Interaction method, system, and device for information

ABSTRACT

The present application discloses interaction method, system, and device for information. After recognizing a non-transparent shielding object or a second device, a first device with a light-sensing screen provided in the embodiments of the present application transmits shielded screen information to the second device for processing. One example is that the second device sends an operation instruction to the first device with a light-sensing screen according to a use scenario of a user, to change the screen information stored or/and displayed in the first device with a light-sensing screen. In this way, Interaction for information according to user requirements based on a photosensitive recognition technology between different devices may be implemented according to this application.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a National Phase Entry of PCT InternationalApplication No. PCT/KR2018/015139, which was filed on Nov. 30, 2018, thedisclosure of which is incorporated herein by reference.

BACKGROUND 1. Technical Field

The application relates to computer network technology, and inparticular, to interaction method, system, and device for information.

2. Description of Related Art

With the development of computer technology, information interactionor/and information synchronization may be performed between devices in aplurality of manners, and the devices may be wireless terminals or thelike. At present, methods for information interaction or/and that forinformation synchronization mainly include: bluetooth transmissionbetween devices, transmission between devices through near fieldcommunication (NFC) , transmission between devices through a localnetwork area which consists of the devices, and transmission betweendevices by means of WiFi or a mirror link technology. The mirror linktechnology is combined with a plurality of existing technologies to meetvarious possible internal usage scenarios of an automobile, includingdisplacement of a screen and inputting of user instruction by means ofvirtual network computing, and searching for a corresponding device andcompleting a correct pre-set configuration through universal plug andplay, information interaction such as audio streaming by means ofBluetooth and real time transport protocols. The mirror link technologyalso supports various technologies, such as Bluetooth, HFP and A2DPprotocols, which are used in automobiles currently and usually. That isto say, a device may be connected to an in-vehicle system through auniversal serial bus (USB), Bluetooth or WiFi. And the device maytransmit an operation interface to an in-vehicle screen, to form asimple and clear menu interface on the in-vehicle screen, and the deviceis operated by physical buttons on the in-vehicle system or languagecommands.

In order to obtain desired information from other devices, a devicefirst needs to identify information from the other devices. Theinformation may be identified by a camera recognition technology, a textand number recognition technology or a photosensitive recognitiontechnology. Wherein, information of text and image having a particularattribute, for example, a telephone number, a tracking number, a zipcode, a website address, and a QR code may be recognized through thefile and number recognition technology. A sensor may be implanted underthe screen glass of a screen of a device, which is required in thephotosensitive recognition technology. This type of sensor may capturechanges in light and light waves. Based on the changes in light andlight waves, a blocking relationship between screens of devices orbetween a terminal device and an object may be recognized, andinformation such as the position of the shielded area and the size of ascreen pixel of the screen of the device may be learned, and therebysharing and processing information in the shielded area may be performedthrough the photosensitive recognition technology.

Compared with the camera recognition technology, the photosensitiverecognition technology is performed through obtaining information of adevice by blocking the screen of the device. The operation of therecognition technology is simple, which does not need a user to performtapping into a photographing program step by step to record informationand image. The image shot by a camera is regular, and the screen area ofa device can be blocked by an object of any shape, so that the obtainedshielded area is within a range of irregular shape. This type ofrecognition is freer and more interesting. What is obtained through thephotosensitive recognition technology is direct information data withoutimaging and light interference, and that obtained through the camerarecognition technology is data of physical image format with light andinterference of light and physical space distance.

SUMMARY

However, at present, the photosensitive recognition technology has notbeen applied to information interaction between devices. How toimplement the information interaction between devices based on thephotosensitive recognition technology specifically is a technicalproblem that needs to be solved urgently.

In view of this, an embodiment of the present application provides aninteraction method for information. Information interaction betweendevices based on a photosensitive recognition technology may beimplemented through this method.

An embodiment of the present application further provides an interactionsystem for information. Information interaction between devices based ona photosensitive recognition technology may be implemented through thissystem.

An embodiment of the present application further provides an interactiondevice for information. Information interaction between devices based ona photosensitive recognition technology may be implemented through thisdevice.

According to the foregoing objectives, the present application isimplemented as follows.

An interaction method for information, comprising:

recognizing, by a first device with a light-sensing screen, anon-transparent shielding object or a second device; and

transmitting, by the first device with a light-sensing screen, shieldedscreen information to the second device for processing.

An interaction system for information, wherein the system comprises afirst device with a light-sensing screen and a second device, wherein

the first device with a light-sensing screen is configured to: recognizea non-transparent shielding object or the second device, and transmitshielded screen information to the second device; and

the second device is configured to process the screen information.

An interaction device for information, comprising: an recognition moduleand a transmission module, wherein

the recognition module is configured to recognize a non-transparentshielding object or a second device; and

the transmission module is configured to transmit shielded screeninformation to the second device.

It can be learned from the foregoing solutions that, after recongnizinga non-transparent shielding object or a second device, a first devicewith a light-sensing screen provided in the embodiments of the presentapplication transmits shielded screen information to the second devicefor processing. One example is that the second device sends an operationinstruction to the first device with a light-sensing screen according toa use scenario of a user, to change the screen information stored or/anddisplayed in the first device with a light-sensing screen. In this way,interaction for information according to user requirements based on aphotosensitive recognition technology between different devices may beimplemented in the present application.

An embodiment of the present application provides an interaction methodfor information. Information interaction between devices based on aphotosensitive recognition technology may be implemented.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a flowchart of an interaction method for information accordingto an embodiment of the present application;

FIG. 2 is a schematic diagram of a structural of an interaction systemfor information according to an embodiment of the present application;

FIG. 3 is a schematic diagram of a structural of an interaction device 1for information according to an embodiment of the present application;

FIG. 4 is a schematic diagram of a structural of an interaction device 2for information according to an embodiment of the present application;

FIG. 5 is a schematic diagram of a method for processing performed by aconnection module in a first device having a light-sensing screenaccording to an embodiment of the present application;

FIG. 6 is a flowchart of a method for processing performed by arecognition module in a first device having a light-sensing screenaccording to an embodiment of the present application;

FIG. 7 is a flowchart of a method for processing performed by atransmission module according to an embodiment of the presentapplication;

FIG. 8 is a flowchart of a method for processing performed by asecondary display module according to an embodiment of the presentapplication;

FIG. 9 is a flowchart of a method for processing performed by aprocessing module according to an embodiment of the present application;

FIG. 10 is a schematic diagram of an example 1 in which a first devicehaving a light-sensing screen is blocked according to an embodiment ofthe present application;

FIG. 11 is a schematic diagram of an example 2 in which a first devicehaving a light-sensing screen is blocked according to an embodiment ofthe present application;

FIG. 12 is a schematic diagram of an example 3 in which a first devicehaving a light-sensing screen is blocked according to an embodiment ofthe present application;

FIG. 13 is a schematic diagram of an example in which a first devicehaving a light-sensing screen is blocked by a paper card and screeninformation is displayed on an intelligent device according to anembodiment of the present application;

FIG. 14 is a schematic diagram of an example in which a first devicehaving a light-sensing screen is blocked by a pen and screen informationis displayed on a smart watch according to an embodiment of the presentapplication;

FIG. 15 is a schematic diagram of an example in which a first devicehaving a light-sensing screen is blocked by a hand and information onthe screen of the device is displayed on an intelligent device accordingto an embodiment of the present application;

FIG. 16 is a schematic diagram of an entrance for operation of asmartphone according to an embodiment of the present application;

FIG. 17 is a schematic diagram of a process of an example in which textinformation is recognized according to an embodiment of the presentapplication;

FIG. 18 is a schematic diagram of a process of an example in which apicture is recognized and intercepted according to an embodiment of thepresent application;

FIG. 19 is a schematic diagram of a process of an example in whichaddress information is recognized according to an embodiment of thepresent application;

FIG. 20 is a schematic diagram of a process of an example in which a QRcode is recognized according to an embodiment of the presentapplication;

FIG. 21 is a schematic diagram of a process of an example in whichwebsite address information is recognized according to an embodiment ofthe present application;

FIG. 22 is a schematic diagram of a process of an example in whichtelephone number information is recognized according to an embodiment ofthe present application;

FIG. 23 is a schematic diagram of a process of an example in which acursor is recognized and text is edited according to an embodiment ofthe present application;

FIG. 24 is a schematic diagram of a process of an example in whichediting is performed in a highlighting area in a text according to anembodiment of the present application;

FIG. 25 is a schematic diagram of a process of an example in whichinformation is copied and pasted according to an embodiment of thepresent application;

FIG. 26 is a schematic diagram of a process of an example in whichinformation in a area is deleted according to an embodiment of thepresent application;

FIG. 27 is a schematic diagram of a process of an example of projectinga screen securely according to an embodiment of the present application;

FIG. 28 is a schematic diagram of a process of an example in whichprivate content is encrypted according to an embodiment of the presentapplication; and

FIG. 29 is a schematic diagram of a process of an example of securelylogging in to a personal account according to an embodiment of thepresent application.

DETAILED DESCRIPTION

In order to make the objectives, technical solutions and advantages ofthe present application more comprehensible, the present applicationwill be further described in detail below with reference to theaccompanying drawings and embodiments.

As can be learned from the background, although a light-sensing screenis provided, the light-sensing screen and an interactive operation basedon photographic properties of the light-sensing screen are notdeveloped. In the background, portable interaction for quickly obtaininginformation by means of blocking with an opaque object or overlapping ofscreens of devices is not implemented. In the background, secondaryprocessing for information after the information has been obtained byone screen from another screen, such as information extraction anddisplacement of reconstructed information, is not implemented.Transmission of natural screen regionalized information is notimplemented in the manner of device synchronization in the background,but the regionalized information on the screen may be recognized byembodiments of the present application, and a user may naturally selecta screen area of a device in which synchronization of information isneeded.

There is no very natural and portable interaction form in the manner oftransmission between devices in the background, but the embodiments ofthe present application provide a particularly natural interactionmanner in which a user uses a device to touch a screen of a device toestablish a pairing or connection, thereby obtains information of otherdevices. The manner of obtaining information content greatly meets thevisual and psychological expectations of the user.

The information sharing between devices in the background is usuallysharing information of a whole-screen, and a user may not selectnaturally a screen area for information sharing. The interaction mannerthereof is only limited to operating through a gesture on one device tosend an instruction for sharing information or picture, and technicalsolution that information interaction of device is trigged by means ofnatural contact or blocking of a screen device or an object may not beimplemented.

Information on a photo may not be recognized, filtered and extracted inthe manner of photographing and memorizing information of a screen of adevice through photographing in the background. A camera applicationneeds to be opened, shooting by clicking needs to be performed, apicture needs to be stored, and key information required by a user needsto be searched in a process for photographing. The process iscumbersome.

The problem in information acquisition or synchronization in thebackground is information redundancy. For information synchronizationbetween devices, information is not distinguished based on informationrequirements of a user and application scenarios, and information issynchronously displayed on the device regardless of the scenario. Theuser may not obtain information in a particular part of the screen in acustomized manner. The information redundancy increases the cost ofinformation management on each device, and also brings insecurity ofinformation management.

According to embodiments of the present application, a photosensitiverecognition technology of a device screen is used. After a providedfirst device with a light-sensing screen recognizes a non-transparentshielding object or a second device, the first device transmits shieldedscreen information to the second device for processing. For example, thesecond device sends an operation instruction to the first device with alight-sensing screen according to a using scenario of a user, so thatthe screen information stored or/and displayed in the first device witha light-sensing screen is modified. In this way, information interactionmay be achieved between different devices according to user demandsbased on a light-sensing recognition technology. [58] Specifically, thefirst device with a light-sensing screen calculates the position andsize of an shielded area according to the brightness sensation of thescreen of the first device which is shielded by the second device or anon-transparent shielding object. In response to a confirmativeoperation action of the user, the first device with a light-sensingscreen quickly shares the screen information to the second device. Afterobtaining the screen information of the first device with alight-sensing screen, the second device may perform different processesfor the screen information according to user demands based on theobtained screen information.

In this way, the second device may quickly intercept and process theshielded screen information of the first device with a light-sensingscreen, and reconstruct the obtained screen information and display iton the second device secondary. When it is inconvenient for the user tocarry or open the first device having a light-sensing screen, the useronly needs to view the second device. When the first device having alight-sensing screen is large and inconvenient to move and the seconddevice is small and is convenient to move, the shielded screeninformation is quickly obtained for the purpose of memo, mobile storageand portable displacement. This is an operation and interactionexperience that greatly meets the psychological expectation of the user.

