CN105808139B - A kind of implementation method and terminal inputted safely - Google Patents

A kind of implementation method and terminal inputted safely Download PDF

Info

Publication number
CN105808139B
CN105808139B CN201610108393.7A CN201610108393A CN105808139B CN 105808139 B CN105808139 B CN 105808139B CN 201610108393 A CN201610108393 A CN 201610108393A CN 105808139 B CN105808139 B CN 105808139B
Authority
CN
China
Prior art keywords
input character
initial input
initial
terminal
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610108393.7A
Other languages
Chinese (zh)
Other versions
CN105808139A (en
Inventor
彭刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201610108393.7A priority Critical patent/CN105808139B/en
Publication of CN105808139A publication Critical patent/CN105808139A/en
Application granted granted Critical
Publication of CN105808139B publication Critical patent/CN105808139B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The embodiment of the present invention provides a kind of implementation method and terminal inputted safely, method is applied to a terminal with display screen, the terminal includes the first application program, comprising: the initial input character for obtaining input shows the initial input character in an input frame;Identification inputs the input mode of the initial input character;Based on the input mode and scheduled instruction secure strategy, the corresponding effective input character of the initial input character is determined;Effective input character is supplied to first application program.Using technological means provided in an embodiment of the present invention, it is identified and is converted to form effective instruction using initial input character of the instruction secure strategy to input, allow user in the case of environment complexity need not scruple onlooker and can the safe various privacy informations of input and security information at the terminal, be effectively guaranteed the safety of privacy information and security information.

