CN106503498B - Information locking method, information locking device and terminal - Google Patents
Information locking method, information locking device and terminal Download PDFInfo
- Publication number
- CN106503498B CN106503498B CN201610840094.2A CN201610840094A CN106503498B CN 106503498 B CN106503498 B CN 106503498B CN 201610840094 A CN201610840094 A CN 201610840094A CN 106503498 B CN106503498 B CN 106503498B
- Authority
- CN
- China
- Prior art keywords
- information
- locking
- user
- application program
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides an information locking method, an information locking device and a terminal, wherein the information locking method comprises the following steps: selecting target locking information from the information of the application program according to a selection instruction sent by a user; and when a locking instruction is received, locking the target locking information so that a user has the right to operate the target locking information and the right not to operate other unlocked information of the application program. Through the technical scheme of the invention, when the information in the terminal is displayed to other people, the terminal can be operated more conveniently to avoid the privacy information from being read by other people by mistake.
Description
Technical Field
The invention relates to the technical field of terminals, in particular to an information locking method, an information locking device and a terminal.
Background
A large number of pictures can be stored in the terminal, when a user displays part of the pictures to other people, other people do not know the range of the pictures to be seen, and when the user turns over the pictures, the user often mistakenly sees privacy pictures except the pictures to be displayed.
In the related art, the following three schemes are generally used to present the pictures to others, i.e. firstly, an album folder is re-established at the existing album position, and the pictures to be presented to the user are transferred to the newly-established folder. 2. A private album is additionally created in the dual system. However, the above two schemes require the user to manually create a folder or an album and perform image transfer, which is very troublesome to operate. 3. And downloading a third-party application program special for transferring pictures, wherein the scheme for downloading the third-party application program occupies the internal memory of the terminal.
Therefore, when displaying the picture in the terminal to others, how to more conveniently operate the picture to prevent the private picture from being read by others becomes a technical problem to be solved urgently.
Disclosure of Invention
Based on the above problems, the present invention provides a new technical solution, which can more conveniently operate the picture to prevent the privacy picture from being mistakenly read by others when the picture in the terminal is displayed to others.
In view of this, a first aspect of the present invention provides an information locking method, including: selecting target locking information from the information of the application program according to a selection instruction sent by a user; and when a locking instruction is received, locking the target locking information so that a user has the right to operate the target locking information and the right not to operate other unlocked information of the application program.
In the technical scheme, a user can lock target locking information (such as unimportant information) according to own requirements, so that the user can only operate the target locking information and cannot operate other unlocked information (such as important privacy information). Therefore, according to the technical scheme, when the information in the terminal is displayed to other people, the information can be locked, the situation that the unlocked privacy information is read by other people by mistake can be effectively avoided, and therefore the safety of the information in the terminal is guaranteed. In addition, information can be conveniently displayed to other people without a third-party application program, and the third-party application program is prevented from occupying the memory of the terminal.
In the foregoing technical solution, preferably, the step of locking the target locking information specifically includes: hiding the other information; or display the other information in a preview manner.
In the technical scheme, other unlocked information can be hidden, and other information can be displayed in a preview mode, but a user does not have the authority of operating other information, so that the other information is effectively prevented from being stolen by others, and the safety of the information in the terminal is ensured.
In any of the above technical solutions, preferably, the right that the user has to operate the target locking information includes a combination of one or more of the following: viewing authority, editing authority, and deleting authority.
In the technical scheme, after the target locking information is locked, the user only has the right of viewing, but does not have the right of editing and deleting, and certainly, the user can have the right of viewing, editing and deleting at the same time.
In any of the above technical solutions, preferably, the method further includes: and when an instruction of unlocking is received, unlocking the target locking information so that the user has the authority of operating all information of the application program.
In the technical scheme, the user can unlock the target locking information according to the requirement of the user, so that the information is restored to the original state.
In any one of the above technical solutions, preferably, the information of the application includes: pictures and videos in an album, or notification messages received by the application program.
A second aspect of the present invention provides an information locking apparatus, including: the selection unit is used for selecting target locking information from the information of the application program according to a selection instruction sent by a user; and the locking unit is used for locking the target locking information when a locking instruction is received so that a user has the authority of operating the target locking information and the authority of other unlocked information which is not used for operating the application program.
In the technical scheme, a user can lock target locking information (such as unimportant information) according to own requirements, so that the user can only operate the target locking information and cannot operate other unlocked information (such as important privacy information). Therefore, according to the technical scheme, when the information in the terminal is displayed to other people, the information can be locked, the situation that the unlocked privacy information is read by other people by mistake can be effectively avoided, and therefore the safety of the information in the terminal is guaranteed. In addition, information can be conveniently displayed to other people without a third-party application program, and the third-party application program is prevented from occupying the memory of the terminal.
In the above technical solution, preferably, the locking unit includes: a hiding subunit, configured to hide the other information; or a display subunit, configured to display the other information in a preview manner.
In the technical scheme, other unlocked information can be hidden, and other information can be displayed in a preview mode, but a user does not have the authority of operating other information, so that the other information is effectively prevented from being stolen by others, and the safety of the information in the terminal is ensured.
In any of the above technical solutions, preferably, the right that the user has to operate the target locking information includes a combination of one or more of the following: viewing authority, editing authority, and deleting authority.
In the technical scheme, after the target locking information is locked, the user only has the permission to view, but not has the permission to edit and delete, and certainly, the user can have the permission to view, edit and delete at the same time.
In any of the above technical solutions, preferably, the method further includes: and the unlocking unit is used for unlocking the target locking information when receiving an unlocking instruction so that a user has the authority of operating all information of the application program.
In the technical scheme, the user can unlock the target locking information according to the requirement of the user, so that the information is restored to the original state.
In any one of the above technical solutions, preferably, the information of the application includes: pictures and videos in an album, or notification messages received by the application program.
A third aspect of the present invention provides a terminal, including the information locking apparatus according to any one of the above technical solutions, so that the terminal has the same technical effects as the information locking apparatus according to any one of the above technical solutions, and details thereof are not repeated herein.
Through the technical scheme of the invention, when the information in the terminal is displayed to other people, the terminal can be operated more conveniently to avoid the privacy information from being read by other people by mistake.
Drawings
FIG. 1 shows a flow diagram of an information locking method according to one embodiment of the invention;
FIG. 2 is a flow diagram illustrating an information locking method according to another embodiment of the invention;
FIG. 3 is a schematic structural diagram of an information locking apparatus according to an embodiment of the present invention;
fig. 4 shows a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 5 shows a schematic configuration diagram of a terminal according to another embodiment of the present invention.
Detailed Description
So that the manner in which the above recited objects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
FIG. 1 is a flow chart illustrating an information locking method according to an embodiment of the invention.
As shown in fig. 1, an information locking method according to an embodiment of the present invention includes:
and 102, selecting target locking information from the information of the application program according to a selection instruction sent by a user.
The target locking information can be directly selected from the information according to the selection instruction. And screening the information of the application program according to the selection condition input by the user so as to select the target locking information.
For example, a target lock picture may be selected directly in the album. And according to selection conditions (time and place) input by the user, selecting target locking conditions which meet the selection conditions in the album.
And 104, when a locking instruction is received, locking the target locking information so that a user has the right to operate the target locking information and the right not to operate other unlocked information of the application program.
In the technical scheme, a user can lock target locking information (such as unimportant information) according to own requirements, so that the user can only operate the target locking information and cannot operate other unlocked information (such as important privacy information). Therefore, according to the technical scheme, when the information in the terminal is displayed to other people, the information can be locked, so that the situation that the privacy information which is not locked is read by other people can be effectively avoided, and the safety of the information in the terminal is ensured. In addition, information can be conveniently displayed to other people without a third-party application program, and the third-party application program is prevented from occupying the memory of the terminal.
In the foregoing technical solution, preferably, the step of locking the target locking information specifically includes: hiding the other information; or display the other information in a preview manner.
In the technical scheme, other unlocked information can be hidden, and other information can be displayed in a preview mode, but a user does not have the authority of operating other information, so that the other information is effectively prevented from being stolen by others, and the safety of the information in the terminal is ensured.
For example, some pictures in the album are locked, other pictures are hidden, or other pictures are displayed in a thumbnail manner, wherein when other pictures are displayed in a thumbnail manner, the other pictures cannot be viewed by the user.
For another example, the information sent by two friends, namely "Li Ming" and "zhangli", in the WeChat is locked, and the information sent by other friends or the public number is hidden or displayed in a preview manner. When the information sent by other friends or the public account is displayed in a preview mode, the user cannot view the specific content of the information sent by other friends or the public account.
In any of the above technical solutions, preferably, the right that the user has to operate the target locking information includes a combination of one or more of the following: viewing authority, editing authority, and deleting authority.
In the technical scheme, after the target locking information is locked, the user only has the right of viewing, but does not have the right of editing and deleting, and certainly, the user can have the right of viewing, editing and deleting at the same time.
For example, after locking a part of pictures in an album, the unlocked pictures are displayed in a thumbnail mode, the locked pictures can be viewed, edited and deleted by a user, and the unlocked pictures cannot be viewed, edited and deleted by the user.
For another example, a message sent by "Li Ming" in the QQ is locked, only a message sent by "Li Ming" is displayed in a message interface of the QQ, messages sent by other buddies are not displayed, and a user can only view details of a message sent by "Li Ming", and cannot delete or send a message sent by "Li Ming" to "Li Ming".
In any of the above technical solutions, preferably, the method further includes: and when an unlocking instruction is received, unlocking the target locking information so that a user has the authority of operating all information of the application program.
In the technical scheme, the user can unlock the target locking information according to the requirement of the user, so that the information is restored to the original state.
For example, when a user shows a picture in an album to others, the target picture in the album is locked, and other pictures in the album are hidden, so that the picture is only shown to others, when the user finishes showing the picture in the album to others, the locking of the target picture is released, all the pictures in the album are shown at the moment, and the user can operate all the pictures in the album.
Preferably, before the target locking information is unlocked, the user who sends the instruction for unlocking is authenticated, if the authentication is successful, the target locking information is unlocked, and if the authentication is failed, the target locking information is kept in a locked state.
Wherein, the authentication can be carried out through passwords, fingerprint information, iris information, voice information and face information.
In any one of the above technical solutions, preferably, the information of the application includes: pictures and videos in an album, or notification messages received by the application program.
Fig. 2 is a flowchart illustrating an information locking method according to another embodiment of the present invention.
As shown in fig. 2, an information locking method according to another embodiment of the present invention includes:
In step 204, the number and range of the pictures to be displayed are determined, so as to select the pictures to be displayed in the album (namely the target locking information). The range of the pictures comprises videos and photos shot by a camera, the selected pictures to be displayed can be one or more than one picture, the pictures to be displayed are individually locked or locked in batch, and the mode is not limited.
And step 206, locking the picture to be displayed. There are two schemes for locking, scheme one: the picture which needs to be displayed is locked, meanwhile, the picture which is not locked is not hidden, but the picture which is not locked is displayed in a thumbnail mode, and a user cannot perform any operations of amplifying, viewing, editing and deleting on the picture which is not locked. Scheme two is as follows: when the pictures to be displayed are locked, the pictures which are not locked are hidden, namely, only the locked pictures are displayed, and the user only has viewing permission (turning, browsing, carousel, scrolling and the like) for the locked pictures and does not have editing and deleting permission.
And step 208, unlocking the picture. The locking can be released by inputting a password, a fingerprint and the like.
And step 210, displaying all pictures in the album, wherein the user can view, change and delete the pictures. If the locking is performed by the first scheme, the thumbnail images which are not locked in the album can be operated after the locking is released. And if the picture is locked by the scheme II, the hidden picture is redisplayed, and the permission of the user for viewing, editing and deleting the picture in the album is restored. In the above scheme, all the pictures in the album can be hidden, but the user needs to set a fingerprint, a password and the like to operate the album.
Fig. 3 is a schematic structural diagram of an information locking apparatus according to an embodiment of the present invention.
As shown in fig. 3, an information locking apparatus 300 according to an embodiment of the present invention includes: a selection unit 302 and a locking unit 304.
A selecting unit 302, configured to select target locking information from information of the application program according to a selection instruction issued by a user.
A locking unit 304, configured to lock the target locking information when receiving a locking instruction, so that a user has a right to operate the target locking information and a right to operate other unlocked information of the application program.
In the technical scheme, the user can lock the target locking information (such as unimportant information) according to the requirement of the user, so that the user can only operate the target locking information and cannot operate other unlocked information (such as important privacy information). Therefore, according to the technical scheme, when the information in the terminal is displayed to other people, the information can be locked, so that the situation that the privacy information which is not locked is read by other people can be effectively avoided, and the safety of the information in the terminal is ensured. In addition, information can be conveniently displayed to other people without a third-party application program, and the third-party application program is prevented from occupying the memory of the terminal.
In the above technical solution, preferably, the locking unit 304 includes: a hiding subunit 3042 configured to hide the other information; or a display subunit 3044, configured to display the other information in a preview manner.
In the technical scheme, other unlocked information can be hidden, and other information can be displayed in a preview mode, but a user does not have the authority of operating other information, so that the other information is effectively prevented from being stolen by others, and the safety of the information in the terminal is ensured.
For example, some pictures in the album are locked, other pictures are hidden, or other pictures are displayed in a thumbnail manner, wherein the other pictures are not viewed by the user when the other pictures are displayed in the thumbnail manner.
For another example, the information sent by two friends, namely "Li Ming" and "zhangli", in the WeChat is locked, and the information sent by other friends or the public number is hidden or displayed in a preview manner. When the information sent by other friends or the public account is displayed in a preview mode, the user cannot view the specific content of the information sent by other friends or the public account.
In any of the above technical solutions, preferably, the right that the user has to operate the target locking information includes a combination of one or more of the following: viewing authority, editing authority, and deleting authority.
In the technical scheme, after the target locking information is locked, the user only has the permission to view, but not has the permission to edit and delete, and certainly, the user can have the permission to view, edit and delete at the same time.
For example, after locking a part of pictures in an album, the unlocked pictures are displayed in a thumbnail mode, the locked pictures can be viewed, edited and deleted by a user, and the unlocked pictures cannot be viewed, edited and deleted by the user.
For another example, a message sent by "Li Ming" in the QQ is locked, only a message sent by "Li Ming" is displayed in a message interface of the QQ, messages sent by other buddies are not displayed, and a user can only view details of a message sent by "Li Ming", and cannot delete or send a message sent by "Li Ming" to "Li Ming".
In any of the above technical solutions, preferably, the information locking device 300 further includes: an unlocking unit 306, configured to, upon receiving an instruction to unlock, unlock the target lock information, so that the user has a right to operate all information of the application program.
In the technical scheme, the user can unlock the target locking information according to the requirement of the user, so that the information is restored to the original state.
For example, when a user shows a picture in an album to others, the target picture in the album is locked, and other pictures in the album are hidden, so that the picture is only shown to others, when the user finishes showing the picture in the album to others, the locking of the target picture is released, all the pictures in the album are shown at the moment, and the user can operate all the pictures in the album.
Preferably, before the target locking information is unlocked, the user who sends the instruction for unlocking is authenticated, if the authentication is successful, the target locking information is unlocked, and if the authentication is failed, the target locking information is kept in a locked state.
Wherein, the authentication can be carried out through passwords, fingerprint information, iris information, voice information and face information.
In any one of the above technical solutions, preferably, the information of the application includes: pictures and videos in an album, or notification messages received by the application program.
Fig. 4 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
As shown in fig. 4, a terminal 400 according to an embodiment of the present invention includes the information locking apparatus 300 according to any one of the above technical solutions, and therefore, the terminal 400 has the same technical effects as the information locking apparatus 300 according to any one of the above technical solutions, and is not described herein again.
Fig. 5 shows a schematic configuration diagram of a terminal according to another embodiment of the present invention.
As shown in fig. 5, a terminal 500 according to another embodiment of the present invention includes a memory 502, a processor 504, and a communication bus 506. The communication bus 506 is used to enable communications between the processor 504 and the memory 502. The Memory 502 may be a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The processor 504 includes a Central Processing Unit (CPU). Wherein the instructions stored in the memory 502 are called to cause the processor 504 to perform the following steps: selecting target locking information from the information of the application program according to a selection instruction sent by a user; and when a locking instruction is received, locking the target locking information so that a user has the right to operate the target locking information and the right not to operate other unlocked information of the application program.
Preferably, the processor 504 is specifically configured to hide the other information; or display the other information in a preview manner.
Preferably, the authority that the user has to operate the target locking information includes a combination of one or more of: viewing authority, editing authority, and deleting authority.
Preferably, the processor 504 is further configured to unlock the target lock information when receiving an instruction to unlock, so that a user has a right to operate all information of the application program.
Preferably, the information of the application program includes: pictures and videos in an album, or notification messages received by the application program.
The technical scheme of the invention is described in detail in the above with reference to the attached drawings, and by the technical scheme of the invention, when the information in the terminal is displayed to others, the terminal can be operated more conveniently to avoid the privacy information from being read by others by mistake.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (9)
1. An information locking method, comprising:
selecting target locking information from the information of the application program according to a selection instruction sent by a user;
when a locking instruction is received, locking the target locking information so that a user has the right to operate the target locking information and the right not to operate other unlocked information of the application program;
the step of locking the target locking information specifically includes:
hiding the other information; or
And displaying the other information in a preview mode.
2. The method of claim 1, wherein the user having the right to manipulate the target lock information comprises a combination of one or more of: viewing authority, editing authority, and deleting authority.
3. The information locking method according to claim 1, further comprising:
and when an unlocking instruction is received, unlocking the target locking information so that a user has the authority of operating all information of the application program.
4. The information locking method according to any one of claims 1 to 3,
the information of the application program comprises: pictures and videos in an album, or notification messages received by the application program.
5. An information locking device, comprising:
the selection unit is used for selecting target locking information from the information of the application program according to a selection instruction sent by a user;
the locking unit is used for locking the target locking information when a locking instruction is received so that a user has the authority of operating the target locking information and the authority of other unlocked information which does not operate the application program;
the locking unit includes:
a hiding subunit, configured to hide the other information; or
And the display subunit is used for displaying the other information in a preview mode.
6. The information locking apparatus of claim 5, wherein the user having the right to operate the target locking information comprises a combination of one or more of: viewing authority, editing authority, and deleting authority.
7. The information locking apparatus according to claim 5, further comprising:
and the unlocking unit is used for unlocking the target locking information when receiving an unlocking instruction so that a user has the authority of operating all information of the application program.
8. The information locking device according to any one of claims 5 to 7,
the information of the application program comprises: pictures and videos in an album, or notification messages received by the application program.
9. A terminal, comprising: the information locking apparatus according to any one of claims 5 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610840094.2A CN106503498B (en) | 2016-09-22 | 2016-09-22 | Information locking method, information locking device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610840094.2A CN106503498B (en) | 2016-09-22 | 2016-09-22 | Information locking method, information locking device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106503498A CN106503498A (en) | 2017-03-15 |
CN106503498B true CN106503498B (en) | 2022-12-20 |
Family
ID=58290925
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610840094.2A Active CN106503498B (en) | 2016-09-22 | 2016-09-22 | Information locking method, information locking device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106503498B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107025410A (en) * | 2017-03-17 | 2017-08-08 | 北京珠穆朗玛移动通信有限公司 | Image display method and electronic installation |
CN109325007B (en) * | 2018-10-16 | 2021-07-23 | 上海星佑网络科技有限公司 | Recording locking method and apparatus, and computer-readable storage medium |
CN110490001B (en) * | 2019-08-26 | 2023-05-16 | 西安闻泰电子科技有限公司 | Method, device, equipment and storage medium for viewing image |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187599A (en) * | 2015-08-27 | 2015-12-23 | 魅族科技(中国)有限公司 | Contact person information management method and terminal |
CN105791282A (en) * | 2016-02-29 | 2016-07-20 | 宇龙计算机通信科技(深圳)有限公司 | Private information protection method, mobile terminal and wearable device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105009553B (en) * | 2012-12-14 | 2018-03-06 | 日本电气株式会社 | information terminal device, information terminal control method |
-
2016
- 2016-09-22 CN CN201610840094.2A patent/CN106503498B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187599A (en) * | 2015-08-27 | 2015-12-23 | 魅族科技(中国)有限公司 | Contact person information management method and terminal |
CN105791282A (en) * | 2016-02-29 | 2016-07-20 | 宇龙计算机通信科技(深圳)有限公司 | Private information protection method, mobile terminal and wearable device |
Non-Patent Citations (1)
Title |
---|
对于计算机数据库安全管理的分析与探讨;张哲;《网络安全技术与应用》;20131215(第12期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN106503498A (en) | 2017-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11882221B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
US20150007351A1 (en) | Mobile Messaging Enhanced with Concealable and Selectively Revealable Text, Image, and Video Messages | |
US9990513B2 (en) | System and method of applying adaptive privacy controls to lossy file types | |
EP3314825B1 (en) | Method and system for sender-controlled messaging and content sharing | |
US10374991B2 (en) | Approach for sharing electronic documents during electronic meetings | |
CN104253933A (en) | Shooting method and device | |
KR101835981B1 (en) | Method and system for data management | |
US10484452B2 (en) | Approach for sharing electronic documents during electronic meetings | |
CN106503498B (en) | Information locking method, information locking device and terminal | |
US20050021618A1 (en) | Network information processing system, information providing management apparatus, information processing apparatus, and information processing method | |
KR101867326B1 (en) | Method and system for providing social media using partition function | |
JP2023036822A (en) | System and method for providing user account through which user can operate computing device | |
US20160044044A1 (en) | Information processing apparatus, method for controlling information processing apparatus, and storage medium | |
CN104102883A (en) | Display method and device | |
JP2009294746A (en) | Authentication system, authentication method, and authentication program | |
JP2020140735A (en) | Apparatus and method for camera-based user authentication for content access | |
US20160294787A1 (en) | Secure and confidential messaging systems | |
CN107025410A (en) | Image display method and electronic installation | |
JP6164954B2 (en) | Authentication server, authentication method, and program | |
KR20190026550A (en) | Method and system for providing social media using partition function | |
CN113268775B (en) | Photo processing method, device and system and computer readable storage medium | |
CN106446637B (en) | Electronic device and operation method thereof | |
KR20140139704A (en) | User terminal, method for protecting private information in user terminal, computer readable medium and transmission device thereof | |
CN118673509A (en) | Encryption method and device, electronic equipment and storage medium | |
WO2016195060A1 (en) | Image processing system, server device, method for controlling server device, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |