:

设置通过第一类验证操作进行验证的前n-1层验证机制;Set up the first n-1 layer verification mechanism for verification through the first type of verification operation;

设置通过第二类验证操作进行验证的第n层验证机制。Sets the nth layer authentication mechanism for authentication via the second type of authentication operation.

可选的,所述设置通过第二类验证操作进行验证的第n层验证机制,包括:Optionally, the setting of the n-th layer verification mechanism for verification through the second type of verification operation includes:

设置通过隐性验证操作进行验证的第n层验证机制,所述隐性验证操作作为所述第二类验证操作,所述隐性验证操作的验证入口是非显性提示的验证入口。An n-th layer verification mechanism for verification through an implicit verification operation is set, the implicit verification operation is the second type of verification operation, and the verification entry of the implicit verification operation is a non-explicitly prompted verification entry.

可选的,所述隐性验证操作包括:预设摇动操作、预设手势操作、预设语音信息、预设规律的按键操作以及预设敲击操作中的至少一种。Optionally, the implicit verification operation includes: at least one of a preset shaking operation, a preset gesture operation, a preset voice message, a preset regular key operation, and a preset tapping operation.

可选的,所述对所述n层验证机制中的前n-1层验证机制设置伪装信息内容,包括:Optionally, setting the camouflage information content for the first n-1 layer verification mechanism in the n-layer verification mechanism includes:

分别设置对应于所述前n-1层验证机制中的第i层验证机制的伪装信息内容,1≤i≤n-1。Respectively set the camouflage information content corresponding to the i-th layer verification mechanism in the first n-1 layer verification mechanisms, 1≤i≤n-1.

可选的,所述分别设置对应于所述前n-1层验证机制中的第i层验证机制的伪装信息内容,包括:Optionally, the respectively setting the camouflage information content corresponding to the i-th layer verification mechanism in the first n-1 layer verification mechanisms includes:

获取系统默认的信息内容,将获取到的所述信息内容作为对应于所述第i层验证机制的伪装信息内容;Obtain the default information content of the system, and use the acquired information content as the camouflaged information content corresponding to the verification mechanism of the i-th layer;

和/或,and / or,

获取所述原始信息内容中的敏感内容,将所述原始信息内容中除所述敏感内容之外的内容作为对应于所述第i层验证机制的伪装信息内容;Obtain the sensitive content in the original information content, and use the content in the original information content other than the sensitive content as the camouflaged information content corresponding to the i-th layer verification mechanism;

和/或,and / or,

接收用户为所述原始信息内容设置的信息内容,将接收到的所述信息内容作为对应于所述第i层验证机制的伪装信息内容。The information content set by the user for the original information content is received, and the received information content is used as the fake information content corresponding to the i-th layer verification mechanism.

根据本公开实施例的第三方面,提供一种信息显示装置,包括:According to a third aspect of the embodiments of the present disclosure, there is provided an information display device, including:

第一操作接收模块,被配置为接收用于对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作,n≥2;The first operation receiving module is configured to receive a first type of verification operation for verifying any layer in the first n-1 layer verification mechanisms in the n-layer verification mechanism, n≥2;

伪装内容显示模块,被配置为在对所述第一操作接收模块接收到的所述第一类验证操作验证通过时,显示伪装信息内容,所述伪装信息内容用于对原始信息内容进行伪装;The camouflage content display module is configured to display the camouflage information content when the verification of the first type of verification operation received by the first operation receiving module is passed, and the camouflage information content is used to camouflage the original information content;

第二操作接收模块,被配置为接收用于对第n层验证机制进行验证的第二类验证操作;The second operation receiving module is configured to receive a second type of verification operation for verifying the n-th layer verification mechanism;

原始内容显示模块,被配置为在对所述第二操作接收模块接收到的所述第二类验证操作验证通过时,显示所述原始信息内容。The original content display module is configured to display the original information content when the verification of the second type of verification operation received by the second operation receiving module is passed.

可选的,所述第二操作接收模块,被配置为接收用于对第n层验证机制进行验证的隐性验证操作,将所述隐性验证操作作为所述第二类验证操作,所述隐性验证操作的验证入口是非显性提示的验证入口。Optionally, the second operation receiving module is configured to receive an implicit verification operation for verifying the nth layer verification mechanism, and use the implicit verification operation as the second type of verification operation, the The verification entry of implicit verification operation is the verification entry of non-explicit prompt.

可选的,所述第二操作接收模块,被配置为:Optionally, the second operation receiving module is configured to:

通过传感器接收预设摇动操作,将所述预设摇动操作作为所述隐性验证操作;receiving a preset shaking operation through a sensor, and using the preset shaking operation as the implicit verification operation;

和/或,and / or,

通过触摸屏接收预设手势操作,将所述预设手势操作作为所述隐性验证操作;receiving a preset gesture operation through the touch screen, and using the preset gesture operation as the implicit verification operation;

和/或,and / or,

通过麦克风接收预设语音信息,将所述预设语音信息作为所述隐性验证操作;receiving preset voice information through a microphone, and using the preset voice information as the implicit verification operation;

和/或,and / or,

通过物理按键或虚拟按键接收预设规律的按键操作,将所述预设规律的按键操作作为所述隐性验证操作;receiving preset regular key operations through physical keys or virtual keys, and using the preset regular key operations as the implicit verification operation;

和/或,and / or,

通过所述触摸屏接收预设敲击操作,将所述预设敲击操作作为所述隐性验证操作。A preset tapping operation is received through the touch screen, and the preset tapping operation is used as the implicit verification operation.

可选的,所述伪装内容显示模块,被配置为在对前n-1层验证机制中对应于第i层验证机制的所述第一类验证操作验证通过时,显示与第i层验证机制对应的伪装信息内容,1≤i≤n-1。Optionally, the camouflaged content display module is configured to display the verification mechanism corresponding to the i-th layer verification mechanism when the verification of the first type of verification operation corresponding to the i-th layer verification mechanism in the previous n-1 layer verification mechanisms is passed. Corresponding camouflage information content, 1≤i≤n-1.

可选的,所述装置还包括:Optionally, the device also includes:

第一触发模块,被配置为获取所述原始信息内容的显示时长;检测获取到的所述显示时长是否超过预定时长;如果所述显示时长超过所述预定时长,则重新启用所述n层验证机制;The first trigger module is configured to obtain the display duration of the original information content; detect whether the obtained display duration exceeds a predetermined duration; if the display duration exceeds the predetermined duration, re-enable the n-level verification mechanism;

和/或,and / or,

第二触发模块,被配置为若在显示所述原始信息内容时,接收到中断显示的触发信号,则重新启用所述n层验证机制。The second trigger module is configured to re-enable the n-layer verification mechanism if a trigger signal for interrupting the display is received when the original information content is displayed.

根据本公开实施例的第四方面,提供一种信息隐藏装置,包括:According to a fourth aspect of an embodiment of the present disclosure, an information hiding device is provided, including:

验证机制设置模块,被配置为对原始信息内容设置n层验证机制,n≥2;The verification mechanism setting module is configured to set an n-layer verification mechanism for the original information content, n≥2;

伪装内容设置模块,被配置为对所述验证机制设置模块设置的所述n层验证机制中的前n-1层验证机制设置伪装信息内容,所述伪装信息用于在所述前n-1层验证机制验证通过时进行显示。The camouflage content setting module is configured to set camouflage information content for the first n-1 layer verification mechanisms in the n-layer verification mechanisms set by the verification mechanism setting module, and the camouflage information is used in the first n-1 It will be displayed when the verification of the layer verification mechanism is passed.

可选的,所述验证机制设置模块,包括:Optionally, the verification mechanism setting module includes:

第一设置子模块,被配置为设置通过第一类验证操作进行验证的前n-1层验证机制;The first setting sub-module is configured to set the verification mechanism of the first n-1 layers verified through the first type of verification operation;

第二设置子模块,被配置为设置通过第二类验证操作进行验证的第n层验证机制。The second setting submodule is configured to set the nth layer verification mechanism for verification through the second type of verification operation.

可选的,所述第二设置子模块,被配置为设置通过隐性验证操作进行验证的第n层验证机制,所述隐性验证操作作为所述第二类验证操作,所述隐性验证操作的验证入口是非显性提示的验证入口。Optionally, the second setting submodule is configured to set an n-th layer verification mechanism for verification through an implicit verification operation, the implicit verification operation is the second type of verification operation, and the implicit verification The verification entry of the operation is the verification entry of non-explicit prompt.

可选的,所述隐性验证操作包括:预设摇动操作、预设手势操作、预设语音信息、预设规律的按键操作以及预设敲击操作中的至少一种。Optionally, the implicit verification operation includes: at least one of a preset shaking operation, a preset gesture operation, a preset voice message, a preset regular key operation, and a preset tapping operation.

可选的,所述伪装内容设置模块,被配置为分别设置对应于所述前n-1层验证机制中的第i层验证机制的伪装信息内容,1≤i≤n-1。Optionally, the masquerading content setting module is configured to respectively set the masquerading information content corresponding to the i-th verification mechanism in the first n-1 verification mechanisms, 1≤i≤n-1.

可选的,所述伪装内容设置模块,包括:Optionally, the camouflaged content setting module includes:

第三设置子模块,被配置为获取系统默认的信息内容,将获取到的所述信息内容作为对应于所述第i层验证机制的伪装信息内容;The third setting submodule is configured to obtain the default information content of the system, and use the obtained information content as the camouflaged information content corresponding to the verification mechanism of the i-th layer;

和/或,and / or,

第四设置子模块,被配置为获取所述原始信息内容中的敏感内容,将所述原始信息内容中除所述敏感内容之外的内容作为对应于所述第i层验证机制的伪装信息内容;The fourth setting sub-module is configured to acquire sensitive content in the original information content, and use content in the original information content other than the sensitive content as the fake information content corresponding to the i-th layer verification mechanism ;

和/或,and / or,

第五设置子模块,被配置为接收用户为所述原始信息内容设置的信息内容,将接收到的所述信息内容作为对应于所述第i层验证机制的伪装信息内容。The fifth setting submodule is configured to receive the information content set by the user for the original information content, and use the received information content as the fake information content corresponding to the i-th layer verification mechanism.

根据本公开实施例的第五方面,提供一种信息显示装置,包括:According to a fifth aspect of the embodiments of the present disclosure, there is provided an information display device, including:

处理器;processor;

用于存储所述处理器可执行指令的存储器;memory for storing said processor-executable instructions;

其中,所述处理器被配置为:Wherein, the processor is configured as:

接收用于对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作,n≥2;Receive the first type of verification operation for verifying any layer in the first n-1 layer verification mechanisms in the n-layer verification mechanism, n≥2;

在所述第一类验证操作验证通过时,显示伪装信息内容,所述伪装信息内容用于对原始信息内容进行伪装;When the verification of the first type of verification operation is successful, display the camouflaged information content, and the camouflaged information content is used to camouflage the original information content;

接收用于对第n层验证机制进行验证的第二类验证操作;receiving a second type of verification operation for verifying the n-th layer verification mechanism;

在所述第二类验证操作验证通过时,显示所述原始信息内容。When the verification of the second type of verification operation is successful, the original information content is displayed.