Description

A kind of implementation method and terminal inputted safely
The application is divisional application, parent application number is 201110056603X, entitled a kind of to input safely Implementation method and terminal, the applying date are on 03 09th, 2011.
Technical field
The present invention relates to electronic fields, particularly relate to a kind of implementation method and terminal inputted safely.
Background technique
Universal and application with intelligent handheld device is enriched constantly, and user by these equipment in addition to that can carry out Except communication, additionally it is possible to by intelligent handheld device browse network, shopping, financing.Required when using many applications to The identity at family is verified, that is, user's validation information is needed, for example, password etc., to judge whether the identity of user closes Method;In addition, user is during use is directed to, it is equally possible to need to input information that is more crucial or belonging to individual privacy.
When user's validation information, it is more crucial or when belonging to the information of individual privacy, generally require in input Appearance is determined, therefore it is necessary to the contents for inputting user to show for terminal, be will lead to other people in this way and is illegally pried through And the information of user's input is stolen, cause the interests of user to be damaged.
Therefore, it is difficult to avoid the problem that the information that user has inputted illegally is stolen in the related art, still, for Currently no effective solution has been proposed for existing issue.
Summary of the invention
It is existing for solving the technical problem to be solved in the present invention is to provide a kind of implementation method and terminal inputted safely In technology, during inputting corresponding information in a terminal, it is difficult to the defect for avoiding the information inputted from illegally being stolen.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of implementation method inputted safely, it is applied to one Terminal with display screen, the terminal include the first application program, comprising: the initial input character of input is obtained, it will be described Initial input character is shown in an input frame;Identification inputs the input mode of the initial input character;Based on the input Mode and scheduled instruction secure strategy determine the corresponding effective input character of the initial input character;It will be described effectively defeated Enter character and is supplied to first application program.
In the implementation method, determine that the corresponding effective input character of the initial input character includes: for each The initial input character, the state of increment key when detection inputs the initial input character, when the increment key is in work shape When state, corresponding effective input character is used as after the corresponding signal of the initial input character is carried out increment or decrement.
In the implementation method, determine that the corresponding effective input character of the initial input character includes: for each The initial input character, what is formed between contactant and the touch screen of the terminal when detection inputs the initial input character connects The initial input character recognition is corresponding effective input when the contact area meets area threshold range by contacting surface product Character;Wherein, by inputting the initial input character on the touch screen of terminal using the contactant.
In the implementation method, feelings are changed according to the coupled capacitor of terminal described when inputting each initial input character Condition determines the dynamics or contact area for inputting the initial input character.
In the implementation method, determine that the corresponding effective input character of the initial input character includes: for each The initial input character, detection inputs the dynamics when initial input character, when the dynamics detected meets predetermined dynamics threshold It is effectively to input character by the initial input character recognition when being worth range.
In the implementation method, determine that the corresponding effective input character of the initial input character includes: for each The initial input character, the distance between the touch screen of contactant and terminal when detection inputs the initial input character, It is corresponding effective input character by the initial input character recognition when the distance meets distance threshold range.
A kind of terminal, comprising: the first application program module, for obtaining effectively input character;Input module has input Frame shows the initial input character in the input frame for obtaining the initial input character of input;Input mode obtains Modulus block inputs the input mode of the initial input character for identification;Identification module, for based on the input mode and Scheduled instruction secure strategy determines the corresponding effective input character of the initial input character;By effective input character It is supplied to first application program module.
In the terminal, further includes: incremental detection module, for detecting defeated for each initial input character The contact area formed between contactant and the touch screen of the terminal when entering the initial input character, it is full in the contact area It is corresponding effective input character by the initial input character recognition when sufficient area threshold range;Wherein, by being connect described in utilization Touching object inputs the initial input character on the touch screen of terminal.
In the terminal, further includes: contact area detection module, for for each initial input character, inspection The contact area formed between contactant and the touch screen of the terminal when inputting the initial input character is surveyed, in the contact surface It is corresponding effective input character by the initial input character recognition when product meets area threshold range;Wherein, by utilizing institute It states contactant and inputs the initial input character on the touch screen of terminal.