According to a text attribute of the obtained screen information of thefirst device with a light-sensing screen, the user is provided withdifferent operation prompts, such as highlighting the text of the firstdevice with a light-sensing screen, and quickly inserting text and otheroperations. This is convenient for the user to quickly input textinformation on a device with smaller screen to the first device with alight-sensing screen. The first device with a light-sensing screen isequipped with a larger screen, and provides portability on editingscreen information.

In the embodiments of the present application, the shielded screeninformation on the first device with a light-sensing screen may also beencrypted to hide the shielded screen information. Alternatively, theshielded screen information on the first device with a light-sensingscreen is about information of an area for inputting password. After apassword is input on the second device, the password is directly inputto a shielded screen area of the first device with a light-sensingscreen for verification processing.

In the embodiments of the present application, the first device with alight-sensing screen may include a mobile phone, a tablet computer, anelectronic screen, a television, a computer, and the like, and is notlimited to the foregoing devices. The second device may include a mobileterminal device such as a mobile phone or a tablet computer, and is notlimited to the foregoing devices.

FIG. 1 shows an interaction method for information according to anembodiment of the present application. The interaction method forinformation includes the following specific steps.

In step 101: a first device with a light-sensing screen recognizes anon-transparent shielding object or a second device.

In step 102: The first device with a light-sensing screen transmitsshielded screen information to the second device for processing.

In this method, before step 101, the first device with a light-sensingscreen establishes a communication connection with the second device.

In this method, the screen information is data, text, or a picture.

In this method, processing performed by the second device furtherincludes: displaying or/and storing on the second device.

When the screen information is a picture, processing performed by thesecond device includes: intercepting a covered picture, and thenperforming splicing processing.

In this method, processing performed by the second device includes:performing addition, insertion, deletion, or an operation according to apre-set operation instruction on the screen information, and thensending the processed screen information to the first device with alight-sensing screen for storage or/and for displacement in the shieldedarea.

In this method, the screen information is encrypted, and is notdisplayed or displayed in a fuzzy manner in the shielded area.

In this method, the screen information is a secure login interface, andprocessing performed by the second device includes:

filling a secure account in the secure login interface, and then sendingthe secure account to the first device with a light-sensing screen forverification and displacement in the shielded area.

FIG. 2 is a schematic diagram of a structural of an interaction systemfor information according to an embodiment of the present application.The interaction system for information includes a first device with alight-sensing screen and a second device. Wherein,

the first device with a light-sensing screen is configured to: recognizea non-transparent shielding object or the second device, and transmitshielded screen information to the second device. And

the second device is configured to process the screen information.

In this system, the first device with a light-sensing screen is furtherconfigured to establish a connection with the second device.

In this system, the second device is further configured to store or/anddisplay the screen information.

In this system, the second device is further configured to: performaddition, insertion, deletion, or an operation according to a pre-setoperation instruction on the screen information, and then send theprocessed screen information to the first device with a light-sensingscreen for storage or/and for displacement in a shielded area.

The first device with a light-sensing screen is further configured to:after receiving the processed screen information, store or/and displaythe processed screen information in the shielded area.

In this system, the screen information is data, text, or a picture.

When the screen information is a picture, the second device is furtherconfigured to: intercept a covered picture, and then perform splicingprocessing.

In this system, the second device is further configured to: performencryption processing on the screen information, and send the processedscreen information to the first device with a light-sensing screen; and

the first device with a light-sensing screen is further configured to:not display the screen information or display the screen information ina fuzzy manner in the shielded area.

In this system, the screen information is a secure login interface.

The second device is further configured to: fill a secure account in thesecure login interface, and then send the secure account to the firstdevice with a light-sensing screen for verification and displacement inthe shielded area. And

the first device with a light-sensing screen is further configured to:verify the received secure account and display the secure account in theshielded area.

FIG. 3 is a schematic diagram of a structural of an interaction device 1for information according to an embodiment of the present application.The device 1 is a first device having a light-sensing screen, includingan recognition module and a transmission module. Wherein,

the recognition module is configured to recognize a non-transparentshielding object or a second device. And

the transmission module is configured to transmit shielded screeninformation to the second device.

In this device, a connection module is further included to establish aconnection to the second device.

In this apparatus, the transmission module is further configured to:receive processed screen information on which addition, insertion,deletion, or an operation according to a pre-set operation instructionare performed by the second device, and then store the processedinformation or/and display the processed information by a display modulein a shielded area.

In this device, the transmission module is further configured to receiveencrypted screen information sent by the second device. And a displaymodule does not display the screen information or display the screeninformation in a fuzzy manner in the shielded area.

In this device, the transmission module is further configured to receivea secure account sent by the second device, and display the secureaccount in a shielded area for verification, and the screen informationof the shield area is about a secure login interface.

FIG. 4 is a schematic diagram of a structural of an interaction device 2for information according to an embodiment of the present application.The device 2 is a second device including a secondary display module anda processing module. Wherein,

the secondary display module is configured to display shielded screeninformation sent by a first device with a light-sensing screen. And

the processing module is configured to process the shielded screeninformation sent by the first device with a light-sensing screen.

In this device, the processing module is further configured to storeor/and display the screen information.

In this device, the screen information is a picture, text, or data. And

when the screen information is a picture, the device further includes ascanning module, which is configured to: perform mobile scanning on ascreen shielding object which is above the first device with alight-sensing screen, and perform splicing processing on scannedinformation of the shielding object, to obtain screen information.

In this device, a connection module is further included, which is usedfor establishing a connection with the first device with a light-sensingscreen.

In this device, the processing module is further configured to: performaddition, insertion, deletion, or an operation according to a pre-setoperation instruction on the screen information, and then send theprocessed screen information to the first device with a light-sensingscreen.

In this device, the processing module is further configured to: performencryption processing on the screen information, and send the processedscreen information to the first device with a light-sensing screen.

In this device, the screen information is a secure login interface. And

the processing module is further configured to: fill a secure account inthe secure login interface, and then send the secure account to thefirst device with a light-sensing screen.

The essence of this embodiment of the present application is that theuser may extract the shielded screen information of the first devicewith a light-sensing screen by means of shielding, Thereby the userdisplays the shielded screen information on the second device.Transplanting an operation interface to another device is performed inthe Mirror Link technology in the background, and regionalizedfiltration and extraction are not performed on content on the interface.In this embodiment of the present application, more differentiatedscenario operations may be performed. Further, the shielding device mayalso perform operation control on the blocked device.