根据本公开实施例的第六方面,提供一种信息隐藏装置,包括:According to a sixth aspect of the embodiments of the present disclosure, an information hiding device is provided, including:

处理器;processor;

用于存储所述处理器可执行指令的存储器;memory for storing said processor-executable instructions;

其中,所述处理器被配置为:Wherein, the processor is configured as:

对原始信息内容设置n层验证机制,n≥2;Set up an n-layer verification mechanism for the original information content, n≥2;

对所述n层验证机制中的前n-1层验证机制设置伪装信息内容,所述伪装信息用于在所述前n-1层验证机制验证通过时进行显示。Set camouflage information content for the first n-1 layer verification mechanisms in the n-layer verification mechanisms, and the camouflage information is used to display when the first n-1 layer verification mechanisms pass the verification.

本公开的实施例提供的技术方案可以包括以下有益效果:The technical solutions provided by the embodiments of the present disclosure may include the following beneficial effects:

通过在接收到对前n-1层验证机制中的任一层验证机制进行验证的第一类验证操作,且对第一类验证操作验证通过时,只显示伪装信息内容;而在接收到对第n层验证机制进行验证的第二类验证操作,且对第二类验证操作验证通过时,才会显示原始信息内容;解决了相关技术中信息的安全性较差的问题;达到了可以通过伪装信息内容对原始信息内容进行伪装,进而使得他人很难获知原始信息内容,提高信息安全性的效果。After receiving the first type of verification operation that verifies any layer of the verification mechanism in the first n-1 layers, and when the verification of the first type of verification operation is passed, only the content of the camouflaged information is displayed; The second type of verification operation verified by the nth layer verification mechanism, and the original information content will be displayed only when the verification of the second type of verification operation is passed; it solves the problem of poor information security in related technologies; it can pass Disguised information content camouflages the original information content, thereby making it difficult for others to obtain the original information content and improving the effect of information security.

应当理解的是,以上的一般描述和后文的细节描述仅是示例性的,并不能限制本公开。It is to be understood that both the foregoing general description and the following detailed description are exemplary only and are not restrictive of the present disclosure.

附图说明Description of drawings

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并于说明书一起用于解释本公开的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description serve to explain the principles of the disclosure.

图1是根据一示例性实施例示出的一种信息显示方法的流程图。Fig. 1 is a flowchart of an information display method according to an exemplary embodiment.

图2是根据另一示例性实施例示出的一种信息隐藏方法的流程图。Fig. 2 is a flowchart of an information hiding method according to another exemplary embodiment.

图3是根据再一示例性实施例示出的一种信息显示方法的流程图。Fig. 3 is a flowchart of an information display method according to yet another exemplary embodiment.

图4是根据再一示例性实施例示出的一种信息显示方法的流程图。Fig. 4 is a flowchart of an information display method according to yet another exemplary embodiment.

图5是根据一示例性实施例示出的一种信息显示装置的框图。Fig. 5 is a block diagram of an information display device according to an exemplary embodiment.

图6是根据另一示例性实施例示出的一种信息显示装置的框图。Fig. 6 is a block diagram of an information display device according to another exemplary embodiment.

图7是根据一示例性实施例示出的一种信息隐藏装置的框图。Fig. 7 is a block diagram of an information hiding device according to an exemplary embodiment.

图8是根据另一示例性实施例示出的一种信息隐藏装置的框图。Fig. 8 is a block diagram of an information hiding device according to another exemplary embodiment.

图9是根据一示例性实施例示出的一种用于信息显示和信息隐藏的装置的框图。Fig. 9 is a block diagram of an apparatus for information display and information hiding according to an exemplary embodiment.

具体实施方式detailed description

这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

图1是根据一示例性实施例示出的一种信息显示方法的流程图,如图1所示,该信息显示方法可以包括以下步骤。Fig. 1 is a flowchart of an information display method according to an exemplary embodiment. As shown in Fig. 1, the information display method may include the following steps.

在步骤101中,接收用于对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作,n≥2。In step 101, a first type of verification operation for verifying any layer in the first n-1 layer verification mechanisms in the n-layer verification mechanism is received, n≥2.

在步骤102中,在第一类验证操作验证通过时,显示伪装信息内容,伪装信息内容用于对原始信息内容进行伪装。In step 102, when the verification of the first type of verification operation is successful, display the camouflaged information content, where the camouflaged information content is used to camouflage the original information content.

在步骤103中,接收用于对第n层验证机制进行验证的第二类验证操作。In step 103, a second type of verification operation for verifying the nth layer verification mechanism is received.

在步骤104中,在第二类验证操作验证通过时,显示原始信息内容。In step 104, when the verification of the second type of verification operation is passed, the original information content is displayed.

综上所述,本公开实施例中提供的信息显示方法,通过在接收到对前n-1层验证机制中的任一层验证机制进行验证的第一类验证操作,且对第一类验证操作验证通过时,只显示伪装信息内容;而在接收到对第n层验证机制进行验证的第二类验证操作,且对第二类验证操作验证通过时,才会显示原始信息内容;解决了相关技术中信息的安全性较差的问题;达到了可以通过伪装信息内容对原始信息内容进行伪装,进而使得他人很难获知原始信息内容,提高信息安全性的效果。To sum up, the information display method provided in the embodiment of the present disclosure, after receiving the first type of verification operation for verifying any one of the previous n-1 layer verification mechanisms, and performing the first type of verification When the operation verification is passed, only the content of the camouflaged information will be displayed; and when the second type of verification operation for verifying the verification mechanism of the nth layer is received, and the verification of the second type of verification operation is passed, the original information content will be displayed; solved The problem of poor information security in related technologies; the original information content can be disguised by disguising the information content, which makes it difficult for others to know the original information content and improves the information security.

图2是根据一示例性实施例示出的一种信息隐藏方法的流程图,如图2所示,该信息隐藏方法可以包括以下步骤。Fig. 2 is a flowchart of an information hiding method according to an exemplary embodiment. As shown in Fig. 2, the information hiding method may include the following steps.

在步骤201中,对原始信息内容设置n层验证机制,n≥2。In step 201, an n-layer verification mechanism is set for the original information content, where n≥2.

在步骤202中,对n层验证机制中的前n-1层验证机制设置伪装信息内容,伪装信息用于在前n-1层验证机制验证通过时进行显示。In step 202, the content of the camouflage information is set for the verification mechanism of the first n-1 layers in the verification mechanism of the n-layers, and the camouflage information is used for displaying when the verification mechanism of the first n-1 layers passes the verification.

综上所述,本公开实施例中提供的信息隐藏方法,通过对原始信息内容设置n层验证机制,并对前n-1层验证机制设置伪装信息内容;使得即便前n-1层验证机制所对应的第一类验证操作被其它用户获知,其它用户也只能获知对原始信息内容进行伪装的伪装信息内容,并不能获知真实的原始信息内容;解决了相关技术中信息安全性较差的问题;达到了可以提高信息安全性的效果。To sum up, the information hiding method provided in the embodiment of the present disclosure sets n-layer verification mechanism for the original information content, and sets camouflage information content for the first n-1 layer verification mechanism; so that even the first n-1 layer verification mechanism The corresponding first type of verification operation is known by other users, and other users can only know the camouflaged information content that camouflages the original information content, but cannot know the real original information content; it solves the problem of poor information security in related technologies problem; achieved an effect that can improve information security.

图3是根据一示例性实施例示出的一种信息显示方法的流程图,如图3所示,该信息显示方法可以包括以下步骤。Fig. 3 is a flowchart of an information display method according to an exemplary embodiment. As shown in Fig. 3, the information display method may include the following steps.

在步骤301中,对原始信息内容设置n层验证机制,n≥2。In step 301, an n-layer verification mechanism is set for the original information content, where n≥2.

在步骤302中,对n层验证机制中的前n-1层验证机制设置伪装信息内容,伪装信息用于在前n-1层验证机制验证通过时进行显示。In step 302, the content of the camouflage information is set for the verification mechanism of the first n-1 layers in the verification mechanism of the n-layers, and the camouflage information is used for displaying when the verification mechanism of the first n-1 layers passes the verification.

在步骤303中,接收用于对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作,n≥2。In step 303, a first type of verification operation for verifying any layer in the first n-1 layer verification mechanisms in the n-layer verification mechanism is received, n≥2.

在步骤304中,在第一类验证操作验证通过时,显示伪装信息内容,伪装信息内容用于对原始信息内容进行伪装。In step 304, when the verification of the first type of verification operation is successful, the camouflaged information content is displayed, and the camouflaged information content is used to camouflage the original information content.

在步骤305中,接收用于对第n层验证机制进行验证的第二类验证操作。In step 305, a second type of verification operation for verifying the nth layer verification mechanism is received.

在步骤306中,在第二类验证操作验证通过时,显示原始信息内容。In step 306, when the verification of the second type of verification operation is passed, the original information content is displayed.

综上所述,本公开实施例中提供的信息显示方法,通过在接收到对前n-1层验证机制中的任一层验证机制进行验证的第一类验证操作,且对第一类验证操作验证通过时,只显示伪装信息内容;而在接收到对第n层验证机制进行验证的第二类验证操作,且对第二类验证操作验证通过时,才会显示原始信息内容;解决了相关技术中信息的安全性较差的问题;达到了可以通过伪装信息内容对原始信息内容进行伪装,进而使得他人很难获知原始信息内容,提高信息安全性的效果。To sum up, the information display method provided in the embodiments of the present disclosure, after receiving the first type of verification operation for verifying any one of the previous n-1 layer verification mechanisms, and performing the first type of verification When the operation verification is passed, only the content of the fake information will be displayed; and when the second type of verification operation for verifying the nth layer verification mechanism is received, and the verification of the second type of verification operation is passed, the original information content will be displayed; solved The problem of poor information security in related technologies; the original information content can be disguised by disguising the information content, which makes it difficult for others to know the original information content and improves the information security.

图4是根据一示例性实施例示出的一种信息显示方法的流程图,如图4所示,该信息显示方法可以包括以下步骤。Fig. 4 is a flowchart of an information display method according to an exemplary embodiment. As shown in Fig. 4, the information display method may include the following steps.

在步骤401中,设置通过第一类验证操作进行验证的前n-1层验证机制。In step 401, the first n-1 layer verification mechanisms for verification through the first type of verification operations are set.

当用户想要对终端中的某些信息进行隐藏,进而避免他人随意查看时,用户可以在终端中执行一系列操作。终端接收到用户的一系列操作后为原始信息内容设置通过第一类验证操作进行验证的前n-1层验证机制。其中,n≥2,原始信息内容可以包括短信、即时通信信息、记事本信息、日记、邮件、图片或者视频中的至少一种;第一类验证操作的验证入口通常为显性提示的验证入口。When the user wants to hide certain information in the terminal to prevent others from viewing it at will, the user can perform a series of operations in the terminal. After receiving a series of operations from the user, the terminal sets the first n-1 layer verification mechanism for the original information content through the verification operation of the first type. Among them, n≥2, the original information content can include at least one of SMS, instant messaging, notepad information, diary, email, picture or video; the verification entry of the first type of verification operation is usually the verification entry of explicit prompt .

比如,以n为3为例,终端可以设置通过解密密码进行验证的第一层验证机制,并且设置通过预定手势进行验证的第2层验证机制。For example, taking n as 3 as an example, the terminal may set a first-layer verification mechanism for verification by decrypting a password, and a second-layer verification mechanism for verification by a predetermined gesture.