In the terminal, further includes: contact area detection module, for for each initial input character, inspection The contact area formed between contactant and the touch screen of the terminal when inputting the initial input character is surveyed, in the contact surface It is corresponding effective input character by the initial input character recognition when product meets area threshold range;Wherein, by utilizing institute It states contactant and inputs the initial input character on the touch screen of terminal;Apart from detection module, for for each described first Begin input character, the distance between the touch screen of contactant and terminal when detection inputs the initial input character, described It is corresponding effective input character by the initial input character recognition when distance meets distance threshold range.
Using technical solution provided in an embodiment of the present invention, using instruction secure strategy to the initial input character of input into Row, which identifies, simultaneously to be converted to form effective instruction, allow user in the case of environment complexity need not scruple onlooker and can be The various privacy informations of safe input and security information, are effectively guaranteed the safety of privacy information and security information in terminal Property.
Detailed description of the invention
Fig. 1 is a kind of implementation method flow diagram inputted safely of the embodiment of the present invention;
Fig. 2 is that the embodiment of the present invention realizes the intelligent handheld device structural schematic diagram inputted safely;
Fig. 3 is the terminal works flow diagram that the embodiment of the present invention has capacitive touch screen;
Fig. 4 is the terminal of that embodiment of the invention structural schematic diagram.
Specific embodiment
To keep the technical problem to be solved in the present invention, technical solution and advantage clearer, below in conjunction with attached drawing and tool Body embodiment is described in detail.
The embodiment of the present invention provides a kind of implementation method inputted safely, described applied to a terminal with display screen Terminal includes the first application program, as shown in Figure 1, comprising:
Step 101, the initial input character for obtaining input shows the initial input character in input frame;
Step 102, identification inputs the input mode of the initial input character;
Step 103, it is based on the input mode and scheduled instruction secure strategy, determines that the initial input character is corresponding Effective input character;
Effective input character is supplied to first application program.
Using technological means provided in an embodiment of the present invention, using instruction secure strategy to the initial input character of input into Row, which identifies, simultaneously to be converted to form effective instruction, allow user in the case of environment complexity need not scruple onlooker and can be The various privacy informations of safe input and security information, are effectively guaranteed the safety of privacy information and security information in terminal Property.
In technology provided by embodiment, scheduled instruction secure strategy is a service logic;It determines described initial defeated Entering the corresponding effective input character of character includes: for each initial input character, and detection inputs the initial input character When increment key state the corresponding signal of the initial input character is subjected to increment when the increment key is in running order Or corresponding effective input character is used as after decrement.When user inputs initial input character, if user is specific in activation Input mode in the case where inputted, then terminal according to scheduled instruction secure strategy to the initial input character of input into Row identification, comprising: each of initial input character inputted for user in the case where activating specific input mode is just The input character that begins is performed both by particular procedure to determine character that user actually enters.Wherein, specific input mode includes following At least one: addition process, subtraction process.
In corresponding application scenarios, terminal is specially intelligent handheld device, during using intelligent handheld device, is made Toe Transplantation for Segmental Finger for contactant is located at the screen back side and is blocked, and a touch screen is added at the intelligent handheld device back side or presses Key, it is specific as shown in Fig. 2, the behind of intelligent handheld device touch screen is formed plastics patch progress subregion with plastics patch There are five touch part for profile-tool of bunge bedstraw herb;Part can be touched by each of the touch perception bunge bedstraw herb of finger Specific location.In the service logic of intelligent handheld device, service logic can to touch screen five touches part respectively into Row definition: the long-pressing of circular touch region 3 seconds of middle indicating will to input secret information, and four touch areas of surrounding can be with The desired different increments of user are respectively set: the first incremental area adds 1 for increment to be arranged, the second incremental area, for setting It sets increment and adds 0, third incremental area adds 2 for increment to be arranged, and the 4th incremental area subtracts 1 for increment to be arranged.
When need to guarantee the information-that is inputted into the first application program of terminal such as account No. or password not by When stealing, the index finger in screen back face can be made to click the predefined region realization of the touch screen or key to the initial of input It inputs character and carries out auto-increment.For inputting effectively input character 5321b in the first application program to terminal, to prevent Effectively input character is stolen, and user is long to pin circular touch regional sustained 3 seconds to activate concealed input function, and is inputting Each character is inputted using different input modes when initial input character, comprising:
Step a when inputting initial input character 6, clicks the 4th incremental area, since the 4th incremental area is to initial input The increment that character executes is to subtract one, therefore corresponding obtained effective input character is 5;
Step b inputs initial input character 5, does not click any incremental area;
Step c inputs initial input character 4, does not click any incremental area;
Step d when inputting initial input character 3, clicks the second incremental area, then corresponding obtained effective input character is 3;
Step e when inputting initial input character 2, clicks the second incremental area, then corresponding obtained effective input character is 2;
Step f inputs initial input character 1, does not click any incremental area;
Step g when inputting initial input character 0, clicks the first incremental area, since the first incremental area is to initial input The increment that character executes is to add one, then corresponding obtained effective input character is 1;
Step h when inputting initial input character a, clicks the first incremental area, since the first incremental area is to initial input The increment that character executes is to add one, then corresponding obtained effective input character is b.
During the above-mentioned each initial input character of input, input mode when inputting each initial input character is not Together, and according to instruction secure strategy some incremental area-realization is clicked to initial input it is found that initial input character is added Character carry out increment, then be capable of forming effectively input character, input initial input character when do not have click incremental area can not It is identified as effectively inputting character, therefore finally obtained effective input character is 5321b, can be executed by intelligent handheld device.
Using provided technical solution, secret information can be more easily protected, and due to the Internet bank, concealed phone The number of equal applications is not very frequently, thus can pass through one common touch screen of increase on intelligent handheld device can be real It is existing, at low cost and easy realization.Each incremental area in need for confidentiality using bunge bedstraw herb touch screen carries out that hidden plus one subtracts First-class incremental computations.The technical solution is used on intelligent handheld device, so that intelligent handheld device can customize touch screen Mode of operation preferably merges with product design and has better security performance.
In technology provided by embodiment, changed according to the coupled capacitor of terminal described when inputting each initial input character Situation determines the dynamics or contact area for inputting the initial input character.Scheduled instruction secure strategy is a service logic; Determine that the corresponding effective input character of the initial input character includes: for each initial input character, detection input The contact area formed between contactant and the touch screen of the terminal when initial input character meets in the contact area It is corresponding effective input character by the initial input character recognition when area threshold range;Wherein, by utilizing the contact Object inputs the initial input character on the touch screen of terminal.Terminal is specially intelligent communication device-such as mobile phone, such as Shown in Fig. 3, based on the touch screen of detectable face contact area, the course of work of intelligent communication device includes:
Step 301, when user needs to input the private informations such as password, with long-pressing or an intelligent communication device left side can be double-clicked The modes such as side volume key, activation input service logic corresponding to secret information, and the service logic is on the backstage that intelligence communication is set Operation.
Step 302, after activating the service logic, initial input character is inputted by normally clicking touch screen, and make a reservation for Instruction secure strategy by the vibration prompting input be initial input character;User exerts oneself point touching screen slightly to increase contact Area can input idle character, and the idle character is still shown on the touchscreen but without vibration prompting at this time;Due to vibration It can not be perceived by other people, so that peeper can not know effectively to input word included in the initial input character of input Symbol.
Wherein, effectively input character is received by the first application program.
Step 303, long-pressing or double-click intelligent communication device side switch can close business corresponding to input secret information Logic, the click of the different dynamics after closing input effectively input character.First application program is determined by user appropriate Moment closes.
In corresponding application scenarios, needs to input effectively input character 5321 into the first application program of terminal, be It prevents from effectively inputting character and be stolen, user starts the instruction secure strategy that terminal has, and in input initial input character When each character is inputted using different input modes, comprising:
A, when inputting initial input character 6, the contact area between contactant and the touch screen of the terminal is unsatisfactory for face Product threshold range;
B, when inputting initial input character 5, the contact area between contactant and the touch screen of the terminal meets area Threshold range;
C, when inputting initial input character 4, the contact area between contactant and the touch screen of the terminal is unsatisfactory for face Product threshold range;
D, when inputting initial input character 3, the contact area between contactant and the touch screen of the terminal meets area Threshold range;
E, when inputting initial input character 2, the contact area between contactant and the touch screen of the terminal meets area Threshold range;
F, when inputting initial input character 1, the contact area between contactant and the touch screen of the terminal meets area Threshold range.