FIG. 5 is a schematic diagram of a method for processing performed by aconnection module in a first device with a light-sensing screenaccording to an embodiment of the present application. The connectionmodule is configured to detect whether the first device with alight-sensing screen and a second device are in a connected state.Connection is mainly used for: determining whether the second device issecure, only when the second device and the first device with alight-sensing screen are under secure connection authorization,subsequent information interaction may be performed. The specific stepsare as follows.

In step 501: a distance is detected, and whether the distance betweenthe first device with a light-sensing screen and the second device iswithin a connection distance.

In step 502: Whether a connection is established is determined, If not,step 503 will be performed; and if yes, process will be ended.

In step 503: establishing a connection with the second device isprompted.

In step 504: verification is performed to determine whether theconnection is successfully established, if yes, step 505 will beperformed; and if not, step 503 will be performed again.

In step 505: the connection is successfully established is prompted.

In step 506: connection information is stored.

In this connection module, the connection information is stored, so thatverification may not need to be performed on a next connection for auser, which is convenient for user experience.

FIG. 6 is a flowchart of a method for processing of a recognition modulein a first device with a light-sensing screen according to an embodimentof the present application. The first device with a light-sensing screenrecognizes the relative object position or area size of a second deviceor a non-transparent shielding object through the screen of the firstdevice. The second device is ready to obtain screen information of thefirst device with a light-sensing screen. A shielded screen area of thefirst device with a light-sensing screen is projected onto the seconddevice. A user may move the second device or the non-transparentshielding object left and right to achieve precise positioning. Thespecific process includes following steps.

In step 601: A photosensitive element of a recognition module performsmonitoring.

In step 602: The recognition module performs brightness detection of ascreen area, to determine whether there is a dark area. If yes, step 603will be performed; and If not, step 601 will be performed.

In step 603: information of the photosensitive element is obtained.

In step 604: position information of a shielded screen is obtained.

Specifically, because the first device with a light-sensing screen isequipped with a screen of a photosensitive attribute, the first devicewith a light-sensing screen is configured to recognize a position atwhich the second device or the non-transparent shielding object shieldsthe screen of the first device thereof. When brightness of the screenmonitored by the photosensitive element built in the recognition moduleis inconsistent, the size and the position of the corresponding screenarea to be intercepted may be determined. Locating the position of theshielded screen may be performed by the existing technology.

Herein, locating the photosensitive position may be performed by theexisting technology. The existing technology is described below. Anoptical sensor transistor in a photosensitive pixel in a photosensitivedevice is formed by an oxide semiconductor transistor for sensing light.The photosensitive device includes: an array of photosensitive pixelwith a plurality of photosensitive pixels arranged in rows and columns;and a plurality of gate lines arranged along a row direction andsupplying gate voltages to photosensitive pixels, respectively. Wherein,each photosensitive pixel includes an optical sensor transistor forsensing light and a switch transistor for outputting a photosensitivesignal from the optical sensor transistor. A gate of an optical sensortransistor of a photosensitive pixel arranged in any row is connected toa gate line arranged in a row before or after the any row. Through thephotosensitive pixel array and the plurality of gate lines involved inthe present technology, locating the position of an area of a screenwhich is shielded by the object may be implemented.

A scanning module performs mobile scanning on the first device with alight-sensing screen below based on the second device or shieldingobject above, and splicing the scanned information of the shieldingobject to obtain screen information. Two steps are mainly included. Inthe first step, after the scanning mode is started, the photosensitiveelement in the first device with a light-sensing screen belowcontinuously monitors the shielded area, and stores the current shieldedarea as a picture m once every k milliseconds. In the second step, afterthe scanning mode is ended, all the shielded areas collected in thefirst step are spliced.

For the first step, the current shielded area is reserved every kmilliseconds, where the value of k is as small as possible. In theory,the smaller the value is, the effect is better. However, considering thesplicing processing in the second step and the problem of performance,it is suggested that the value is 100 to 500 milliseconds.

The splicing processing in the second step may be performed by existingtechnology. For example, the stitcher class of opencv implementssplicing, and the class provides methods such as createDefault,estimatedTransform, and composePanorama, so that splicing processing maybe performed conveniently on multiple images to form a complete scenariopicture.

FIG. 7 is a flowchart of a method for processing performed by atransmission module according to an embodiment of the presentapplication. The transmission module sends screen information of an areaoverlapped with a second device or a non-transparent shielding object tothe second device, and the screen information is stored in the seconddevice. The main function of the module is similar to function of alens. The module transmits an image of shielded area to the seconddevice in real time, Which facilitates controlling the second devicemore clearly and easily. The specific steps are as follows.

In step 701: a sensing area of a photosensitive element in a deviceuniquely with a light-sensing screen is intercepted.

In step 702: after the sensing area is spliced, screen information isobtained, and is transmitted to a second device in a picture format.

In step 703: The second device prompts a user whether to intercept thepicture. If yes, step 704 will be performed. If not, this process willbe ended.

In step 704: The second device stores the information of the interceptedpicture.

FIG. 8 is a flowchart of a method for processing of a secondary displaymodule according to an embodiment of the present application. Thesecondary display module is used by a second device to perform secondaryextraction on screen information obtained from a first device with alight-sensing screen, and redisplay the extracted screen information.The specific steps are as follows.

In step 801: screen information that has been stored is obtained, thescreen information is a picture.

In step 802: prompt information selected by a user for display isreceived.

In step 803: whether to display the picture is determined. If yes, step804 will be performed; and if not, step 805 will be performed.

In step 804: the screen information is continually stored, the screeninformation is the picture.

In step 805: a type of information selected by the user for extractionis received.

In step 806: Extraction for information is performed in screeninformation.

In the secondary display module, in addition to directly interceptingthe picture, the user may also flexibly select required information ofpicture, such as pure text information or numerical information. Theselected required information is performed by information recognitionand processing, interface re-layout and content attribute definition,and then is stored and displayed on the second device.

FIG. 9 is a flowchart of a method for processing of a processing moduleaccording to an embodiment of the present application. Screeninformation is processed on a second device to facilitate useroperations. Further, the processing of screen information may be dividedinto two categories: viewing and modification. Furthermore, by means ofviewing, a telephone number, a QR code, and a website address may beidentified, an express bill may be obtained, and the like. Furthermore,by means of modification, an intercepted area may be highlighted, acursor of a text and modified text nay be recognized and synchronized toa first device with a light-sensing screen, the intercepted area may bepasted, deleted, and the like. In this method, security-relatedfunctions such as hiding special area information may be implemented.

In step 901: Determine whether a hidden mode is detected. If yes, step902 will be performed; and if not, the process will be ended.