在实际实现时,终端可以依序设置前n-1层验证机制中的每一层验证机制所对应的第一类验证操作,也可以同时设置前n-1层验证机制中的每一层验证机制所对应的第一类验证操作,本实施例对此并不做限定。并且,前n-1层验证机制中的每一层验证机制所对应的第一类验证操作可以相同也可以不同,本实施例对此也不做限定。In actual implementation, the terminal can sequentially set the first type of verification operation corresponding to each layer of the verification mechanism in the first n-1 layers of verification mechanism, or set each layer of verification in the first n-1 layers of verification mechanism at the same time The first type of verification operation corresponding to the mechanism is not limited in this embodiment. Moreover, the first type of verification operations corresponding to each layer of verification mechanisms in the first n−1 layers of verification mechanisms may be the same or different, which is not limited in this embodiment.

在步骤402中,设置通过第二类验证操作进行验证的第n层验证机制。In step 402, the nth layer verification mechanism for verification through the second type of verification operation is set.

终端可以设置通过隐性验证操作进行验证的第n层验证机制,将隐性验证操作作为第二类验证操作,隐性验证操作的验证入口是非显性提示的验证入口。其中,隐性验证操作包括:预设摇动操作、预设手势操作、预设语音信息、预设规律的按键操作以及预设敲击操作中的至少一种。The terminal can set up an n-layer verification mechanism for verification through implicit verification operations, and use the implicit verification operation as the second type of verification operation, and the verification entry of the implicit verification operation is a verification entry that is not explicitly prompted. Wherein, the implicit verification operation includes: at least one of a preset shaking operation, a preset gesture operation, a preset voice message, a preset regular key operation, and a preset tapping operation.

比如,终端可以设置通过摇动终端三次的摇动操作进行验证的第3层验证机制。For example, the terminal may be configured with a layer 3 verification mechanism for verification by shaking the terminal three times.

需要说明的是,本步骤可以是在用户触发下执行的步骤,也可以是终端自动执行的步骤,本实施例对此并不做限定。It should be noted that this step may be executed upon triggering by the user, or may be executed automatically by the terminal, which is not limited in this embodiment.

在步骤403中,分别设置对应于前n-1层验证机制中的第i层验证机制的伪装信息内容。In step 403, the contents of masquerading information corresponding to the i-th layer verification mechanism in the previous n-1 layer verification mechanisms are respectively set.

为了避免他人对前n-1层验证机制所对应的第一类验证操作验证通过时,他人可以浏览原始信息内容,威胁原始信息内容的信息安全的问题,终端可以分别设置对应于前n-1层验证机制中的第i层验证机制的伪装信息内容,通过伪装信息内容对原始信息内容进行伪装。其中,伪装信息内容用于对原始信息内容进行伪装,1≤i≤n-1。In order to avoid the problem that others can browse the original information content and threaten the information security of the original information content when the first type of verification operation corresponding to the verification mechanism of the first n-1 layers is verified by others, the terminals can respectively set the corresponding first n-1 layers The camouflage information content of the i-th layer verification mechanism in the layer verification mechanism is to camouflage the original information content by camouflaging the information content. Wherein, the camouflage information content is used to camouflage the original information content, 1≤i≤n-1.

终端设置对应于第i层验证机制的伪装信息内容的设置方法可以包括如下方法中的至少一种:The terminal setting method for setting the camouflage information content corresponding to the i-th layer verification mechanism may include at least one of the following methods:

第一种:The first:

获取系统默认的信息内容,将获取到的信息内容作为对应于第i层验证机制的伪装信息内容;Obtain the default information content of the system, and use the obtained information content as the camouflaged information content corresponding to the verification mechanism of the i-th layer;

终端可以预设信息内容,当终端需要为第i层验证机制设置伪装信息内容时,终端获取系统预设的信息内容,将获取到的信息内容作为对应于第i层验证机制的伪装信息内容。The terminal can preset the information content. When the terminal needs to set the camouflage information content for the i-layer verification mechanism, the terminal obtains the system preset information content, and uses the obtained information content as the camouflage information content corresponding to the i-layer verification mechanism.

在实际实现时,终端可以为短信、记事本信息、日记、即时通信信息或者邮件之类的原始信息内容预设诸如问候语、祝福语、客套话之类的信息内容。比如,对于短信来说,终端可以预设‘祝您天天开心’、‘祝您和您的家人身体健康、万事如意’、‘早上好’、‘我现在在开会,有事请留言’或者‘我稍后与您联系’之类的信息内容。这样,当终端需要为短信设置伪装信息内容时,终端可以将上述预设的内容作为对应于第i层验证机制的伪装信息内容。In actual implementation, the terminal can preset information content such as greetings, blessings, and polite words for original information content such as short messages, notepad information, diaries, instant messaging information, or emails. For example, for text messages, the terminal can preset 'I wish you a happy day', 'I wish you and your family good health and all the best', 'Good morning', 'I am in a meeting now, please leave a message if you have anything' or 'I I will contact you later' and other information content. In this way, when the terminal needs to set the camouflage information content for the short message, the terminal can use the preset content as the camouflage information content corresponding to the i-th layer verification mechanism.

终端可以为图片之类的原始信息内容预设诸如明星海报、电影宣传海报、商品宣传单、动物图片或者风景图之类的图片内容。当终端需要为图片设置伪装信息内容时,终端可以将上述预设的内容设置为对应于第i层验证机制的伪装信息内容。The terminal may preset picture content such as star posters, movie promotional posters, commodity leaflets, animal pictures or landscape pictures for original information content such as pictures. When the terminal needs to set the camouflage information content for the picture, the terminal can set the preset content as the camouflage information content corresponding to the i-th layer verification mechanism.

终端可以为视频之类的原始信息内容预设诸如宣传片、MV或者明星访谈之类的信息内容。当终端需要为视频设置伪装信息内容时,终端可以将预设的上述内容设置为对应于第i层验证机制的伪装信息内容。The terminal may preset information content such as promotional videos, MVs, or celebrity interviews for original information content such as videos. When the terminal needs to set camouflage information content for the video, the terminal may set the preset content as the camouflage information content corresponding to the verification mechanism of the i-th layer.

第二种:The second type:

获取原始信息内容中的敏感内容,将原始信息内容中除敏感内容之外的内容作为对应于第i层验证机制的伪装信息内容;Obtain the sensitive content in the original information content, and use the content in the original information content other than the sensitive content as the camouflaged information content corresponding to the verification mechanism of the i-th layer;

当原始信息内容为短信、记事本信息、即时通信信息或者邮件时,终端可以提取其中的敏感信息,将除敏感信息之外的信息确定为对应于第i层验证机制的伪装信息内容。When the original information content is a short message, notepad information, instant messaging information or email, the terminal can extract the sensitive information, and determine the information except the sensitive information as the camouflaged information content corresponding to the i-th layer verification mechanism.

比如,当原始信息内容为包含银行卡号和密码的记事本信息时,终端可以提取记事本信息中的银行卡号和密码,将记事本信息中除银行卡号和密码之外的内容作为对应于第i层验证机制的伪装信息内容;当原始信息内容为公司财务通过邮件发送的工资明细时,终端可以提取工资条中的金额明细,将工资条中除提取到的金额明细之外的信息确定为对应于第i层验证机制的伪装信息内容。For example, when the original information content is notepad information including bank card number and password, the terminal can extract the bank card number and password in the notepad information, and use the content in the notepad information except the bank card number and password as corresponding to the ith The camouflaged information content of the layer verification mechanism; when the original information content is the salary details sent by the company's finance by email, the terminal can extract the amount details in the salary slip, and determine the information in the salary slip except the extracted amount details as the corresponding The camouflaged information content of the i-layer verification mechanism.

当原始信息内容为图片时,终端可以识别图片中的目标对象,将图片中除目标对象之外的内容确定为对应于第i层验证机制的伪装信息内容。其中,该目标对象可以为用户预先标记的对象或者终端根据已经存储的各个图片提取确定的对象。When the original information content is a picture, the terminal can identify the target object in the picture, and determine the content in the picture other than the target object as the camouflaged information content corresponding to the verification mechanism of the i-th layer. Wherein, the target object may be an object pre-marked by the user or an object determined by the terminal based on each stored picture.

当原始信息内容为视频时,终端可以提取视频中的目标片段,将视频中除目标片段之外的内容确定为对应于第i层验证机制的伪装信息内容。其中,目标片段可以为用户预先标记的片段,也可以是终端根据视频内容自动提取的片段,本实施例对此并不做限定。When the original information content is a video, the terminal can extract the target segment in the video, and determine the content in the video other than the target segment as the camouflaged information content corresponding to the i-th layer verification mechanism. Wherein, the target segment may be a segment marked in advance by the user, or a segment automatically extracted by the terminal according to the video content, which is not limited in this embodiment.

在实际实现时,终端还可以直接提取原始信息内容中的常规内容,将提取到的常规内容作为对应于第i层验证机制的伪装信息内容。其中,常规内容是指携带的信息量较少或者对于用户来说不是私密信息的内容。In actual implementation, the terminal can also directly extract the regular content in the original information content, and use the extracted regular content as the camouflaged information content corresponding to the verification mechanism of the i-th layer. Wherein, the regular content refers to the content that carries less information or is not private information for the user.

比如,当原始信息内容为诸如短信、记事本信息或者即时通信信息之类的文本信息时,终端可以通过语义分析得到原始信息内容中的常规内容,将分析得到的常规内容作为第i层验证机制的伪装信息内容。比如,提取文本信息中的问候语、祝福语和客套话。For example, when the original information content is text information such as SMS, notepad information or instant messaging information, the terminal can obtain the regular content in the original information content through semantic analysis, and use the analyzed regular content as the i-layer verification mechanism The camouflaged information content. For example, extract greetings, blessings and polite words in text information.

当原始信息内容为邮件时,终端可以提取邮件中的常规内容,比如问候语、祝福语、签名或者客套话之类的内容,将提取到的内容作为对应于第i层验证机制的伪装信息内容。When the original information content is an email, the terminal can extract the regular content in the email, such as greetings, blessings, signatures, or polite words, and use the extracted content as the camouflaged information content corresponding to the i-level verification mechanism .

当原始信息内容为图片时,终端可以自动对图片中的敏感动作或者敏感对象进行隐藏,进而只显示隐藏后的内容。When the original information content is a picture, the terminal can automatically hide sensitive actions or sensitive objects in the picture, and then only display the hidden content.

当原始信息内容为视频时,终端可以提取视频中的风景片段或者美食片段,将提取到的片段作为对应于第i层验证机制的伪装信息内容。When the original information content is a video, the terminal can extract the scenery segment or food segment in the video, and use the extracted segment as the camouflaged information content corresponding to the verification mechanism of the i-th layer.

第三种:The third type:

接收用户为原始信息内容设置的信息内容,将接收到的信息内容作为对应于第i层验证机制的伪装信息内容。The information content set by the user for the original information content is received, and the received information content is used as the camouflaged information content corresponding to the verification mechanism of the i-th layer.

当需要为第i层验证机制设置伪装信息内容时,用户可以在终端中输入自定义的内容,终端接收到用户自定义的内容之后,将接收到的信息内容作为对应于第i层验证机制的伪装信息内容。When it is necessary to set the camouflaged information content for the i-layer verification mechanism, the user can enter the user-defined content in the terminal, and after the terminal receives the user-defined content, the received information content will be used as the information corresponding to the i-layer verification mechanism. Disguised information content.