During the above-mentioned each initial input character of input, input mode when inputting each initial input character is not Together, and according to instruction secure strategy it is found that when the contact area between contactant and the touch screen of terminal meets area threshold model It can be corresponding effective input character by initial input character recognition when enclosing;When between contactant and the touch screen of terminal It can not be corresponding effective input character by initial input character recognition when contact area is not able to satisfy area threshold range, because This finally obtained effective input character is 5321.
In technology provided by another embodiment, scheduled instruction secure strategy is a service logic;It determines described first Begin to input the corresponding effective input character of character to include: for each initial input character, detection inputs the initial input The initial input character recognition is to have when the dynamics detected meets predetermined dynamics threshold range by dynamics when character Effect input character.
Based on provided technical solution, changed according to the coupled capacitor of terminal described when inputting each initial input character Situation determines the dynamics or contact area for inputting the initial input character.Terminal can use capacitive touch screen, capacitive touch Touching screen construction includes: the thin-film body layer of layer of transparent to be plated in a glass screen as conductor layer, then one is added outside conductor layer Block protection glass, double Glass Designs can thoroughly protect conductor layer and inductor.It is coated with long and narrow electrode on four side of touch screen, A low-voltage AC electric field is formed in electric conductor.When touching screen, since there are electric field, finger and the meetings of conductor interlayer for human body Form a coupled capacitor, the electric current that four side electrodes issue can flow to contact, and electric current is strong and weak and finger to four side electrodes away from From directly proportional, positioned at touch screen backstage controller can calculating current ratio and power, the accurate position for calculating touch point.Electricity The double glass for holding touch screen can protect conductor layer and inductor, be effectively prevented external environment factor and impact to touch screen, Even if screen, which speckles with filthy, dust or grease stain, capacitive touch screen, still can accurately calculate touch location.Terminal can also use Resistive touch screen, resistive touch screen are a kind of sensors, it converts the physical location of touch point in rectangular area (X, Y) For the voltage for representing X-coordinate and Y coordinate.Many LCD modules all use resistive touch screen, this screen can with four lines, Five lines, seven lines or eight lines generate screen bias voltage, while the voltage for touch point of reading back.Resistive touch screen is substantially thin Film adds the structure of glass, is coated with nano indium tin metal oxide (ITO) coating, ITO in film and the adjacent one side of glass With good electric conductivity and the transparency.When touch operation, the ITO of film lower layer can touch the ITO of glass superstrate, via Inductor spreads out of corresponding electric signal, is sent to processor by conversion circuit, and X on screen, Y value are converted by operation, and The movement clicked is completed, and is presented on the screen.That is, touch screen includes two hyaline layers overlapped up and down, four lines and the touching of eight lines It touches screen to be made of two layers of transparent resistive material with similar face resistance, five lines and seven line touch screens are by a resistive layer and one A conductive layer composition, is usually also separated two layers with a kind of elastic material.When the pressure that touch screen surface is subject to (such as passes through Pen tip or finger are pressed) it is sufficiently large when, can generate and contact between top layer and bottom.All resistive touch screens all use Divider principle represents the voltage of X-coordinate and Y coordinate to generate, and realizes divider by the way that two resistance are connected, electricity Hinder (R1) connection reference voltage (VREF), resistance (R2) ground connection, voltage measuring value at two ohmic connection points and it is following that The resistance value of a resistance is directly proportional.
In corresponding application scenarios, needs to input effectively input character 5321 into the first application program of terminal, be It prevents from effectively inputting character and be stolen, user starts the instruction secure strategy that terminal has, and in input initial input character When each character is inputted using different input modes, comprising:
A, when inputting initial input character 6, the dynamics between contactant and the touch screen of the terminal is unsatisfactory for dynamics threshold It is worth range;
B, when inputting initial input character 5, the dynamics between contactant and the touch screen of the terminal meets dynamics threshold value Range;
C, when inputting initial input character 4, the dynamics between contactant and the touch screen of the terminal is unsatisfactory for dynamics threshold It is worth range;
D, when inputting initial input character 3, the dynamics between contactant and the touch screen of the terminal meets dynamics threshold value Range;
E, when inputting initial input character 2, the dynamics between contactant and the touch screen of the terminal meets dynamics threshold value Range;
F, when inputting initial input character 1, the dynamics between contactant and the touch screen of the terminal meets dynamics threshold value Range.
During the above-mentioned each initial input character of input, input mode when inputting each initial input character is not Together, and according to instruction secure strategy it is found that when the dynamics between contactant and the touch screen of terminal meets dynamics threshold range, It can be corresponding effective input character by initial input character recognition;When the dynamics between contactant and the touch screen of terminal not It can not be corresponding effective input character by initial input character recognition, therefore finally obtain when being able to satisfy dynamics threshold range Effective input character be 5321.Since the pressing dynamics to touch screen are difficult to be found by other people, and the shake that terminal is slight Dynamic prompt is even more that can not be perceived by stranger, and the first application program can be located at the running background of terminal, therefore can guarantee defeated Will not be stolen secret information during entering.