In step 902: hidden screen information is confirmed.

In step 903: the determined screen information is encrypted.

In step 904: The determined screen information is not displayed ordisplayed in a fuzzy manner.

Secure login may also be implemented according to this method. Thesecure login includes following steps.

In step 905: Determine whether a secure login mode is detected. If yes,step 906 will be performed; and otherwise, the process will be ended.

In step 906: prompt information of inputting a secure password is sentto a user.

In step 907: the security password input by the user is received.

In step 908: the secure password input by the user is verified.

In step 909: a verification result is displayed to the user.

Interaction scenarios for information according to embodiments of thepresent application are described below. The information interactionscenarios are mainly divided into three types. The first type isinterception and conversion display of text information and pictureinformation. The second type is supplementary input of information andcovering for area instructions. And the third type is secure encryptionof information of device.

The first type: interception and conversion display of text informationand picture information

text information is intercepted.

a second device intercepts character data such as a telephone number, aQR code, a website address, an address, a tracking number, a zip code,date information and weather information that are displayed on a firstdevice with a light-sensing screen.

Manner 1: the second device shields the first device with alight-sensing screen.

A user places a screen of the second device upward on the first devicewith a light-sensing screen, and may shift the second device to read andrecognize a wider range of text information. At this time, characterdata information of an overlapping area of the screens of the twodevices may be displayed on the screen of the second device. Theinformation of the attribute of the character information is recognized.Important information such as a telephone number is filtered anddisplayed on the screen of the second device. After the user confirmsthat the information recognized and displayed by the second device meetsthe requirement of the user, the user performs an operation of tappingthe device to complete transmission and storage of the deviceinformation.

The specific steps are as follows.

In step 1: A second device is placed above a first device with alight-sensing screen, and the second device recognizes a relativephysical position of a screen of the first device with a light-sensingscreen.

Step 2: On a premise that the first device with a light-sensing screenestablishes a secure connection to the second device, the first devicewith a light-sensing screen sends display information of an overlappingarea of the screen of the first device to the second device.

Step 3: The second device stores the obtained display information initself.

Step 4: The second device converts a manner of displaying of the storeddisplay information, redisplays it to the user in an appropriate formatand form, and further associates an operation instruction.

Step 5: The second device presents the information or further processesand operates the information according to the operation instructioninput by the user.

Manner 2: any non-transparent shielding object shields the first devicewith a light-sensing screen

The user places a non-transparent shielding object of any shape abovethe first device with a light-sensing screen, and may shift thenon-transparent shielding object to read and recognize a wider range oftext information. At this time, character data information that is ofthe first device with a light-sensing screen which is shielded by thenon-transparent shielding object may be displayed on the screen of thesecond device. And an attribute of the information of the character isrecognized. And important information such as a telephone number isfiltered and is display on the screen of the second device. After theuser confirms that the information recognized by the second device anddisplayed on the second device meets the requirement of the user, theuser performs an operation of tapping the device to completetransmission and storage of information of a text.

The specific steps are as follows.

In step 1: Any non-transparent shielding object is placed above a firstdevice with a light-sensing screen, and the first device with alight-sensing screen recognizes a relative physical position and shapeof the non-transparent shielding object.

In step 2: A secure connection is established between the first devicewith a light-sensing screen and a second device. The two do not need tooverlap and touch each other, and the first device with a light-sensingscreen transmits display information of an area shielded by thenon-transparent shielding object to the second device.

In step 3: The second device stores the display information obtained byblocking of the opaque blocking object in the second device.

The second device converts a manner of displaying the stored displayinformation, redisplays it to the user in an appropriate format andform, and further associates an operation instruction.

In step 5: The second device presents the information or furtherprocesses and operates the information according to the operationinstruction input by the user.

-Interception is performed on image.

Interception for image refers to that a second device directlyintercepts, in a screenshot form, information displayed on a firstdevice with a light-sensing screen, and stores the information in apicture format. The user may view screen content of an area where thesecond device overlaps with the first device with a light-sensingscreen. The position of an area where picture is intercepted isdetermined. Thereby the information is stored as a picture and thepicture is directly displayed, which is independent of the first devicewith a light-sensing screen.

Manner 1: the second device shields the first device with alight-sensing screen.

In step 1: the second device is placed above the first device with alight-sensing screen. And the second device recognizes a relativephysical position of a screen of the first device with a light-sensingscreen.

In step 2: On a premise that the first device with a light-sensingscreen establishes a secure connection with the second device, the firstdevice with a light-sensing screen sends display information of anoverlapping area of the screen to the second device in a screenshotform.

In step 3: The second device stores the information of the obtainedpicture in the second device.

In step 4: The second device displays the information of the storedpicture to a user.

Manner 2: any non-transparent shielding object shields the first devicewith a light-sensing screen.

In step 1: Any non-transparent shielding object is placed above a firstdevice with a light-sensing screen, and the first device with alight-sensing screen recognizes a relative physical position and shapeof the non-transparent shielding object.

In step 2: A secure connection is established between the first devicewith a light-sensing screen and the second device, the two do not needto overlap and touch each other, and the first device with alight-sensing screen transmits display information of an area shieldedby the non-transparent shielding object to the second device in ascreenshot form.

In step 3: The second device stores information of the obtained picturein the second device.

In step 4: The second device displays the information of the storedpicture to a user.

The second type is supplementary input of information and covering forarea instructions.

Supplementary input of information and covering for area instructionsrefer to that after a second device obtains text information on thefirst device with a light-sensing screen, according to instructionsinput by the user on the second device, the second device may implementprocessing instructions such as supplementary inputting, highlighting,deleting, copying, and storing the information on the first device witha light-sensing screen.

The specific steps include following steps.

In step 1: A second device or a non-transparent shielding object isplaced above a first device with a light-sensing screen, and the firstdevice with a light-sensing screen recognizes a relative physicalposition of an area of the screen of the first device at which thescreen is blocked.

In step 2: On a premise that the first device with a light-sensingscreen establishes a secure connection with the second device, the firstdevice with a light-sensing screen sends display information of anoverlapping area of the screen of the first device to the second device.

In step 3: The second device prompts instructions of processing forinformation such as edition, deletion, highlighting, storage, and copyto a user.

In step 4: The second device processes the instructions of the user ondisplay information of the first device with a light-sensing screen.

The third type is secure encryption for device information.

