G06F21/84

System and method for automatically masking confidential information that is input on a webpage

A method for recording input text that is input in an input field of a webpage, the method comprising: providing the webpage to a client device, by processing circuitry, the webpage comprising: (a) the input field, and (b) instructions executable by web-accessing software for recording the input text; and wherein execution of the instructions results in: identification of masking information in the input text, if any, the masking information being information in the input text to be masked; and if the masking information is identified, masking of the masking information prior to the recording of the input text, so that the masking information is masked when recorded.

IRIS AUTHENTICATION METHOD AND DEVICE USING DISPLAY INFORMATION

An electronic device for performing iris authentication, according to various examples of the present invention, can comprise: an image sensor for outputting an image obtained by photographing an eye part; a display for displaying an iris authentication screen image; and a control unit detecting at least a partial region from the captured eye part image so as to perform iris authentication by adjusting display characteristics of the display on the basis of a result obtained by comparing the size of the detected region with the size of a region required for the iris authentication, and various examples are possible.

Interaction method and apparatus

An interaction method includes receiving a service request from a client application (CA) installed on a terminal and that runs in a rich execution environment (REE), determining a trusted user interface (TUI) identifier, sending a TUI call instruction carrying the TUI identifier to a trusted execution environment (TEE) to instruct to draw an image based on the TUI template or the TUI function component to call a TUI to display the drawn image, receiving response information from the TEE, and executing a corresponding service procedure based on the response information.

BANNER NOTIFICATION IN LOCKED HOST MONITOR

Aspects of the disclosure relates to systems and methods for locking a display device of a host computer remotely using a management controller, and providing a banner notification on the locked display device. The system includes a computing device as the host computer, which has a display device, and a management controller. When the management controller receives a locking command, the management controller, in response to the locking command, performs the following operations: generating a locking instruction, and sending the locking instruction to the computing device to lock the display device; and generating a message display instruction including a message to be displayed, and sending the message display instruction to the display device of the computing device, in order to display the message on the display device. Thus, a local user at the computing device may be notified by the message that the display device is locked.

BANNER NOTIFICATION IN LOCKED HOST MONITOR

Aspects of the disclosure relates to systems and methods for locking a display device of a host computer remotely using a management controller, and providing a banner notification on the locked display device. The system includes a computing device as the host computer, which has a display device, and a management controller. When the management controller receives a locking command, the management controller, in response to the locking command, performs the following operations: generating a locking instruction, and sending the locking instruction to the computing device to lock the display device; and generating a message display instruction including a message to be displayed, and sending the message display instruction to the display device of the computing device, in order to display the message on the display device. Thus, a local user at the computing device may be notified by the message that the display device is locked.

PERSONAL CONTENT MANAGED DURING EXTENDED DISPLAY SCREEN RECORDING

In aspects of personal content managed during extended display screen recording, a screen recording system includes a wireless device that provides digital image content for display on an extended display device, and a screen recording session on the wireless device captures the digital image content and audio data. The wireless device implements a content control module that can determine the screen recording session would capture personal content associated with a user of the wireless device. The content control module can initiate a private screen review mode in which the personal content is displayable on a display screen of the wireless device and is prevented from visual display on the extended display device. The content control module can also generate a shareable screen recording that includes the audio data and the digital image content displayed on the extended display device, without including the personal content.

CONTROL SERVER, DATA SHARING SYSTEM, AND CONTROL PROGRAM

Upon receiving a usage request that includes a file identifier and a version identifier from a user terminal 20, a control server 10 transmits a file request that is based on the usage request to a file management system, and transmits a permission information request that is based on the usage request to a distributed ledger system. Upon receiving the file request, the file management system acquires the file that corresponds to the combination of the file identifier and the version identifier and transmits the file to the control server 10. Upon receiving the permission information request, the distributed ledger system acquires permission information that corresponds to the combination of the file identifier and the version identifier from a distributed ledger, and transmits the permission information to the control server 10. The control server 10 transmits the file to the user terminal 20 if the user of the user terminal has viewing permission based on the permission information.

Display control method and device
11567637 · 2023-01-31 · ·

Embodiments of this application provide a screen display method and a device after face unlock, and relate to the field of electronic device technologies, so that a lock screen and a desktop can be intuitively displayed after face unlock, to improve interaction efficiency and user experience. Specific solutions are as follows: After head information is successfully verified, an electronic device displays a lock screen and a desktop in a superimposition manner, and when a preset condition is met, displays the desktop or a screen corresponding to a control on the desktop or the lock screen. The embodiments of this application are used to display an unlocked screen.

Display control method and device
11567637 · 2023-01-31 · ·

Embodiments of this application provide a screen display method and a device after face unlock, and relate to the field of electronic device technologies, so that a lock screen and a desktop can be intuitively displayed after face unlock, to improve interaction efficiency and user experience. Specific solutions are as follows: After head information is successfully verified, an electronic device displays a lock screen and a desktop in a superimposition manner, and when a preset condition is met, displays the desktop or a screen corresponding to a control on the desktop or the lock screen. The embodiments of this application are used to display an unlocked screen.

METHOD AND ELECTRONIC DEVICE TO PROVIDE PRIVATE INFORMATION IN RESPONSE TO SCREEN EXPANSION
20230025142 · 2023-01-26 ·

According to an example embodiment, an electronic device monitors an occurrence of private information from a connected external device and provides, in an expanded screen region, the private information of the external device from which the private information occurs in response to screen expansion.