In another embodiment, scheduled instruction secure strategy is a service logic;Determine the initial input character pair The effective input character answered includes: contactant when detection inputs the initial input character for each initial input character The distance between touch screen of the terminal knows the initial input character when the distance meets distance threshold range It Wei not corresponding effective input character.Touch screen in embodiment, which can incude, is located at touch screen as the finger of contactant On point, while can also be as operation of the finger in the top preset distance of touch screen of contactant.Above the touch screen Contactant corresponding subpoint can also be perceived its position by the touch screen on the touchscreen, the position of the subpoint indicates Contactant at the position to operating.For each initial input character, subpoint when detection inputs the initial input character Area can be according to this since the distance between the touch screen of the area and contactant to the terminal is inversely proportional Inverse relation calculates the distance between the touch screen of contactant Yu the terminal: when contactant to the terminal touch screen it Between distance when increasing, the area of subpoint reduces, when the distance between contactant to the touch screen of the terminal reduces, throwing The area of shadow point increases.Quantitative calculating is carried out to inverse relation, obtains contactant and the end when inputting the initial input character The initial input character recognition is to correspond to when the distance meets distance threshold range by the distance between the touch screen at end Effective input character.
In corresponding application scenarios, needs to input effectively input character 5321 into the first application program of terminal, be It prevents from effectively inputting character and be stolen, user starts the instruction secure strategy that terminal has, and in input initial input character When each character is inputted using different input modes, comprising:
A, when inputting initial input character 6, the distance between the touch screen of contactant and the terminal is unsatisfactory for apart from threshold It is worth range;
B, when inputting initial input character 5, the distance between the touch screen of contactant and the terminal meets distance threshold Range;
C, when inputting initial input character 4, the distance between the touch screen of contactant and the terminal is unsatisfactory for apart from threshold It is worth range;
D, when inputting initial input character 3, the distance between the touch screen of contactant and the terminal meets distance threshold Range;
E, when inputting initial input character 2, the distance between the touch screen of contactant and the terminal meets distance threshold Range;
F, when inputting initial input character 1, the distance between the touch screen of contactant and the terminal meets distance threshold Range.
During the above-mentioned each initial input character of input, input mode when inputting each initial input character is not Together, and according to instruction secure strategy it is found that when the distance between the touch screen of contactant and the terminal meets distance threshold model It can be corresponding effective input character by initial input character recognition when enclosing;When contactant and the terminal touch screen it Between distance when being unsatisfactory for distance threshold range, can not be corresponding effective input character by initial input character recognition, therefore Finally obtained effective input character is 5321.
Corresponding, the embodiment of the present invention provides a kind of terminal, as shown in Figure 4, comprising:
First application program module 401, for obtaining effectively input character;
Input module 402 has input frame, for obtaining the initial input character of input, by the initial input character It is shown in the input frame;
Input mode obtains module 403, inputs the input mode of the initial input character for identification;
Identification module 404 determines the initial input for being based on the input mode and scheduled instruction secure strategy The corresponding effective input character of character;Effective input character is supplied to first application program module 401.
Using technological means provided in an embodiment of the present invention, using instruction secure strategy to the initial input character of input into Row, which identifies, simultaneously to be converted to form effective instruction, allow user in the case of environment complexity need not scruple onlooker and can be The various privacy informations of safe input and security information, are effectively guaranteed the safety of privacy information and security information in terminal Property.
In terminal further include:
Contact area detection module, for for each initial input character, detection to input the initial input character When contactant and the touch screen of the terminal between the contact area that is formed, meet area threshold range in the contact area When, it is corresponding effective input character by the initial input character recognition;Wherein, by utilizing the contactant in the touching of terminal It touches and inputs the initial input character on screen.
Apart from detection module, for for each initial input character, detection to connect when inputting the initial input character The distance between the touch screen for touching object and the terminal, when the distance meets distance threshold range, by the initial input word Symbol is identified as corresponding effective input character.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (7)