需要说明的一点是,终端为每层验证机制设置的伪装信息内容可以相同也可以不同,本实施例对此并不做限定。It should be noted that the masquerading information content set by the terminal for each verification mechanism may be the same or different, which is not limited in this embodiment.

需要说明的另一点是,本实施例只是以终端先执行步骤402后执行步骤403为例,在实际实现时,终端还可以同时执行步骤402和步骤403,或者先执行步骤403后执行步骤402,只需要保证步骤401至步骤403在步骤404之前执行即可,对其实际执行顺序并不做限定。Another point that needs to be explained is that this embodiment only takes the terminal to execute step 402 first and then execute step 403 as an example. In actual implementation, the terminal can also execute step 402 and step 403 at the same time, or execute step 403 first and then execute step 402. It is only necessary to ensure that steps 401 to 403 are executed before step 404, and the actual execution sequence is not limited.

在步骤404中,接收用于对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作,n≥2。In step 404, a first type of verification operation for verifying any layer in the first n-1 layer verification mechanisms in the n-layer verification mechanism is received, n≥2.

当用户想要浏览终端中隐藏的信息内容时,用户可以在终端中输入对第i层验证机制进行验证的第一类验证操作,相应的,终端可以接收到对第i层验证机制进行验证的第一类验证操作。其中,i的起始值为1,且i为小于等于n-1的整数。When the user wants to browse the hidden information content in the terminal, the user can enter the first type of verification operation to verify the verification mechanism of the i-th layer in the terminal, and correspondingly, the terminal can receive the verification operation of the verification mechanism of the i-th layer The first type of verification operation. Wherein, the initial value of i is 1, and i is an integer less than or equal to n-1.

比如,当第一层验证机制使用加密密码加密时,用户可以在终端中输入对应于加密密码的解密密码;终端相应的接收用户输入的解密密码。类似的,当第二层验证机制使用加密手势加密时,用户可以在终端中施加与加密手势对应的手势解密操作;终端可以相应的接收到手势解密操作。For example, when the first-layer verification mechanism is encrypted with an encryption password, the user can enter a decryption password corresponding to the encryption password in the terminal; and the terminal correspondingly receives the decryption password input by the user. Similarly, when the second-layer verification mechanism uses encrypted gesture encryption, the user can perform a gesture decryption operation corresponding to the encrypted gesture in the terminal; the terminal can receive the gesture decryption operation accordingly.

在实际实现时,终端可以显示用于提示第一类验证操作的验证入口,用户在查看到验证入口之后,进入验证入口,施加第一类验证操作,终端相应的接收第一类验证操作,本实施例对此并不做限定。In actual implementation, the terminal can display the verification entry for prompting the first type of verification operation. After viewing the verification entry, the user enters the verification entry, applies the first type of verification operation, and the terminal receives the first type of verification operation accordingly. The embodiment does not limit this.

在步骤405中,在对前n-1层验证机制中对应于第i层验证机制的第一类验证操作验证通过时,显示与第i层验证机制对应的伪装信息内容。In step 405, when the first type of verification operation corresponding to the i-th layer verification mechanism among the previous n-1 layer verification mechanisms is verified, the content of the camouflaged information corresponding to the i-th layer verification mechanism is displayed.

终端接收到用于对第i层验证机制进行验证的第一类验证操作时,终端可以对接收到的第一类验证操作进行验证,当验证通过时,显示与第i层验证机制对应的伪装信息内容。其中,伪装信息内容用于对原始信息内容进行伪装。When the terminal receives the first type of verification operation for verifying the verification mechanism of the i-th layer, the terminal can verify the received first type of verification operation, and when the verification is passed, display the camouflage corresponding to the i-th layer verification mechanism information. Wherein, the camouflage information content is used to camouflage the original information content.

比如,终端接收到对应于第一层验证机制的解密密码,则终端可以检测接收到的解密密码是否正确,如果正确,则显示对应于第一层验证机制的伪装信息内容。For example, when the terminal receives the decryption password corresponding to the first-layer verification mechanism, the terminal can detect whether the received decryption password is correct, and if it is correct, display the camouflaged information content corresponding to the first-layer verification mechanism.

需要说明的第一点是,终端接收到对应于第i层验证机制的第一类验证操作时,终端即可对接收到的对应于第i层验证机制的第一类验证操作进行验证,当验证通过时,显示对应于第i层验证机制的伪装信息内容。此后,将i+1,当用户继续施加对应于第i层验证机制的第一类验证操作时,终端可以再次执行接收对应于第i层验证机制的第一类验证操作,对接收到的对应于第i层验证机制的第一类验证操作进行验证,如果验证通过,则显示对应于第i层的伪装信息内容。The first point to be explained is that when the terminal receives the first type of verification operation corresponding to the i-th layer verification mechanism, the terminal can verify the received first type of verification operation corresponding to the i-th layer verification mechanism. When the verification is passed, display the masquerading information content corresponding to the i-th layer verification mechanism. After that, set i+1, when the user continues to apply the first type of verification operation corresponding to the i-th layer verification mechanism, the terminal can perform the first type of verification operation corresponding to the i-th layer verification mechanism again, and the received corresponding Verification is performed on the first type of verification operation of the i-th layer verification mechanism, and if the verification is passed, the content of the camouflaged information corresponding to the i-th layer is displayed.

需要说明的第二点是,如果终端对第一类验证操作验证失败,则流程结束,本实施例在此不再赘述。The second point that needs to be explained is that if the terminal fails to verify the first type of verification operation, the process ends, and this embodiment will not repeat it here.

需要说明的第三点是,在i<n-1时,用户也可以选择不继续施加第一类验证操作,此时流程将结束,本实施例对此也不做赘述。The third point that needs to be explained is that when i<n-1, the user can also choose not to continue to apply the first type of verification operation, and the process will end at this time, which will not be described in this embodiment.

在步骤406中,接收用于对第n层验证机制进行验证的第二类验证操作。In step 406, a second type of verification operation for verifying the nth layer verification mechanism is received.

在终端显示对应于第n-1层验证机制的伪装信息内容之后,用户可以执行对第n层验证机制进行验证的第二类验证操作。相应的,终端可以接收到第二类验证操作。After the terminal displays the masquerading information content corresponding to the n-1th layer verification mechanism, the user can perform a second type of verification operation for verifying the nth layer verification mechanism. Correspondingly, the terminal can receive the second type of verification operation.

在实际实现时,本步骤可以包括:接收用于对第n层验证机制进行验证的隐性验证操作,将隐性验证操作作为第二类验证操作,隐性验证操作的验证入口是非显性提示的验证入口。In actual implementation, this step may include: receiving an implicit verification operation for verifying the verification mechanism of the nth layer, using the implicit verification operation as the second type of verification operation, and the verification entry of the implicit verification operation is a non-explicit prompt The verification entry.

由于隐性验证操作可以包括预设摇动操作、预设手势操作、预设语音信息、预设规律的按键操作以及预设敲击操作中的至少一种,所以根据隐性验证操作的不同,终端接收用于对第n层验证机制进行验证的隐性验证操作的接收方法可以包括如下方法中的至少一种:Since the implicit verification operation may include at least one of a preset shaking operation, a preset gesture operation, a preset voice message, a preset regular key operation, and a preset tapping operation, according to different implicit verification operations, the terminal The receiving method for receiving the implicit verification operation for verifying the n-th layer verification mechanism may include at least one of the following methods:

第一种:The first:

通过传感器接收预设摇动操作,将预设摇动操作作为隐性验证操作;Receive the preset shaking operation through the sensor, and use the preset shaking operation as an implicit verification operation;

当用户按照预设摇动操作摇动终端中,终端可以通过传感器接收到预设摇动操作,终端将预设摇动操作作为隐性验证操作。其中,摇动操作可以是传统的摇动操作,也可以是用户握持终端做出一定手势的摇动操作,还可以是用户反转终端的反转操作,本实施例对此并不做限定。When the user shakes the terminal according to the preset shaking operation, the terminal may receive the preset shaking operation through the sensor, and the terminal uses the preset shaking operation as an implicit verification operation. The shaking operation may be a traditional shaking operation, a shaking operation in which the user holds the terminal and makes a certain gesture, or a reverse operation in which the user reverses the terminal, which is not limited in this embodiment.

比如,当用户摇动三次手机时,终端可以通过传感器接收到摇动三次的摇动操作。当用户握持手机做出画圈的操作时,终端可以通过传感器接收到画圈操作。当用户握持手机画出一个‘对号’时,终端可以通过传感器接收到该操作。当,用户将手机反转时,手机可以通过传感器接收到该反转操作。For example, when the user shakes the mobile phone three times, the terminal may receive the three-time shaking operation through the sensor. When the user holds the mobile phone to perform an operation of drawing a circle, the terminal may receive the operation of drawing a circle through a sensor. When the user holds the mobile phone and draws a 'check mark', the terminal can receive this operation through the sensor. When the user reverses the mobile phone, the mobile phone can receive the reverse operation through the sensor.

本实施例只是以预设摇动操作是上述几种操作为例,在实际实现时,预设摇动操作还可以为其他操作,本实施例对此并不做限定。This embodiment only takes the preset shaking operation as an example of the above operations. In actual implementation, the preset shaking operation may also be other operations, which is not limited in this embodiment.

第二种:The second type:

通过触摸屏接收预设手势操作,将预设手势操作作为隐性验证操作;Receive the preset gesture operation through the touch screen, and use the preset gesture operation as an implicit verification operation;

第三种:The third type:

通过麦克风接收预设语音信息,将预设语音信息作为隐性验证操作;Receive the preset voice information through the microphone, and use the preset voice information as an implicit verification operation;

用户还可以对着终端麦克风说出预设语句,相应的,终端可以通过麦克风接收预设语音信息。The user can also speak preset sentences into the microphone of the terminal, and correspondingly, the terminal can receive preset voice information through the microphone.

第四种:The fourth type:

通过物理按键或虚拟按键接收预设规律的按键操作,将预设规律的按键操作作为隐性验证操作;Receive preset regular key operations through physical keys or virtual keys, and use preset regular key operations as implicit verification operations;

用户还可以以预设规律按压终端中的物理按键,或者按压终端通过虚拟键盘向用户提供的虚拟按键。比如,终端同时按压数字键‘1’和数字键‘9’。The user can also press a physical key in the terminal according to a preset rule, or press a virtual key provided by the terminal to the user through a virtual keyboard. For example, the terminal presses the number key '1' and the number key '9' at the same time.

第五种:The fifth type:

通过触摸屏接收预设敲击操作,将预设敲击操作作为隐性验证操作。The preset tapping operation is received through the touch screen, and the preset tapping operation is used as an implicit verification operation.

用户还可以按照预设敲击规律敲击终端屏幕,比如,用户连续点击3次终端屏幕。The user can also tap the terminal screen according to a preset tapping pattern, for example, the user taps the terminal screen 3 times in a row.

在步骤407中,在第二类验证操作验证通过时,显示原始信息内容。In step 407, when the verification of the second type of verification operation is passed, the original information content is displayed.

终端接收到第二类验证操作时,终端可以对第二类验证操作进行验证,如果对第二类验证操作验证通过,则终端可以显示原始信息内容。When the terminal receives the second type of verification operation, the terminal can verify the second type of verification operation, and if the verification of the second type of verification operation passes, the terminal can display the original information content.

终端可以检测接收到的第二类验证操作是否与预设的第二类验证操作匹配,如果匹配,则确定对第二类验证操作验证通过,反之,则验证失败。The terminal may detect whether the received second type of verification operation matches the preset second type of verification operation, and if it matches, it determines that the verification of the second type of verification operation is passed; otherwise, the verification fails.

在本实施例的一个应用场景中,为了避免遗忘自己的银行卡密码,进而给使用带来不便,小明在手机记事本中创建了存储有银行卡号和密码的记事本信息。则为了避免手机被盗时,他人查看到该条记事本信息,进而导致财产损失,小明对该条记事本信息设置了2层验证机制。其中,第一层验证机制设置了手势验证,第二层验证机制设置了语音验证;且第一层验证机制通过用户设置的‘8.10号小妹生日,记得买礼物’进行伪装。这样,即便他人捡到手机,通过屏幕中的划痕猜对了加密手势,并对第一层验证机制验证通过,他人也只能看到第一层验证机制的伪装信息内容,而无法查看到自己的银行卡号和密码;并且他人在查看到信息内容后,他人一般会认为该内容就是本条记事本信息的初始内容,从而放弃继续解密,提高了记事本信息的信息安全。即便他人知道还需要进一步验证,但是由于手机并不会显示对最后一步验证的验证入口,他人也无法继续验证,进一步保证了信息安全。In an application scenario of this embodiment, in order to avoid forgetting his bank card password and causing inconvenience to the use, Xiao Ming created a notepad information storing the bank card number and password in the notepad of the mobile phone. In order to prevent other people from viewing the notepad information when the mobile phone is stolen, which would lead to property loss, Xiao Ming set up a two-layer verification mechanism for the notepad information. Among them, the first layer of verification mechanism is set up with gesture verification, and the second layer of verification mechanism is set up with voice verification; and the first layer of verification mechanism is disguised by the user's setting of "8.10 birthday, remember to buy a gift". In this way, even if someone else picks up the phone, guesses the encrypted gesture correctly through the scratches on the screen, and passes the verification of the first-layer verification mechanism, others can only see the camouflaged information content of the first-layer verification mechanism, but cannot view it. Your own bank card number and password; and after other people view the content of the information, they will generally think that the content is the initial content of this notepad information, so they give up continuing to decrypt and improve the information security of the notepad information. Even if others know that further verification is required, since the mobile phone does not display the verification entry for the last step of verification, others cannot continue to verify, further ensuring information security.

在本实施例的另一个应用场景中,小花为了防止自己与恋人的短信记录被他人查看,小花对短信记录设置了3层验证,第一层验证机制为密码验证,第二层验证机制为手势验证,第三层验证机制为组合按键验证,且第一层验证机制和第二层验证机制均通过伪装信息内容对该短信记录进行伪装。则当他人使用小花手机且出于好奇心尝试对隐藏的短信进行验证时,即便他人可能对第一层验证机制验证通过,但是也只能查看到伪装的信息内容,而并不能查看到真实的伪装内容;且他人也不一定能继续对第二层验证机制验证通过,即便他人在极小概率的情况下对第二层验证机制也验证通过,那么他看到的内容仍然是伪装的信息内容,而并不是短信记录的真实内容,提高了短信记录的安全。同时,由于第三层验证机制使用隐性验证操作,终端不提供验证入口,所以在他人事先不知道还有第三层验证时,他人会非常肯定的认为当前显示的内容即为短信的真实内容,进一步提高了信息安全。In another application scenario of this embodiment, in order to prevent the SMS records of herself and her lover from being viewed by others, Xiaohua has set up three layers of verification for the SMS records. The first layer of verification mechanism is password verification, and the second layer of verification mechanism is gestures. Verification, the third layer of verification mechanism is a combination of key verification, and both the first layer of verification mechanism and the second layer of verification mechanism camouflage the SMS record by disguising information content. Then when others use Xiaohua's mobile phone and try to verify the hidden text messages out of curiosity, even if others may pass the first-layer verification mechanism, they can only view the disguised information content, but not the real one. Disguised content; and others may not be able to continue to pass the verification of the second-layer verification mechanism, even if others pass the verification of the second-layer verification mechanism with a very small probability, then the content he sees is still the disguised information content , rather than the real content of the SMS record, which improves the security of the SMS record. At the same time, because the third-layer verification mechanism uses implicit verification operation, the terminal does not provide verification entry, so when others do not know in advance that there is a third-layer verification, others will be very sure that the currently displayed content is the real content of the SMS , to further improve information security.

需要补充说明的是,步骤404至步骤407可以是步骤403之后执行一次的步骤,也可以是步骤403之后循环执行多次的步骤,本实施例对此并不做限定。It should be added that steps 404 to 407 may be performed once after step 403, or may be performed repeatedly after step 403, which is not limited in this embodiment.

综上所述,本公开实施例中提供的信息显示方法,通过在接收到对前n-1层验证机制中的任一层验证机制进行验证的第一类验证操作,且对第一类验证操作验证通过时,只显示伪装信息内容;而在接收到对第n层验证机制进行验证的第二类验证操作,且对第二类验证操作验证通过时,才会显示原始信息内容;解决了相关技术中信息的安全性较差的问题;达到了可以通过伪装信息内容对原始信息内容进行伪装,进而使得他人很难获知原始信息内容,提高信息安全性的效果。To sum up, the information display method provided in the embodiments of the present disclosure, after receiving the first type of verification operation for verifying any one of the previous n-1 layer verification mechanisms, and performing the first type of verification When the operation verification is passed, only the content of the fake information will be displayed; and when the second type of verification operation for verifying the nth layer verification mechanism is received, and the verification of the second type of verification operation is passed, the original information content will be displayed; solved The problem of poor information security in related technologies; the original information content can be disguised by disguising the information content, which makes it difficult for others to know the original information content and improves the information security.

通常情况下,用户对隐藏的内容进行访问验证,终端显示对应的内容之后,用户都会认为此时显示的内容就是隐藏的内容,所以本实施例通过设置n层验证机制加密,并且前n-1层验证机制使用伪装信息内容来伪装原始信息内容,达到了即使其他用户胁迫用户本人对隐藏的内容进行验证,其他用户也无法查看到原始信息内容中的真实内容,提高了信息内容的安全性。Usually, the user performs access verification on the hidden content, and after the terminal displays the corresponding content, the user will think that the content displayed at this time is the hidden content, so this embodiment encrypts by setting an n-layer verification mechanism, and the first n-1 The multi-level verification mechanism uses camouflaged information content to disguise the original information content, so that even if other users coerce the user to verify the hidden content, other users cannot view the real content in the original information content, which improves the security of the information content.

同时,本实施例通过对最后一层验证机制设置通过隐性验证操作进行验证,隐性验证操作的验证入口为非显性提示的验证入口,使得其他用户在对前n-1层验证机制的第一类验证信息验证后,其他用户也无法获知还有一层验证,进一步提高了信息内容的安全。At the same time, in this embodiment, the last layer of verification mechanism is set to be verified through the implicit verification operation, and the verification entry of the implicit verification operation is a non-explicitly prompted verification entry, so that other users can check the verification mechanism of the first n-1 layers. After the first type of verification information is verified, other users cannot know that there is another layer of verification, which further improves the security of information content.

需要说明的是,在终端显示原始信息内容之后,终端还可以执行如下步骤中的至少一个步骤:It should be noted that after the terminal displays the original information content, the terminal may also perform at least one of the following steps:

第一,获取原始信息内容的显示时长;检测获取到的显示时长是否超过预定时长;如果显示时长超过预定时长,则重新启用n层验证机制;First, obtain the display duration of the original information content; detect whether the obtained display duration exceeds the predetermined duration; if the display duration exceeds the predetermined duration, re-enable the n-layer verification mechanism;

在终端开始显示原始信息内容时,终端可以记录原始信息内容的显示时长,并实时检测记录的显示时长是否超过预定时长比如‘30S’,当检测结果为超过预定时长时,终端可以请求用户再次验证。在实际实现时,终端可以显示第一类验证操作的验证入口,当用户施加对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作,相应的,终端可以重新启用n层验证机制。这样,就避免了用户查看完隐藏的原始信息内容忘记退出时,终端显示的原始信息内容被他人偷看的问题。When the terminal starts to display the original information content, the terminal can record the display duration of the original information content, and detect in real time whether the recorded display duration exceeds the predetermined duration, such as '30S', and when the detection result exceeds the predetermined duration, the terminal can request the user to verify again . In actual implementation, the terminal can display the verification entry of the first type of verification operation. When the user applies the first type of verification operation to verify any layer in the first n-1 layer verification mechanisms in the n-layer verification mechanism, correspondingly, The terminal can re-enable the n-layer authentication mechanism. In this way, when the user forgets to log out after viewing the hidden original information content, the problem that the original information content displayed on the terminal is peeked by others is avoided.

第二,若在显示原始信息内容时,接收到中断显示的触发信号,则重新启用n层验证机制。Second, if a trigger signal for interrupting display is received when displaying the original information content, the n-layer verification mechanism is re-enabled.

其中,中断显示的触发信号可以为新呼叫呼入的请求信号,也可以是用户通过下拉通知栏从通知栏切换至其他界面的切换信号。Wherein, the trigger signal for interrupting the display may be a request signal for an incoming call, or a switching signal for the user to switch from the notification bar to other interfaces by pulling down the notification bar.

比如,在终端显示原始信息内容时,当有新呼叫呼入且呼叫结束时,终端将显示第一类验证操作的验证入口,当用户施加对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作时,终端重新启用n层验证机制。For example, when the terminal displays the original information content, when a new call comes in and the call ends, the terminal will display the verification entry of the first type of verification operation. When the first type of verification operation is performed at any layer of the terminal, the terminal re-enables the n-layer verification mechanism.

类似的,当用户通过下拉通知栏,进而查看新短信、新的即时通信信息后,终端也可以显示第一类验证操作的验证入口,当用户施加对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作时,终端可以重新启用n层验证机制。Similarly, when the user pulls down the notification bar to view new text messages and new instant messaging information, the terminal can also display the verification entry of the first type of verification operation. When any layer in the mechanism performs the first type of verification operation, the terminal can re-enable the n-layer verification mechanism.

在实际实现时,当用户退出原始信息内容的显示,且想要再次查看原始信息内容时,终端仍然需要重新启用n层验证机制。In actual implementation, when the user exits the display of the original information content and wants to view the original information content again, the terminal still needs to re-enable the n-layer verification mechanism.

下述为本公开装置实施例,可以用于执行本公开方法实施例。对于本公开装置实施例中未披露的细节,请参照本公开方法实施例。The following are device embodiments of the present disclosure, which can be used to implement the method embodiments of the present disclosure. For details not disclosed in the disclosed device embodiments, please refer to the disclosed method embodiments.

图5是根据一示例性实施例示出的一种信息显示装置的框图,如图5所示,该信息显示装置可以包括但不限于:第一操作接收模块510、伪装内容显示模块520、第二操作接收模块530和原始内容显示模块540。FIG. 5 is a block diagram of an information display device according to an exemplary embodiment. As shown in FIG. The receiving module 530 and the original content displaying module 540 are operated.

第一操作接收模块510,被配置为接收用于对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作,n≥2;The first operation receiving module 510 is configured to receive a first type of verification operation for verifying any layer in the first n-1 layer verification mechanisms in the n-layer verification mechanism, n≥2;

伪装内容显示模块520,被配置为在对第一操作接收模块510接收到的第一类验证操作验证通过时,显示伪装信息内容,伪装信息内容用于对原始信息内容进行伪装;The masquerading content display module 520 is configured to display the masquerading information content when the verification of the first type of verification operation received by the first operation receiving module 510 is passed, and the masquerading information content is used to masquerade the original information content;

第二操作接收模块530,被配置为接收用于对第n层验证机制进行验证的第二类验证操作;The second operation receiving module 530 is configured to receive a second type of verification operation for verifying the n-th layer verification mechanism;

原始内容显示模块540,被配置为在对第二操作接收模块530接收到的第二类验证操作验证通过时,显示原始信息内容。The original content display module 540 is configured to display the original information content when the verification of the second type of verification operation received by the second operation receiving module 530 is passed.

综上所述,本公开实施例中提供的信息显示装置,通过在接收到对前n-1层中的任一层进行验证的第一类验证操作,且对第一类验证操作验证通过时,只显示伪装信息内容;而在接收到对第n层进行验证的第二类验证操作,且对第二类验证操作验证通过时,才会显示原始信息内容;解决了相关技术中信息的安全性较差的问题;达到了可以通过伪装信息内容对原始信息内容进行伪装,进而使得他人很难获知原始信息内容,提高信息安全性的效果。To sum up, the information display device provided in the embodiment of the present disclosure, after receiving the first type of verification operation for verifying any layer in the first n-1 layers, and passing the verification of the first type of verification operation , only display the content of the camouflaged information; and when the second type of verification operation for verifying the nth layer is received, and the verification of the second type of verification operation is passed, the original information content will be displayed; it solves the security of information in related technologies The problem of poor security; the original information content can be disguised by disguising the information content, which makes it difficult for others to know the original information content and improves the information security.

图6是根据一示例性实施例示出的一种信息显示装置的框图,如图6所示,该信息显示装置可以包括但不限于:第一操作接收模块610、伪装内容显示模块620、第二操作接收模块630和原始内容显示模块640。FIG. 6 is a block diagram of an information display device according to an exemplary embodiment. As shown in FIG. The receiving module 630 and the original content displaying module 640 are operated.

第一操作接收模块610,被配置为接收用于对n层验证机制中前n-1层验证机制中的任一层进行验证的第一类验证操作,n≥2;The first operation receiving module 610 is configured to receive a first type of verification operation for verifying any layer in the first n-1 layer verification mechanisms in the n-layer verification mechanism, n≥2;

伪装内容显示模块620,被配置为在对第一操作接收模块610接收到的第一类验证操作验证通过时,显示伪装信息内容,伪装信息内容用于对原始信息内容进行伪装;The masquerading content display module 620 is configured to display the masquerading information content when the verification of the first type of verification operation received by the first operation receiving module 610 is passed, and the masquerading information content is used to masquerade the original information content;

第二操作接收模块630,被配置为接收用于对第n层验证机制进行验证的第二类验证操作;The second operation receiving module 630 is configured to receive a second type of verification operation for verifying the n-th layer verification mechanism;

原始内容显示模块640,被配置为在对第二操作接收模块630接收到的第二类验证操作验证通过时,显示原始信息内容。The original content display module 640 is configured to display the original information content when the verification of the second type of verification operation received by the second operation receiving module 630 is passed.

可选的,第二操作接收模块630,被配置为接收用于对第n层验证机制进行验证的隐性验证操作,将隐性验证操作作为第二类验证操作,隐性验证操作的验证入口是非显性提示的验证入口。Optionally, the second operation receiving module 630 is configured to receive an implicit verification operation for verifying the verification mechanism of the nth layer, and use the implicit verification operation as the second type of verification operation, and the verification entry of the implicit verification operation It is the verification entry of non-explicit prompt.

可选的,第二操作接收模块630,被配置为:Optionally, the second operation receiving module 630 is configured to:

通过传感器接收预设摇动操作,将预设摇动操作作为隐性验证操作;Receive the preset shaking operation through the sensor, and use the preset shaking operation as an implicit verification operation;

和/或,and / or,

通过触摸屏接收预设手势操作,将预设手势操作作为隐性验证操作;Receive the preset gesture operation through the touch screen, and use the preset gesture operation as an implicit verification operation;

和/或,and / or,

通过麦克风接收预设语音信息,将预设语音信息作为隐性验证操作;Receive the preset voice information through the microphone, and use the preset voice information as an implicit verification operation;

和/或,and / or,

通过物理按键或虚拟按键接收预设规律的按键操作,将预设规律的按键操作作为隐性验证操作;Receive preset regular key operations through physical keys or virtual keys, and use preset regular key operations as implicit verification operations;

和/或,and / or,

通过触摸屏接收预设敲击操作,将预设敲击操作作为隐性验证操作。The preset tapping operation is received through the touch screen, and the preset tapping operation is used as an implicit verification operation.

可选的,伪装内容显示模块620,被配置为在对前n-1层验证机制中对应于第i层验证机制的第一类验证操作验证通过时,显示与第i层验证机制对应的伪装信息内容,1≤i≤n-1。Optionally, the masquerade content display module 620 is configured to display the masquerade corresponding to the i-th layer verification mechanism when the verification of the first type of verification operation corresponding to the i-th layer verification mechanism in the previous n-1 layer verification mechanisms is passed Information content, 1≤i≤n-1.

可选的,装置还包括:Optionally, the device also includes:

第一触发模块650,被配置为获取原始信息内容的显示时长;检测获取到的显示时长是否超过预定时长;如果显示时长超过预定时长,则重新启动n层验证机制;The first trigger module 650 is configured to obtain the display duration of the original information content; detect whether the acquired display duration exceeds a predetermined duration; if the display duration exceeds the predetermined duration, restart the n-layer verification mechanism;

和/或,and / or,

第二触发模块660,被配置为若在显示原始信息内容时,接收到中断显示的触发信号,则重新启用n层验证机制。The second trigger module 660 is configured to re-enable the n-layer verification mechanism if a trigger signal for interrupting display is received when displaying the original information content.

综上所述,本公开实施例中提供的信息显示装置,通过在接收到对前n-1层中的任一层进行验证的第一类验证操作,且对第一类验证操作验证通过时,只显示伪装信息内容;而在接收到对第n层进行验证的第二类验证操作,且对第二类验证操作验证通过时,才会显示原始信息内容;解决了相关技术中信息的安全性较差的问题;达到了可以通过伪装信息内容对原始信息内容进行伪装,进而使得他人很难获知原始信息内容,提高信息安全性的效果。To sum up, the information display device provided in the embodiment of the present disclosure, after receiving the first type of verification operation for verifying any layer in the first n-1 layers, and passing the verification of the first type of verification operation , only display the content of the camouflaged information; and when the second type of verification operation for verifying the nth layer is received, and the verification of the second type of verification operation is passed, the original information content will be displayed; it solves the security of information in related technologies The problem of poor security; the original information content can be disguised by disguising the information content, which makes it difficult for others to obtain the original information content and improves the effect of information security.

通常情况下,用户对隐藏的内容进行访问验证,终端显示对应的内容之后,用户都会认为此时显示的内容就是隐藏的内容,所以本实施例通过设置n层加密,并且前n-1层使用伪装信息内容来伪装原始信息内容,达到了即使其他用户胁迫用户本人对隐藏的内容进行验证,其他用户也无法查看到原始信息内容中的真实内容,提高了信息内容的安全性。Usually, the user performs access verification on the hidden content, and after the terminal displays the corresponding content, the user will think that the content displayed at this time is the hidden content, so in this embodiment, n layers of encryption are set, and the first n-1 layers use Disguising information content to disguise the original information content achieves that even if other users coerce the user to verify the hidden content, other users cannot view the real content in the original information content, which improves the security of the information content.

同时,本实施例通过对最后一层设置通过隐性验证操作进行验证,隐性验证操作的验证入口为非显性提示的验证入口,使得其他用户在进行前n-1层的验证后,其他用户也无法获知还有一层验证,进一步提高了信息内容的安全。At the same time, in this embodiment, the last layer is set to be verified through an implicit verification operation, and the verification entry of the implicit verification operation is a non-explicitly prompted verification entry, so that after other users perform the verification of the first n-1 layers, other users Users also cannot know that there is another layer of verification, which further improves the security of information content.

图7是根据另一示例性实施例示出的一种信息隐藏装置的框图,如图7所示,该信息隐藏装置可以包括但不限于:验证机制设置模块710和伪装内容设置模块720;Fig. 7 is a block diagram of an information hiding device according to another exemplary embodiment. As shown in Fig. 7, the information hiding device may include but not limited to: a verification mechanism setting module 710 and a camouflage content setting module 720;

验证机制设置模块710,被配置为对原始信息内容设置n层验证机制,n≥2;The verification mechanism setting module 710 is configured to set an n-layer verification mechanism for the original information content, n≥2;

伪装内容设置模块720,被配置为对验证机制设置模块710设置的n层验证机制中的前n-1层验证机制设置伪装信息内容,伪装信息用于在前n-1层验证机制验证通过时进行显示,伪装信息内容用于对原始信息内容进行伪装。The masquerade content setting module 720 is configured to set the masquerading information content for the first n-1 layer verification mechanism in the n-layer verification mechanism set by the verification mechanism setting module 710, and the masquerading information is used when the verification mechanism of the first n-1 layer is passed For displaying, the camouflaged information content is used to camouflage the original information content.

综上所述,本公开实施例中提供的信息隐藏装置,通过对原始信息内容设置n层验证机制,并对前n-1层验证机制设置伪装信息内容;使得即便前n-1层验证机制所对应的第一类验证操作被其它用户获知,其它用户也只能获知对原始信息内容进行伪装的伪装信息内容,并不能获知真实的原始信息内容;解决了相关技术中信息安全性较差的问题;达到了可以提高信息安全性的效果。To sum up, the information hiding device provided in the embodiment of the present disclosure sets n-layer verification mechanism for the original information content, and sets camouflage information content for the first n-1 layer verification mechanism; so that even the first n-1 layer verification mechanism The corresponding first type of verification operation is known by other users, and other users can only know the camouflaged information content that camouflages the original information content, but cannot know the real original information content; it solves the problem of poor information security in related technologies problem; achieved an effect that can improve information security.

图8是根据另一示例性实施例示出的一种信息隐藏装置的框图,如图8所示,该信息隐藏装置可以包括但不限于:验证机制设置模块810和伪装内容设置模块820;Fig. 8 is a block diagram of an information hiding device according to another exemplary embodiment. As shown in Fig. 8, the information hiding device may include but not limited to: a verification mechanism setting module 810 and a camouflaged content setting module 820;

验证机制设置模块810,被配置为对原始信息内容设置n层验证机制,n≥2;The verification mechanism setting module 810 is configured to set an n-layer verification mechanism for the original information content, n≥2;

伪装内容设置模块820,被配置为对验证机制设置模块810设置的n层验证机制中的前n-1层验证机制设置伪装信息内容,伪装信息用于在前n-1层验证机制验证通过时进行显示,伪装信息内容用于对原始信息内容进行伪装。The masquerade content setting module 820 is configured to set the masquerading information content for the first n-1 layer verification mechanism in the n-layer verification mechanism set by the verification mechanism setting module 810, and the masquerade information is used when the verification mechanism of the first n-1 layer verification mechanism is passed For displaying, the camouflaged information content is used to camouflage the original information content.

可选的,验证机制设置模块810,包括:Optionally, the verification mechanism setting module 810 includes:

第一设置子模块811,被配置为设置通过第一类验证操作进行验证的前n-1层验证机制;The first setting sub-module 811 is configured to set the first n-1 layer verification mechanism for verification through the first type of verification operation;

第二设置子模块812,被配置为设置通过第二类验证操作进行验证的第n层验证机制。The second setting sub-module 812 is configured to set the nth layer verification mechanism for verification through the second type of verification operation.

可选的,第二设置子模块812,被配置为设置通过隐性验证操作进行验证的第n层验证机制,将隐性验证操作作为第二类验证操作,隐性验证操作的验证入口是非显性提示的验证入口。Optionally, the second setting sub-module 812 is configured to set the nth layer verification mechanism for verification through the implicit verification operation, and the implicit verification operation is used as the second type of verification operation, and the verification entry of the implicit verification operation is non-explicit The authentication entry for sexual prompts.

可选的,隐性验证操作包括:预设摇动操作、预设手势操作、预设语音信息、预设规律的按键操作以及预设敲击操作中的至少一种。Optionally, the implicit verification operation includes: at least one of a preset shaking operation, a preset gesture operation, a preset voice message, a preset regular key operation, and a preset tapping operation.

可选的,伪装内容设置模块820,被配置为分别设置对应于前n-1层验证机制中的第i层验证机制的伪装信息内容,1≤i≤n-1。Optionally, the masquerading content setting module 820 is configured to respectively set the masquerading information content corresponding to the i-th verification mechanism in the first n-1 verification mechanisms, 1≤i≤n-1.

可选的,伪装内容设置模块820,包括:Optionally, the camouflage content setting module 820 includes:

第三设置子模块821,被配置为获取系统默认的信息内容,将获取到的信息内容作为对应于第i层验证机制的伪装信息内容;The third setting sub-module 821 is configured to obtain the default information content of the system, and use the obtained information content as the camouflaged information content corresponding to the verification mechanism of the i-th layer;

和/或,and / or,

第四设置子模块822,被配置为获取原始信息内容中的敏感内容,将原始信息内容中除敏感内容之外的内容作为对应于第i层验证机制的伪装信息内容;The fourth setting sub-module 822 is configured to obtain the sensitive content in the original information content, and use the content in the original information content other than the sensitive content as the camouflaged information content corresponding to the i-th layer verification mechanism;

和/或,and / or,

第五设置子模块823,被配置为接收用户为原始信息内容设置的信息内容,将接收到的信息内容作为对应于第i层验证机制的伪装信息内容。The fifth setting sub-module 823 is configured to receive the information content set by the user for the original information content, and use the received information content as the fake information content corresponding to the verification mechanism of the i-th layer.

综上所述,本公开实施例中提供的信息隐藏装置,通过对原始信息内容设置n层验证机制,并对前n-1层验证机制设置伪装信息内容;使得即便前n-1层验证机制所对应的第一类验证操作被其它用户获知,其它用户也只能获知对原始信息内容进行伪装的伪装信息内容,并不能获知真实的原始信息内容;解决了相关技术中信息安全性较差的问题;达到了可以提高信息安全性的效果。To sum up, the information hiding device provided in the embodiment of the present disclosure sets n-layer verification mechanism for the original information content, and sets camouflage information content for the first n-1 layer verification mechanism; so that even the first n-1 layer verification mechanism The corresponding first type of verification operation is known by other users, and other users can only know the camouflaged information content that camouflages the original information content, but cannot know the real original information content; it solves the problem of poor information security in related technologies problem; achieved an effect that can improve information security.

关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the apparatus in the foregoing embodiments, the specific manner in which each module executes operations has been described in detail in the embodiments related to the method, and will not be described in detail here.

图9是根据一示例性实施例示出的一种用于信息显示和信息隐藏的装置900的框图。例如,装置900可以是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。Fig. 9 is a block diagram of an apparatus 900 for information display and information hiding according to an exemplary embodiment. For example, the apparatus 900 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.

参照图9,装置900可以包括以下一个或多个组件:处理组件902,存储器904,电源组件906,多媒体组件908,音频组件910,输入/输出(I/O)的接口912,传感器组件914,以及通信组件916。9, device 900 may include one or more of the following components: processing component 902, memory 904, power supply component 906, multimedia component 908, audio component 910, input/output (I/O) interface 912, sensor component 914, and communication component 916 .

处理组件902通常控制装置900的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件902可以包括一个或多个处理器918来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件902可以包括一个或多个模块,便于处理组件902和其他组件之间的交互。例如,处理组件902可以包括多媒体模块,以方便多媒体组件908和处理组件902之间的交互。The processing component 902 generally controls the overall operations of the device 900, such as those associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 902 may include one or more processors 918 to execute instructions to complete all or part of the steps of the above method. Additionally, processing component 902 may include one or more modules that facilitate interaction between processing component 902 and other components. For example, processing component 902 may include a multimedia module to facilitate interaction between multimedia component 908 and processing component 902 .

存储器904被配置为存储各种类型的数据以支持在装置900的操作。这些数据的示例包括用于在装置900上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器904可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。The memory 904 is configured to store various types of data to support operations at the device 900 . Examples of such data include instructions for any application or method operating on device 900, contact data, phonebook data, messages, pictures, videos, and the like. The memory 904 can be implemented by any type of volatile or non-volatile memory device or their combination, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.

电源组件906为装置900的各种组件提供电力。电源组件906可以包括电源管理系统,一个或多个电源,及其他与为装置900生成、管理和分配电力相关联的组件。The power supply component 906 provides power to the various components of the device 900 . Power components 906 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for device 900 .

多媒体组件908包括在所述装置900和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件908包括一个前置摄像头和/或后置摄像头。当装置900处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。The multimedia component 908 includes a screen that provides an output interface between the device 900 and the user. In some embodiments, the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may not only sense a boundary of a touch or swipe action, but also detect duration and pressure associated with the touch or swipe action. In some embodiments, the multimedia component 908 includes a front camera and/or a rear camera. When the device 900 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capability.

音频组件910被配置为输出和/或输入音频信号。例如,音频组件910包括一个麦克风(MIC),当装置900处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器904或经由通信组件916发送。在一些实施例中,音频组件910还包括一个扬声器,用于输出音频信号。The audio component 910 is configured to output and/or input audio signals. For example, the audio component 910 includes a microphone (MIC) configured to receive external audio signals when the device 900 is in operation modes, such as call mode, recording mode and voice recognition mode. Received audio signals may be further stored in memory 904 or sent via communication component 916 . In some embodiments, the audio component 910 also includes a speaker for outputting audio signals.

I/O接口912为处理组件902和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。The I/O interface 912 provides an interface between the processing component 902 and a peripheral interface module. The peripheral interface module may be a keyboard, a click wheel, a button, and the like. These buttons may include, but are not limited to: a home button, volume buttons, start button, and lock button.

传感器组件914包括一个或多个传感器,用于为装置900提供各个方面的状态评估。例如,传感器组件914可以检测到装置900的打开/关闭状态,组件的相对定位,例如所述组件为装置900的显示器和小键盘,传感器组件914还可以检测装置900或装置900一个组件的位置改变,用户与装置900接触的存在或不存在,装置900方位或加速/减速和装置900的温度变化。传感器组件914可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件914还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件914还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。Sensor assembly 914 includes one or more sensors for providing status assessments of various aspects of device 900 . For example, the sensor component 914 can detect the open/closed state of the device 900, the relative positioning of components, such as the display and keypad of the device 900, and the sensor component 914 can also detect a change in the position of the device 900 or a component of the device 900 , the presence or absence of user contact with the device 900 , the device 900 orientation or acceleration/deceleration and the temperature change of the device 900 . Sensor assembly 914 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact. Sensor assembly 914 may also include an optical sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor component 914 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor or a temperature sensor.

通信组件916被配置为便于装置900和其他设备之间有线或无线方式的通信。装置900可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件916经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件916还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。The communication component 916 is configured to facilitate wired or wireless communication between the apparatus 900 and other devices. The device 900 can access wireless networks based on communication standards, such as WiFi, 2G or 3G, or a combination thereof. In one exemplary embodiment, the communication component 916 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 916 also includes a near field communication (NFC) module to facilitate short-range communication. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wide Band (UWB) technology, Bluetooth (BT) technology and other technologies.

在示例性实施例中,装置900可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。In an exemplary embodiment, apparatus 900 may be programmed by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation for performing the methods described above.

在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器904,上述指令可由装置900的处理器918执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。In an exemplary embodiment, there is also provided a non-transitory computer-readable storage medium including instructions, such as the memory 904 including instructions, which can be executed by the processor 918 of the device 900 to implement the above method. For example, the non-transitory computer readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.

应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。It should be understood that the present disclosure is not limited to the precise constructions which have been described above and shown in the drawings, and various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (24)

1. a kind of method for information display, it is characterised in that methods described includes:
The first kind verification operation for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism is received, N >=2, the checking entrance of the first kind verification operation is the checking entrance of dominant prompting;
When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for original The beginning information content is pretended;
The Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received, the Equations of The Second Kind verification operation is recessiveness Verification operation;
When the Equations of The Second Kind verification operation is verified, the original information content is shown.
2. according to the method described in claim 1, it is characterised in that described to receive for being verified to n-th layer authentication mechanism Equations of The Second Kind verification operation, including:
The recessive verification operation for being verified to n-th layer authentication mechanism is received, using the recessive verification operation as described Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation is the checking entrance of non-dominant prompting.
3. method according to claim 2, it is characterised in that the reception is used for what is verified to n-th layer authentication mechanism Recessive verification operation, including:
Default shake operation is received by sensor, the default shake operation is regard as the recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, the default gesture operation is regard as the recessive verification operation;
And/or,
Default voice messaging is received by microphone, the default voice messaging is regard as the recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, using the button operation of the default rule as The recessive verification operation;
And/or,
Default tap is received by the touch-screen to operate, and regard the default percussion operation as the recessive verification operation.
4. according to the method described in claim 1, it is characterised in that described when the first kind verification operation is verified, The display camouflage information content, including:
When the first kind verification operation in preceding n-1 layers of authentication mechanism corresponding to i-th layer of authentication mechanism is verified, show Show the camouflage information content corresponding with i-th layer of authentication mechanism, 1≤i≤n-1.
5. according to any described method of Claims 1-4, it is characterised in that methods described also includes:
Obtain the display duration of the original information content;Detect whether the display duration got exceedes scheduled duration; If the display duration exceedes the scheduled duration, the n-layer authentication mechanism is reactivated;
And/or,
If when showing the original information content, receiving the trigger signal for interrupting display, then the n-layer checking is reactivated Mechanism.
6. a kind of information concealing method, it is characterised in that methods described includes:
The preceding n-1 layers of authentication mechanism verified by first kind verification operation, the checking of the first kind verification operation are set Entrance is the checking entrance of dominant prompting, n >=2;
The n-th layer authentication mechanism verified by Equations of The Second Kind verification operation is set, and the Equations of The Second Kind verification operation is tested for recessiveness Card operation;
Preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism are set with the camouflage information content, the camouflage information is used in institute Shown when n-1 layers of authentication mechanism are verified before stating, the camouflage information content is used to carry out puppet to original information content Dress.
7. method according to claim 6, it is characterised in that the setting is verified by Equations of The Second Kind verification operation N-th layer authentication mechanism, including:
The n-th layer authentication mechanism verified by recessive verification operation is set, the recessive verification operation is regard as described the Two class verification operations, the checking entrance of the recessive verification operation is the checking entrance of non-dominant prompting.
8. method according to claim 7, it is characterised in that the recessive verification operation includes:It is default shake operation, pre- If at least one of gesture operation, default voice messaging, the button operation of default rule and default percussion operation.
9. method according to claim 6, it is characterised in that the preceding n-1 layers of checking in the n-layer authentication mechanism Mechanism sets the camouflage information content, including:
The camouflage information content of the i-th layer of authentication mechanism corresponded in the preceding n-1 layers of authentication mechanism, 1≤i≤n- are set respectively 1。
10. method according to claim 9, it is characterised in that described set respectively corresponds to the preceding n-1 layers of verification machine The camouflage information content of i-th layer of authentication mechanism in system, including:
The information content of system default is obtained, using the described information content got as corresponding to i-th layer of authentication mechanism The camouflage information content;
And/or,
Obtain the sensitive content in the original information content, by the original information content in addition to the sensitive content Content is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
Receive user be the original information content set the information content, using the described information content received as corresponding to The camouflage information content of i-th layer of authentication mechanism.
11. a kind of information display device, it is characterised in that described device includes:
First operation receiving module, being configured as receiving is used for any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism The first kind verification operation verified, n >=2, the checking entrance of the first kind verification operation enters for the checking of dominant prompting Mouthful;
Pretend content display module, be configured as verifying in the first kind for receiving the described first operation receiving module and grasp When being verified, the display camouflage information content, the camouflage information content is used to pretend original information content;
Second operation receiving module, is configured as receiving the Equations of The Second Kind checking behaviour for being used to verify n-th layer authentication mechanism Make, the Equations of The Second Kind verification operation is recessive verification operation;
Original contents display module, is configured as verifying in the Equations of The Second Kind for receiving the described second operation receiving module and grasps When being verified, the original information content is shown.
12. device according to claim 11, it is characterised in that
The second operation receiving module, is configured as receiving the recessive checking behaviour for being used to verify n-th layer authentication mechanism Make, using the recessive verification operation as the Equations of The Second Kind verification operation, the checking entrance of the recessive verification operation is non-aobvious Property prompting checking entrance.
13. device according to claim 12, it is characterised in that the second operation receiving module, is configured as:
Default shake operation is received by sensor, the default shake operation is regard as the recessive verification operation;
And/or,
Default gesture operation is received by touch-screen, the default gesture operation is regard as the recessive verification operation;
And/or,
Default voice messaging is received by microphone, the default voice messaging is regard as the recessive verification operation;
And/or,
The button operation of default rule is received by physical button or virtual key, using the button operation of the default rule as The recessive verification operation;
And/or,
Default tap is received by the touch-screen to operate, and regard the default percussion operation as the recessive verification operation.
14. device according to claim 11, it is characterised in that
The camouflage content display module, is configured as corresponding in preceding n-1 layers of authentication mechanism the institute of i-th layer of authentication mechanism When stating first kind verification operation and being verified, the camouflage information content corresponding with i-th layer, 1≤i≤n-1 are shown.
15. according to any described device of claim 11 to 14, it is characterised in that described device also includes:
First trigger module, is configured as obtaining the display duration of the original information content;Detect the display got Whether duration exceedes scheduled duration;If the display duration exceedes the scheduled duration, the n-layer verification machine is reactivated System;
And/or,
Second trigger module, if being configured as, when showing the original information content, receiving the trigger signal for interrupting display, Then reactivate the n-layer authentication mechanism.
16. a kind of information concealment device, it is characterised in that described device includes:
Authentication mechanism setup module, is configured as setting the preceding n-1 layers of authentication mechanism verified by first kind verification operation, The checking entrance of the first kind verification operation is the checking entrance of dominant prompting, n >=2;
The authentication mechanism setup module, is additionally configured to set the n-th layer verified by Equations of The Second Kind verification operation to verify Mechanism, the Equations of The Second Kind verification operation is recessive verification operation;
Pretend curriculum offering module, be configured as in the n-layer authentication mechanism to authentication mechanism setup module setting Preceding n-1 layers of authentication mechanism sets the camouflage information content, and the camouflage information is used to be verified in the preceding n-1 layers of authentication mechanism Shi Jinhang shows that the camouflage information content is used to pretend original information content.
17. device according to claim 16, it is characterised in that
The authentication mechanism setup module, is additionally configured to set the n-th layer verification machine verified by recessive verification operation System, the recessive verification operation is as the Equations of The Second Kind verification operation, and the checking entrance of the recessive verification operation is non-dominant The checking entrance of prompting.
18. device according to claim 17, it is characterised in that the recessive verification operation includes:Default shake operation, At least one of default gesture operation, default voice messaging, the button operation of default rule and default percussion operation.
19. device according to claim 16, it is characterised in that
The camouflage curriculum offering module, is configured to set i-th layer corresponded in the preceding n-1 layers of authentication mechanism to test The camouflage information content of card mechanism, 1≤i≤n-1.
20. device according to claim 19, it is characterised in that the camouflage curriculum offering module, including:
3rd set submodule, be configured as obtain system default the information content, using the described information content got as Corresponding to the camouflage information content of i-th layer of authentication mechanism;
And/or,
4th sets submodule, is configured as obtaining the sensitive content in the original information content, by the raw information Content in appearance in addition to the sensitive content is used as the camouflage information content corresponding to i-th layer of authentication mechanism;
And/or,
5th sets submodule, and it is the information content that the original information content is set to be configured as receiving user, will be received Described information content be used as the camouflage information content corresponding to i-th layer of authentication mechanism.
21. a kind of information display device, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The first kind verification operation for being verified to any layer in preceding n-1 layers of authentication mechanism in n-layer authentication mechanism is received, N >=2, the checking entrance of the first kind verification operation is the checking entrance of dominant prompting;
When the first kind verification operation is verified, the display camouflage information content, the camouflage information content is used for original The beginning information content is pretended;
The Equations of The Second Kind verification operation for being verified to n-th layer authentication mechanism is received, the Equations of The Second Kind verification operation is recessiveness Verification operation;
When the Equations of The Second Kind verification operation is verified, the original information content is shown.
22. a kind of information concealment device, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
The preceding n-1 layers of authentication mechanism verified by first kind verification operation, the checking of the first kind verification operation are set Entrance is the checking entrance of dominant prompting, n >=2;
The n-th layer authentication mechanism verified by Equations of The Second Kind verification operation is set, and the Equations of The Second Kind verification operation is tested for recessiveness Card operation;
Preceding n-1 layers of authentication mechanism in the n-layer authentication mechanism are set with the camouflage information content, the camouflage information is used in institute Shown when n-1 layers of authentication mechanism are verified before stating.
23. be stored with computer program, its feature on a kind of computer-readable recording medium, the computer-readable recording medium It is, the computer program realizes method for information display as claimed in claim 1 when being executed by processor.
24. be stored with computer program, its feature on a kind of computer-readable recording medium, the computer-readable recording medium It is, the computer program realizes information concealing method as claimed in claim 6 when being executed by processor.
CN201410429501.1A 2014-08-27 2014-08-27 Method for information display, information concealing method and device Expired - Fee Related CN104219053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410429501.1A CN104219053B (en) 2014-08-27 2014-08-27 Method for information display, information concealing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410429501.1A CN104219053B (en) 2014-08-27 2014-08-27 Method for information display, information concealing method and device

Publications (2)

Publication Number Publication Date
CN104219053A CN104219053A (en) 2014-12-17
CN104219053B true CN104219053B (en) 2017-11-07

Family

ID=52100217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410429501.1A Expired - Fee Related CN104219053B (en) 2014-08-27 2014-08-27 Method for information display, information concealing method and device

Country Status (1)

Country Link
CN (1) CN104219053B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017028141A1 (en) * 2015-08-16 2017-02-23 张焰焰 Method and mobile terminal for logging in to account
CN106897873A (en) * 2015-12-21 2017-06-27 阿里巴巴集团控股有限公司 A kind of frame display methods and device
CN111738715B (en) * 2015-12-21 2024-06-18 创新先进技术有限公司 Payment code payment method and device
CN105933503B (en) * 2016-03-29 2020-02-21 联想(北京)有限公司 Information processing method and electronic equipment
CN113434899A (en) * 2016-03-30 2021-09-24 创新先进技术有限公司 Method and terminal for displaying private information
CN107635052A (en) * 2016-07-18 2018-01-26 中兴通讯股份有限公司 Message processing method and device
CN107644333A (en) * 2016-07-22 2018-01-30 展讯通信(上海)有限公司 Barcode scanning method of payment, device and payment terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370209A (en) * 2008-09-22 2009-02-18 深圳华为通信技术有限公司 Information disguising method and system
CN103559451A (en) * 2013-10-21 2014-02-05 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting and displaying privacy information
CN103888607A (en) * 2014-03-13 2014-06-25 惠州Tcl移动通信有限公司 Method and system for viewing privacy short message services of mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499905A (en) * 2008-02-02 2009-08-05 诚实科技股份有限公司 Image password authentication system and method for mobile device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370209A (en) * 2008-09-22 2009-02-18 深圳华为通信技术有限公司 Information disguising method and system
CN103559451A (en) * 2013-10-21 2014-02-05 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting and displaying privacy information
CN103888607A (en) * 2014-03-13 2014-06-25 惠州Tcl移动通信有限公司 Method and system for viewing privacy short message services of mobile terminal

Also Published As

Publication number Publication date
CN104219053A (en) 2014-12-17

Similar Documents

Publication Publication Date Title
CN104219053B (en) Method for information display, information concealing method and device
WO2016107030A1 (en) Notification information display method and apparatus
WO2017031888A1 (en) Fingerprint recognition method and device
EP2709031A1 (en) Gesture- and expression-based authentication
CN106156561B (en) Application locking method, application unlocking method and device
CN106020587A (en) Method and device for message display
CN108319832A (en) Unlocking method and device
CN106023370A (en) Unlocking method and device for NFC equipment
WO2015165172A1 (en) Information transmission method and device in voice service
CN106557679A (en) Terminal control method and device
CN107783715A (en) Using startup method and device
CN106295294A (en) Method for controlling mobile terminal and device
CN106529277A (en) Message preview method and device
CN106066763B (en) Terminal unlocking method and device
CN107734178A (en) Presentation of information processing method, device, equipment and storage medium
CN106503537A (en) Verification method and device based on flexible display screen
CN105046127A (en) Encryption and decryption implementation method and device
CN107133551A (en) Fingerprint authentication method and device
CN107423378A (en) Image display method and device
CN106611112A (en) Application program safe processing method, device and equipment
CN106372943A (en) Message processing method and device
CN106406705A (en) A method and a device for information processing in a conversation process
CN107784211A (en) Method of password authentication and device
CN106331337B (en) Method and device for starting terminal peripherals
CN107463809A (en) The display methods and device of application icon

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171107