Secure encryption for information refers to that on the screen of afirst device with a light-sensing screen, the user blocks content whichis expected to be securely encrypted. Thereby intelligent hiding orlocking on the content of the shielded area is implemented. On the otherhand, the first device with a light-sensing screen is shielded bydifferent devices, so that after user accounts of the different devicessuccessfully match an account on the first device with a light-sensingscreen, secure login of different accounts is implemented.

The specific steps include the following steps:

In step 1: A second device or a non-transparent shielding object isplaced above a first device with a light-sensing screen, and the firstdevice with a light-sensing screen recognizes a relative physicalposition of an area of the screen of the first device at which thescreen is blocked.

In step 2: The first device with a light-sensing screen performsintelligent encryption, hiding, or locking on content of a shieldedarea.

In this step 2′, by matching information attributions of the shieldedarea with information stored in the second device, different accountidentities are recognized.

Several specific embodiments are listed below.

Embodiment 1: directly shielding by an intelligent device is performed.

FIG. 10 is a schematic diagram of an example 1 in which a first devicewith a light-sensing screen is blocked according to an embodiment of thepresent application. As shown in the figure, a second device used by auser is a smart watch with a screen. The first device with alight-sensing screen is directly shielded, and obtained screeninformation is displayed on the smart watch.

FIG. 11 is a schematic diagram of an example 2 in which a first devicewith a light-sensing screen is shielded according to an embodiment ofthe present application.

As shown in the figure, a second device used by a user is a mobileterminal with a screen, and the first device with a light-sensing screenis directly shielded, and obtained screen information is displayed onthe mobile terminal.

FIG. 12 is a schematic diagram of an example 2 in which a first devicewith a light-sensing screen is shielded according to an embodiment ofthe present application. As shown in the figure, second devices used bya user are a smart watch, a mobile terminal, and an intelligent tabletdevice which are all equipped with a screen. And the first device with alight-sensing screen is a device with a large electronic screen. Thefirst device is directly shielded, and obtained screen information isdisplayed on the smart watch, the mobile terminal, and the intelligenttablet device.

Embodiment 2: blocking is performed by a non-transparent shieldingobject of any shape.

A user blocks a first device with a light-sensing screen using anynon-transparent shielding object around. Obtained information isindirectly displayed on the second device, which is an intelligentdevice. As shown in FIG. 13, FIG. 14, and FIG. 15, FIG. 13 is aschematic diagram of an example in which a first device with alight-sensing screen is shielded by a paper card and screen informationis displayed on an intelligent device according to an embodiment of thepresent application. FIG. 14 is a schematic diagram of an example inwhich a first device with a light-sensing screen is shielded by a penand screen information is displayed on a smart watch according to anembodiment of the present application. FIG. 15 is a schematic diagram ofan example in which a first device with a light-sensing screen isshielded by a hand and screen information is displayed on an intelligentdevice according to an embodiment of the present application.

Embodiment 3: an embodiment of recognition for content and an operationeffect after the recognition is described.

For example, a smartphone is used as a second device. FIG. 16 is aschematic diagram of an operation entrance of the smartphone accordingto an embodiment of the present application.

Embodiment 4: an embodiment of intercepting and processing for textinformation or pictures is described.

A existing first device with a light-sensing screen located in a secureenvironment and a second device located in a secure environment arespecifically implemented.

In step 1: the first device with a light-sensing screen and the seconddevice are paired and connected. A secure connection between the firstdevice with a light-sensing screen and the second device is established.Wherein, the first device with a light-sensing screen allows the seconddevice to obtain information of the first device with a light-sensingscreen.

In step 2: the second device or a non-transparent shielding object isdisplayed above the first device with a light-sensing screen in anoverlapping manner. In this step, a user places the second device or thenon-transparent shielding object above the first device with alight-sensing screen in an overlapping manner.

In step p 3: When text information is recognized, the user may move thefirst device with a light-sensing screen or the non-transparentshielding object. The text information on the first device with alight-sensing screen is read one by one. When interception for pictureis performed, the second device obtains a picture on the shielded screenof the first device with a light-sensing screen.

In step 4: The second device pops up a confirmation interface. The userfinally confirms an operation of obtaining the information. The obtainedinformation is stored or run.

In step 5: the information is viewed. Because the first device with alight-sensing screen is relatively large, and it is inconvenient to moveand carry the first device with a light-sensing screen, when the firstdevice with a light-sensing screen is far away from the scene of thesecond device, the user only needs to carry the second device, anddirectly view intercepted information from a screen of the seconddevice.

EXAMPLE 1

As shown in FIG. 17, FIG. 17 is a schematic diagram of a process of anexample in which text information is intercepted according to anembodiment of the present application. In this example, a second devicethat recognizes a tracking number is a smart watch. A first device witha light-sensing screen is a smartphone. Information of a tracking numberis displayed on the smartphone of a user. A paired smart watch is placedon an area of the screen of the smartphone in an overlapping manner,where the tracking number is displayed. For a text area that cannot becovered by the smart watch, the user may recognize text information onecharacter by one character by shifting the smart watch. The informationis finally integrated and displayed on the smart watch. The user maycomplete the behavior of fetching a express by carrying only the smartwatch without carrying the smartphone.

EXAMPLE 2

As shown in FIG. 18. FIG. 18 is a schematic diagram of a process of anexample in which a picture is recognized and intercepted according to anembodiment of the present application. In the figure, a second device isa smartphone, and a first device with a light-sensing screen is a smarttablet computer. The smart tablet computer has a relatively large screenand is not easy to carry. A user may place the smartphone above thescreen of the smart tablet. The smartphone is moved to locate a screenarea that needs to be intercepted. And the smart tablet computerrecognizes a screen area of the smartphone above. After the user touchesthe smart tablet computer by a back side of the smartphone, pictureareas of a photo or an advertisement needed by the user are directlyintercepted. The pictures are transferred to the smartphone and storedin the smartphone. The user only needs to carry the smartphone tomemorize and view the picture.

EXAMPLE 3

As shown in FIG. 19, FIG. 19 is a schematic diagram of a process of anexample in which address information is recognized according to anembodiment of the present application. In the figure, a second device isan intelligent mobile terminal. The first device with a light-sensingscreen is a television display screen of a television. Public textinformation is displayed in an advertisement area of the display screenof the television. A user holds the second device, that is, theintelligent mobile terminal, and may quickly obtain contact informationby tapping an area in which an address is displayed on the displayscreen of the television. And a specific position may be searched in amap of the intelligent mobile terminal. Thereby, the objective ofquickly viewing is achieved.

EXAMPLE 4

As shown in FIG. 20, FIG. 20 is a schematic diagram of a process of anexample in which a QR code is recognized according to an embodiment ofthe present application. In the figure, a second device is anintelligent terminal device, and a first device with a light-sensingscreen is a smartphone or a tablet computer. The information of a QRcode is displayed on the screen of the smartphone or the tabletcomputer. The second device is used to scan the area in which the QRcode is located. The information of the QR code may be read and arelated link according to the QR code may be linked to. For example, apage for account transfer and payment may be directly opened, so thatthe efficiency of payment is improved.

EXAMPLE 5

As shown in FIG. 21, FIG. 21 is a schematic diagram of a process of anexample in which information of website address is recognized accordingto an embodiment of the present application. In the figure, a seconddevice is a smartphone, and a first device with a light-sensing screenis a computer monitor. Information of text, pictures, and address ofwebsite is displayed on a screen of the computer monitor. A user holdsthe smartphone to cover the information of a web site address on thescreen of the computer monitor. The smartphone may obtain theinformation of the website address. The website may be directly openedin the smartphone or stored as text.

EXAMPLE 6

As shown in FIG. 22. FIG. 22 is a schematic diagram of a process of anexample in which information of telephone number is recognized accordingto an embodiment of the present application. In the figure, a seconddevice is a smartphone, and a first device with a light-sensing screenis a computer monitor. The content including a telephone number isdisplayed on the screen of the computer monitor. The user holds thesecond device to cover or scan an area on which the telephone number isdisplayed of the screen of the computer monitor. The second deviceobtains the telephone number in the covered or scanned area. And thesecond device prompts the user whether to save it as a telephone numberor whether to make a call.

Embodiment 5: an embodiment of supplementary input and instructions oftext information is performed.

In this embodiment, a user touches different information areas in afirst device with a light-sensing screen by a second device. And thesecond device prompts different information to implement differentfunctions of information processing. The specific process forimplementation includes the following steps.

In step 1: a first device with a light-sensing screen and a seconddevice are paired and connected. A secure connection between the firstdevice with a light-sensing screen and the second device is established.The first device with a light-sensing screen allows the second device toobtain and process information of the first device with a light-sensingscreen.

In step 2: the second device or a non-transparent shielding object isplaced above the first device with a light-sensing screen in anoverlapping manner. In this step, a user places the second device or thenon-transparent shielding object above the first device with alight-sensing screen in an overlapping manner.

In step 3: When text information is recognized, the user may move thefirst device with a light-sensing screen or the non-transparentshielding object. The text information on the first device with alight-sensing screen is red one e by one. When picture is intercepted,the second device obtains a picture on the shielded screen of the firstdevice with a light-sensing screen.

In step 4: The user confirms an operation of obtaining the information.

In step 5: The second device obtains the information on the first devicewith a light-sensing screen. The second device pops up an operationinstruction interface of operation instruction. The user performs acorresponding instruction operation of editing the information, toimplement modification on the information on the first device with alight-sensing screen. The modified information may be stored in thefirst device with a light-sensing screen.

This method can solve the problem that the input is inconvenient becausethe first device with a light-sensing screen is relatively large. Theuser may quickly process the information of the first device with alight-sensing screen through the second device.

EXAMPLE 1

As shown in FIG. 23. FIG. 23 is a schematic diagram of a process of anexample in which a cursor is recognized and text is edited according toan embodiment of the present application. As shown in the figure, afirst device with a light-sensing screen is an intelligent device with alarge electronic screen. The screen of the first device with aphotosensitive screen has a relatively large area and is inconvenient tobe input. A second device is a smartphone held by a user. After thelarge electronic screen is lightly scanned by the smartphone, partialtext information on the large electronic screen is obtained. And theposition of the cursor is recognized. And then information on the largeelectronic screen may be quickly input and edited through thesmartphone. Editing also includes deleting text. Specifically, thecursor on the large electronic screen is covered by the smartphone. Theinformation of whether the text needs to be quickly inserted isdisplayed on the smartphone. The user inputs text on the smartphone, andthe input text is inserted into the screen of the first device with alight-sensing screen.

EXAMPLE 2

As shown in FIG. 24. FIG. 24 is a schematic diagram of a process of anexample in which a highlight area in text is edited according to anembodiment of the present application. As shown in the figure, a firstdevice with a light-sensing screen is an intelligent device with a largeelectronic screen. The screen of the first device with a light-sensingscreen has a relatively large area and is inconvenient to be input. Asecond device is a smartphone held by a user. After the smartphoneslightly scans the large electronic screen, the area covered by thesmartphone is automatically highlighted.

EXAMPLE 3

As shown in FIG. 25. FIG. 25 is a schematic diagram of a process of anexample in which information is copied and pasted according to anembodiment of the present application. As shown in the figure, a firstdevice with a light-sensing screen is an intelligent device with a largeelectronic screen. The screen of the first device with a light-sensingscreen has a relatively large area and is inconvenient to be input. Asecond device is a smartphone held by a user. The large electronicscreen is slightly scanned by the smartphone, and the area covered bythe screen of the smartphone is locked as an area of picture will becopied. When the smartphone shields other areas of the large electronicscreen or other devices again, the copied picture area for copyingpicture may be selected for pasting.

EXAMPLE 4

As shown in FIG. 26. FIG. 26 is a schematic diagram of a process of anexample in which area information is deleted according to an embodimentof the present application. As shown in the figure, a first device witha light-sensing screen is an intelligent device with a large electronicscreen. The screen of the first device with a light-sensing screen has arelatively large area and is inconvenient to be input. A second deviceis a smartphone held by a user. The user holds the smartphone andslightly scans the large electronic screen by the smartphone. The areacovered by the mobile phone screen is locked as an area of picture willbe deleted. The user deletes the content of the area after confirmation.

Embodiment 6: method for encryption and interaction is implemented forinformation security

A user touches a screen area of a first device with a light-sensingscreen by a second device or a non-transparent shielding object.Information of the screen area is locked or hidden. The first devicewith a light-sensing screen recognizes an information attribute of thesecond device, and runs login for an account.

The specific implementation of the encryption process includes followingsteps.

In step 1: a non-transparent shielding object is placed on a screen ofthe first device with a light-sensing screen.

In step 2: A user moves the non-transparent shielding object, to shieldinformation that the user expects to encrypt.

In step 3: The user confirms an operation of encryption or locking.

In step 4: partial information of the first device with a light-sensingscreen is hidden or locked.

The specific implementation of secure login for account includesfollowing steps.

In step 1: A first device with a light-sensing screen records differentaccount identities. A plurality of different devices has establishedsecure connections with the first device with a light-sensing screen.

In step 2: A second device which is securely connected is placed on thefirst device with a light-sensing screen in an overlapping manner.

In step 3: A user may move the second device or a non-transparentshielding object to match an area for displaying password displayed onthe first device with a light-sensing screen with information ofpassword input on the second device.

In step 4: The user confirms that user account has been matchedsuccessfully.

In step 5: logging in the first device with a light-sensing screen witha personal secure account is successfully implemented.

EXAMPLE 1

As shown in FIG. 27. FIG. 27 is a schematic diagram of a process of anexample of secure screen projection according to an embodiment of thepresent application. In the figure, a first device with a light-sensingscreen is a mobile phone. A user projects content of the mobile phoneonto a screen of a television screen. Notification message of personalmobile phone of the user is personal privacy and does not want to beprojected. At this time, the user shields an area of notificationmessage of the mobile phone, and the area will not be projected.

EXAMPLE 2

As shown in FIG. 28. FIG. 28 is a schematic diagram of a process of anexample in which private content is encrypted according to an embodimentof the present application. In the figure, a first device with alight-sensing screen is a mobile phone. A user may directly shield aninformation area that the user wishes to be shielded, so that thecontent of the shielded area is hidden or blurred. Encryption isimplemented, so that the content is not seen by other people.

EXAMPLE 3

As shown in FIG. 29, FIG. 29 is a schematic diagram of a process of anexample of securely logging in to a personal account according to anembodiment of the present application. In the figure, a first devicewith a light-sensing screen is a television, showing the existing loginentrances of different account. Different users may use their own mobilephone devices to shield their respective areas of login entrance ofaccount. When a password input by a user on a personal mobile phonedevice is consistent with that recorded in the television, secure loginis implemented.

The method, system and apparatus provided in the embodiments of thepresent application implement particularly natural informationtransmission and information processing between large screen and smallscreen. Information includes text recognition and picture interception,processing for text information and picture information, secureencryption for text information or picture information, secure login foraccount, and the like. An interaction manner of information encryptionis a interaction implemented by particularly natural touch of device.The user only needs to lightly place a device convenient to move andcarry on a screen of another device inconvenient to move, so that theuser may quickly obtain partial fragmented information desired by theuser. Information of the large screen may be processed by the smallscreen. Secure encryption of information is implemented. Quick responseis implemented for information between the two devices. Greatconvenience has been brought to people's life.

The foregoing preferred embodiments further describe, in detail, theobjectives, technical solutions, and advantages of the presentapplication. It should be understood that the foregoing descriptions aremerely preferred embodiments of the present application, and are notintended to limit the present application. Any modification, equivalentreplacement, improvement, and the like made within the spirit andprinciple of the present application should fall within the protectionscope of the present application.

1. An interaction method for information, comprising: recognizing, by afirst device with a light-sensing screen, a non-transparent shieldingobject or a second device; and transmitting, by the first device with alight-sensing screen, shielded screen information to the second devicefor processing.
 2. The method of claim 1, further comprising:establishing, by the first device with a light-sensing screen, acommunication connection with the second device before recognizing thenon-transparent shielding object or the second device.
 3. The method ofclaim 1, wherein, the screen information is data, text, or a picture;and the method further comprising: intercepting a covered picture, andthen performing splicing processing on the covered picture by the seconddevice when the screen information is a picture.
 4. The method of claim2, wherein, processing performed by the second device comprises:performing addition, insertion, deletion, or an operation according to apre-set operation instruction on the screen information, and sending theprocessed screen information to the first device with a light-sensingscreen for storage or/and for displaying in the shielded area.
 5. Themethod of claim 2, further comprising: not displaying the screeninformation or displaying the screen information in a fuzzy manner in ashielded area by the first device with a light-sensing screen after thescreen information is encrypted by the second device.
 6. The method ofclaim 2, wherein, the screen information is a secure login interface,and processing performed by the second device comprises: filling asecure account in the secure login interface, and sending the secureaccount to the first device with a light-sensing screen for verificationand displaying in the shielded area. 7.-12. (canceled)
 13. Aninteraction device for information, comprising: a recognition module anda transmission module, wherein the recognition module is configured torecognize a non-transparent shielding object or a second device; and thetransmission module is configured to transmit shielded screeninformation to the second device.
 14. The device of claim 13, furthercomprising; a connection module, configured to establish a connectionwith the second device.
 15. The device of claim 14, wherein, thetransmission module is further configured to: receive processed screeninformation on which addition, insertion, deletion, or an operationaccording to a pre-set operation instruction are performed by the seconddevice, and store the processed information or/and display the processedinformation by a display module in a shielded area.
 16. The device ofclaim 14, wherein the transmission module is further configured toreceive encrypted screen information sent by the second device, thedevice further comprises a display module; the display module isconfigured to not display the screen information or display the screeninformation in a fuzzy manner in a shielded area.
 17. The device ofclaim 14, wherein; the transmission module is further configured to:receive a secure account sent by the second device, and display thesecure account in a shielded area for verification, and wherein theshielded screen information is about a secure login interface.
 18. Aninteraction device for information, comprising: a secondary displaymodule; and a processing module, wherein the secondary display module isconfigured to display shielded screen information sent by a first devicewith a light-sensing screen; and the processing module is configured toprocess the shielded screen information sent by the first device with alight-sensing screen.
 19. The device of claim 18, wherein the screeninformation is a picture, text, or data; and when the screen informationis a picture, the device further comprises a scanning module, configuredto: perform mobile scanning on a screen shielding object of the firstdevice with a light-sensing screen, and perform splicing processing onscanned information of the shielding object, to obtain screeninformation.
 20. The device of claim 18, further comprising: aconnection module, configured to establish a connection with the firstdevice with a light-sensing screen.
 21. The device of claim 20, wherein,the processing module is further configured to: perform addition,insertion, deletion, or an operation according to a pre-set operationinstruction on the screen information, and then send the processedscreen information to the first device with a light-sensing screen. 22.The device of claim 20, wherein the processing module is furtherconfigured to: perform encryption processing on the screen information,and send the processed screen information to the first device with alight-sensing screen.
 23. The device of claim 20, wherein the processingmodule is further configured to: fill a secure account in the securelogin interface, and then send the secure account to the first devicewith a light-sensing screen, when the screen information is a securelogin interface.