1. a kind of implementation method inputted safely, applied to a terminal with display screen, the terminal includes first using journey Sequence characterized by comprising
The initial input character for obtaining input, the initial input character is shown in an input frame;
Identification inputs the input mode of the initial input character;
Based on the input mode and scheduled instruction secure strategy, the corresponding effective input word of the initial input character is determined Symbol, comprising: for each initial input character, the state of increment key when detection inputs the initial input character, when described When increment key is in running order, have after the corresponding signal of the initial input character is carried out increment or is reduced as corresponding Effect input character;
Effective input character is supplied to first application program.
2. a kind of implementation method inputted safely according to claim 1, which is characterized in that each initial defeated according to input Enter the coupled capacitor situation of change of terminal when character, determines the dynamics or contact area for inputting the initial input character.
3. a kind of implementation method inputted safely according to claim 1, which is characterized in that determine the initial input word According with corresponding effective input character includes:
For each initial input character, detection inputs the dynamics when initial input character, when the dynamics detected is full It is effectively to input character by the initial input character recognition when the predetermined dynamics threshold range of foot.
4. a kind of implementation method inputted safely according to claim 1, which is characterized in that determine the initial input word According with corresponding effective input character includes:
For each initial input character, the touch screen of contactant and terminal when detection inputs the initial input character The distance between, it is corresponding effective input by the initial input character recognition when the distance meets distance threshold range Character.
5. a kind of terminal inputted safely characterized by comprising
First application program module, for obtaining effectively input character;
Input module has input frame, and for obtaining the initial input character of input, the initial input character is shown in institute It states in input frame;
Input mode obtains module, inputs the input mode of the initial input character for identification;
Identification module determines the initial input character pair for being based on the input mode and scheduled instruction secure strategy The effective input character answered, comprising: for each initial input character, increment key when detection inputs the initial input character State the corresponding signal of the initial input character is subjected to increment or decrement when the increment key is in running order It is used as corresponding effective input character afterwards;Effective input character is supplied to first application program module.
6. a kind of terminal inputted safely according to claim 5, which is characterized in that further include:
Contact area detection module, for for each initial input character, detection to connect when inputting the initial input character The contact area formed between touching object and the touch screen of the terminal will when the contact area meets area threshold range The initial input character recognition is corresponding effective input character;Wherein, by utilizing the contactant in the touch screen of terminal The upper input initial input character.
7. a kind of terminal inputted safely according to claim 5, which is characterized in that further include:
Apart from detection module, for detecting contactant when inputting the initial input character for each initial input character The distance between touch screen of the terminal knows the initial input character when the distance meets distance threshold range It Wei not corresponding effective input character.
CN201610108393.7A 2011-03-09 2011-03-09 A kind of implementation method and terminal inputted safely Active CN105808139B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610108393.7A CN105808139B (en) 2011-03-09 2011-03-09 A kind of implementation method and terminal inputted safely

