Patent classifications
G09G2358/00
Method and apparatus for displaying application interface
The disclosure relates to a method and apparatus for displaying an application interface. The method includes detecting a starting operation over a specified application; in response to detecting the starting operation over the specified application, determining whether the specified application is a secret-related application; when the specified application is determined to be the secret-related application, acquiring an encrypted display manner of the specified application; and sending application interface data and the encrypted display manner of the specified application to a first terminal based on a network connection pre-established with the first terminal, wherein the application interface data is used by the first terminal to generate an application interface of the specified application, and the encrypted display manner is used by the first terminal to display the application interface with an encrypted effect.
INFORMATION PROCESSING METHOD, TERMINAL, DEVICE AND STORAGE MEDIUM
The present disclosure provides a terminal, an information processing method and device, a storage medium, and a processor. The terminal includes: a setting module and a privacy protection module. The setting module is provided with a first-level switch and a second-level switch, under a condition that the first-level switch is turned on, a display mode of the terminal is set to a dual-screen mirror mode, the second-level switch is configured to enable or disable a privacy protection function under the condition that the first-level switch is turned on. The privacy protection module is connected to the second-level switch and configured to protect privacy information in the terminal based on the privacy protection function under a condition that the second-level switch is turned on.
System and method for concealing sensitive data on a computing device
A computer-implemented method may hide sensitive information, such as sensitive information relating to auto, home, life, or renters insurance, banking, and/or vehicle loans. In one aspect, the method may commence or execute an eavesdropper detection functionality or application. The method may also detect an unauthorized viewer or eavesdropper is viewing, or potentially viewing, a display screen associated with the mobile device for more than a threshold duration of at least one second, determine that sensitive or confidential information is being displayed or about to be displayed, on the display screen, and prevent the unauthorized viewer or eavesdropper from viewing the sensitive or confidential information via the display screen to facilitate hiding sensitive or confidential information.
System and method for concealing sensitive data on a computing device
A computer-implemented method may hide sensitive information including when no one is looking at a display screen of a client computing device, such as sensitive information relating to auto, home, life, or renters insurance, banking, and/or vehicle loans. In one aspect, the method may determine that confidential or sensitive information is being displayed on a display screen of a computing device of a user. The method may also collect image data from a front facing camera in communication with the computing device, and determine that zero or two or more people are viewing the display screen for more than a threshold duration of at least one second. The method may further blur or obscure the confidential or sensitive information being displayed on the display screen when it is determined that the zero or two or more people are viewing the display screen for more than the threshold duration.
Method for obtaining biometric information using light source corresponding to biometric information and electronic device thereof
An apparatus and method for obtaining biometric information in an electronic device are provided. The electronic device includes a display comprising one or more pixels, the one or more pixels including a first sub pixel, a second sub pixel, and a third sub pixel, and one or more sensors configured to obtain biometric information about an external object, and a processor. The processor is configured to cause the electronic device to: identify first biometric information and second biometric information from the biometric information, and output light having first properties through a first pixel set corresponding to the first biometric information, and obtain the first biometric information using the one or more sensors, and output light having second properties through a second pixel set corresponding to the second biometric information, and obtain the second biometric information using the one or more sensors.
Collecting fingreprints
The disclosure relates to a method, electronic device, and non-transitory computer-readable medium for collecting fingerprints. The method includes detecting a touch operation on a fingerprint region; when the touch operation on the fingerprint region is detected, detecting a touch signal within the fingerprint region as a first touch signal; comparing the first touch signal with a preset report threshold to obtain a first comparison result; determining whether a fingerprint image on the fingerprint region is acquired based on the first comparison result; when the fingerprint image is acquired, analyzing the fingerprint image to obtain an analysis result; and outputting a prompt based on the analysis result.
RELEVANCY IMPROVEMENT THROUGH TARGETING OF INFORMATION BASED ON DATA GATHERED FROM A NETWORKED DEVICE ASSOCIATED WITH A SECURITY SANDBOX OF A CLIENT DEVICE
A system includes a networked device generating a fingerprint of media data rendered thereon, with the networked device having an identification data associated therewith, and a first set of computer implemented instructions executing to generate content identification data from the fingerprint. The system also includes a second set of computer implemented instructions executing to associate the content identification data with the identification data of the networked device, and associate the identification data of the networked device with an identification data of a user of the networked device involved in an interaction with the networked device. The interaction is associated with the rendering of the media data on the networked device.
Display device, method for operating display device and electronic device
A display device and a method for operating a display device is provided. The display device includes a display panel, a photosensitive image sensor, and a pressure sensing sensor. The display panel includes a display area and has a display side and a back side opposite to the display side. The photosensitive image sensor and the pressure sensing sensor are stacked in the display area of the display panel and are located on the back side of the display panel. The pressure sensing sensor is configured to sense a pressing action on the display side of the display panel. The photosensitive image sensor is configured to detect an image of a texture on the display side of the display panel.
Selective screen sharing
Disclosed are various examples for selective screen sharing. In one example, a computing device determines that a state of a destination device does not satisfy a compliance rule of a management service. The computing device also determines an area to obscure within a video stream using screen-sharing data. The video stream is generated by applying a transformation to a screen capture. The transformation obscures the area within the video stream. The video stream is transmitted to a destination device. In some cases, a user-specified modification to the area is also obtained. The video stream is updated by applying an updated transformation to the screen capture that obscures the updated area within the video stream.
Protection of and access to data on computing devices
Techniques for data sharing between two computing devices are described. In an example, a computer system determines a first presence of a first user relative to a first computing device. The computer system also determines a first identifier of the first user. The first identifier is associated with operating the first computing device. The operating comprises sharing data with a second computing device. The computer system also determines a second presence of a second user relative to the second computing device. The computer system also determines a second identifier of the second user. The second identifier associated with operating the second computing device. The computer system cause the data to be shared with the second computing device based on the first presence, the first identifier, the second presence, and the second identifier.