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110056603.XA CN102681652B (en) 2011-03-09 2011-03-09 A kind of implementation method of safety input and terminal
CN201610108393.7A CN105808139B (en) 2011-03-09 2011-03-09 A kind of implementation method and terminal inputted safely

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201110056603.XA Division CN102681652B (en) 2011-03-09 2011-03-09 A kind of implementation method of safety input and terminal

Publications (2)

Publication Number Publication Date
CN105808139A CN105808139A (en) 2016-07-27
CN105808139B true CN105808139B (en) 2019-02-05

Family

ID=46813699

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610108393.7A Active CN105808139B (en) 2011-03-09 2011-03-09 A kind of implementation method and terminal inputted safely
CN201110056603.XA Active CN102681652B (en) 2011-03-09 2011-03-09 A kind of implementation method of safety input and terminal

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201110056603.XA Active CN102681652B (en) 2011-03-09 2011-03-09 A kind of implementation method of safety input and terminal

Country Status (1)

Country Link
CN (2) CN105808139B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105808139B (en) * 2011-03-09 2019-02-05 联想(北京)有限公司 A kind of implementation method and terminal inputted safely
CN104182679A (en) * 2014-08-21 2014-12-03 广东欧珀移动通信有限公司 Character inputting method and character inputting device for mobile terminal
US10602054B2 (en) * 2014-09-12 2020-03-24 Microsoft Technology Licensing, Llc Video capture with privacy safeguard
CN104598786B (en) * 2015-01-20 2017-12-15 广东欧珀移动通信有限公司 A kind of cipher-code input method and device
CN104915612B (en) * 2015-06-05 2017-09-26 飞天诚信科技股份有限公司 A kind of realization method and system of safely inputting information
CN105426100A (en) * 2015-10-30 2016-03-23 努比亚技术有限公司 Pressure sensor based password input method and apparatus
WO2020150984A1 (en) * 2019-01-25 2020-07-30 深圳市汇顶科技股份有限公司 Contact area calculating method and apparatus, touch chip, and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1333495A (en) * 2001-04-15 2002-01-30 黄银 Hidden safety cipher
CN201467167U (en) * 2009-08-07 2010-05-12 薛明 Password encoder and password protection system
WO2010105249A1 (en) * 2009-03-13 2010-09-16 Rutgers, The State University Of New Jersey Systems and methods for the detection of malware
CN102681652B (en) * 2011-03-09 2016-03-30 联想(北京)有限公司 A kind of implementation method of safety input and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1333495A (en) * 2001-04-15 2002-01-30 黄银 Hidden safety cipher
WO2010105249A1 (en) * 2009-03-13 2010-09-16 Rutgers, The State University Of New Jersey Systems and methods for the detection of malware
CN201467167U (en) * 2009-08-07 2010-05-12 薛明 Password encoder and password protection system
CN102681652B (en) * 2011-03-09 2016-03-30 联想(北京)有限公司 A kind of implementation method of safety input and terminal

Also Published As

Publication number Publication date
CN102681652A (en) 2012-09-19
CN102681652B (en) 2016-03-30
CN105808139A (en) 2016-07-27

Similar Documents

Publication Publication Date Title
CN105808139B (en) A kind of implementation method and terminal inputted safely
US9819676B2 (en) Biometric capture for unauthorized user identification
US20150185946A1 (en) Touch surface having capacitive and resistive sensors
CN204066138U (en) There is the electronic installation of fingerprint sensing function
CN103513869A (en) Method and device for displaying terminal lock screen interface and Widget
CN108632462A (en) Processing method, device, storage medium and the electronic equipment of split screen display available
CN102023735A (en) Touch input equipment, electronic equipment and mobile phone
CN106201147A (en) Touch base plate and display device
CN105279477A (en) Electronic device having fingerprint sensing function and call method of application program thereof
CN104216597A (en) Touch detection method and system of resistive touch screen
US9329740B2 (en) Method of recognizing touch
CN107346169B (en) OLED display panel and control method thereof
CN108062175B (en) Screen operation control method and device and terminal
CN105786377A (en) Touch control monitoring method and device and terminal
CN104063142B (en) Information processing method, device and electronic equipment
CN103809793B (en) Information processing method and electronic device
CN108008865A (en) Touch screen with fingerprint identification function and preparation method thereof and display device
CN105786181B (en) A kind of implementation method and terminal inputted safely
CN104516570B (en) Flip-type electronic device and calibration method thereof
CN105929580A (en) Resistive touch display device
US20220404925A1 (en) Touch screen display with touchless gestures and methods for use therewith
CN108133193A (en) Display module, fingerprint sensor and electronic equipment
CN208622074U (en) Mobile-payment system and its screen construction based on fingerprint recognition
CN208506771U (en) Mobile-payment system and its non-visible area domain structure based on fingerprint recognition
TWI647604B (en) Touch human-machine interface device and operation method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant