CN107633174A - A kind of user inputs management method and device, terminal - Google Patents
A kind of user inputs management method and device, terminal Download PDFInfo
- Publication number
- CN107633174A CN107633174A CN201610570352.XA CN201610570352A CN107633174A CN 107633174 A CN107633174 A CN 107633174A CN 201610570352 A CN201610570352 A CN 201610570352A CN 107633174 A CN107633174 A CN 107633174A
- Authority
- CN
- China
- Prior art keywords
- interference
- byte
- input method
- character
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Input From Keyboards Or The Like (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiments of the invention provide a kind of user to input management method and device, terminal;This method includes:When input method is called by intended application, detect clicking operation of the user in input method inputting interface, after clicking operation is detected, generation interference is operated and transmitted to input method, interference operation is used to generate interference byte by input method, receives the byte to be entered that input method operates generation according to clicking operation and interference, deletes the interference byte that the input method in byte to be entered operates generation according to interference, target byte is generated, target byte is inputted to the inputting interface of intended application.Pass through the implementation of the embodiment of the present invention, because clicking operation and interference operation all generate corresponding byte by input method, the input record obtained by input method includes clicking operation and interference operation, can not be by the record of input method come illegal, accurately acquisition user clicking operation, and then the privacy information of user can not be calculated.
Description
Technical field
The present invention relates to user to input field, more particularly to a kind of user inputs management method and device, terminal.
Background technology
Rapid growth is obtained in the service of mobile phone terminal with the business such as quick popularization, mobile payment of smart mobile phone,
Thing followed customer information is stolen and monetary losses are but as a big security threat of domestic consumer.For example a kind of privacy is stolen
Viroid --- " keyboard evil backstage manipulator ", once popular in overseas, the virus is packaged into well-known cellphone inputting method SwiftKey
In KeyBoard, can direct monitoring users input through keyboard, upload leakage user account password information, in addition including credit card,
Net silver etc. pays data, and the viral harm is extremely serious., can be because input when i.e. user is using input method input privacy information
Method is invaded, and causes the leakage of user privacy information.
The content of the invention
The embodiments of the invention provide a kind of user to input management method and device, terminal, to solve prior art presence
Because input method invaded cause user privacy information compromised the problem of.
On the one hand, there is provided a kind of user inputs management method, including:
When input method is called by intended application, clicking operation of the detection user in input method inputting interface;
After clicking operation is detected, generation interference, which is operated and transmitted to input method, interference operation, to be used to pass through input method
Generation interference byte;
Receive the byte to be entered that input method operates generation according to clicking operation and interference;
The interference byte that the input method in byte to be entered operates generation according to interference is deleted, generates target byte;
By the inputting interface of target byte input intended application.
On the one hand, there is provided a kind of user inputs managing device, including:Detection module, interference module and interference module is gone,
Wherein,
Detection module is used for when input method is called by intended application, and detection user grasps in the click of input method inputting interface
Make;
Interference module is used for after clicking operation is detected, generation interference is operated and transmitted to input method, interference operation and uses
Byte is disturbed in being generated by input method;
Interference module is gone to be used to receive the byte to be entered that input method operates generation according to clicking operation and interference, deletion is treated
The input method inputted in byte operates the interference byte of generation according to interference, generates target byte, target byte is inputted into target
The inputting interface of application.
On the one hand, there is provided a kind of terminal, including:Input module, application target, input method module and processor, wherein,
Input module is used to receive user's operation, generates clicking operation;
Application module, which is used to be operated according to user, starts intended application, and calls input in the inputting interface of intended application
Method;
Input method module includes at least one input method, for calling input method to generate byte according to input operation, and it is defeated
Go out, input operation includes clicking operation and interference operation;
Processor is used for when input method is called by intended application, and detection user grasps in the click of input method inputting interface
Make, after clicking operation is detected, generation interference operation is simultaneously transmitted to input method, and interference operation, which is used to generate by input method, to be done
Byte is disturbed, the byte to be entered that input method operates generation according to clicking operation and interference is received, deletes defeated in byte to be entered
Enter the interference byte that method operates generation according to interference, generate target byte, target byte is inputted to the inputting interface of intended application.
On the other hand, there is provided a kind of computer-readable storage medium, be stored with computer in computer-readable storage medium and can perform
Instruction, computer executable instructions are used to perform foregoing user's input management method.
The beneficial effect of the embodiment of the present invention:
The embodiments of the invention provide a kind of user to input management method, and this method is detecting one click of user's input
After operation, an interference operation is generated, interference byte corresponding to interference operation is deleted at intended application interface;Due to clicking operation
And interference operation all generates corresponding byte by input method, therefore, the input record obtained by input method includes clicking operation
And interference operation, even if so input method is invaded, it can not obtain user's by the record of input method come illegal, accurate
Clicking operation, and then the input content of user can not be calculated according to clicking operation, it can not illegally obtain user and pass through input
The privacy information of method input, it is existing because input method is invaded asking of causing user privacy information compromised to solve prior art
Topic, enhance the usage experience of user.
Brief description of the drawings
Fig. 1 is the flow chart that the user that first embodiment of the invention provides inputs management method;
Fig. 2 is the structural representation that the user that second embodiment of the invention provides inputs managing device;
Fig. 3 is the structural representation for the terminal that third embodiment of the invention provides;
Fig. 4 is the input method block schematic illustration that fourth embodiment of the invention is related to;
Fig. 5 is the implementation process figure of existing input method;
Fig. 6 is the input method workflow diagram that fourth embodiment of the invention provides;
Fig. 7 is the schematic diagram for the target program inputting interface that fourth embodiment of the invention is related to.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is part of the embodiment in the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Further annotation explanation is now made to the present invention by way of embodiment combination accompanying drawing.
First embodiment:
Fig. 1 is the flow chart that the user that first embodiment of the invention provides inputs management method, as shown in Figure 1, this implementation
The user that example provides, which inputs management method, to be included:
S101:When input method is called by intended application, clicking operation of the detection user in input method inputting interface;
In actual applications, input method inputting interface can be direct using terminal button to realize or touch
Touch in screen terminal, realized by way of virtual key;Clicking operation includes the button operation of user and/or in dummy keyboard
On pressing, the operation such as touching.
S102:After clicking operation is detected, generation interference, which is operated and transmitted to input method, interference operation, to be used for by defeated
Enter method generation interference byte;
Interference operation is independently triggered by terminal, and non-user click, for protecting user to actually enter purpose not
Method record can be transfused to.
S103:Receive the byte to be entered that input method operates generation according to clicking operation and interference;
For input method when receiving input operation, meeting byte according to corresponding to generating preset relation, this is not this implementation
The emphasis of example concern, is repeated no more;In the present embodiment, input operation just including user clicking operation and terminal generation
The intention that actually enters of user cannot be known/be recorded to interference operation, such input method, and especially bank account password etc. is related to
The privacy information of fund security.
S104:The interference byte that the input method in byte to be entered operates generation according to interference is deleted, generates target byte;
After deleting interference byte, the target byte of generation is the content that user is actually subjected to input, thus will not be because of dry
Disturb the problem of operation causes user's input error.
S105:By the inputting interface of target byte input intended application.
In certain embodiments, in above-described embodiment after clicking operation is detected, generation interference operate and transmit to
Input method includes:
Obtain the position coordinates of each character on input method inputting interface;
After clicking operation is detected, according to default interference rule, interference character to be triggered is selected, character will be disturbed
Position as interference operation position coordinates;
According to the position coordinates of interference operation, generation interference operation, and transmit to input method.
In actual applications, it can be any regular to disturb rule, appointed such as from all characters of input method inputting interface
Meaning selects one or more characters to correspond to the character late conduct of character as interference character, or selection user's clicking operation
Disturb character etc. mode;In certain embodiments, if interference rule is to be selected in the adjacent character for correspond to character from clicking operation
It is regular according to default interference in above-described embodiment when selecting at least one character as interference character, select to be triggered do
Disturbing character includes:
Obtain the position coordinates that clicking operation corresponds to character;
The position coordinates of character is corresponded to according to the position coordinates of each character and clicking operation on input method inputting interface,
Determine that clicking operation corresponds to the adjacent character of character;
At least one character of selection from adjacent character is as interference character.
In certain embodiments, in above-described embodiment after clicking operation is detected, generation interference operation include:
After clicking operation is detected, before input method generates byte according to clicking operation, generation interference operation;And/or
Detect clicking operation and input method according to clicking operation generate byte after, generation interference operation.
In certain embodiments, the user in above-described embodiment inputs management method, defeated in byte to be entered is deleted
Before entering the interference byte that method operates generation according to interference, in addition to:
The mapping relations of byte are generated according to operation according to input method, it is determined that interference byte corresponding to interference operation;
Interference byte is identified display;
The input method deleted in byte to be entered includes according to the interference byte of interference operation generation:Delete and be identified display
Byte.
In certain embodiments, the input method in the deletion byte to be entered in above-described embodiment is according to interference operation generation
Interference byte include:
After detecting input method according to interference operation generation interference byte, interference byte is deleted immediately;And/or
After detecting that user closes the completion input of input method inputting interface, grasped in input method according to clicking operation and interference
In all bytes to be entered that work generates, all interference bytes are deleted.
Second embodiment:
Fig. 2 is the structural representation that the user that second embodiment of the invention provides inputs managing device, as shown in Figure 2, this
The user that embodiment provides, which inputs managing device, to be included:Detection module 21, interference module 22 and interference module 23 is gone, wherein,
Detection module 21 is used for when input method is called by intended application, click of the detection user in input method inputting interface
Operation;
Interference module 22 is used for after clicking operation is detected, generation interference is operated and transmitted to input method, interference operation
For generating interference byte by input method;
Go interference module 23 to be used to receive the byte to be entered that input method operates generation according to clicking operation and interference, delete
Input method in byte to be entered operates the interference byte of generation according to interference, generates target byte, target byte is inputted into mesh
Mark the inputting interface of application.
In certain embodiments, the interference module 22 in above-described embodiment is used to obtain each character on input method inputting interface
Position coordinates;After clicking operation is detected, the position coordinates that clicking operation corresponds to character is obtained, boundary is inputted according to input method
The position coordinates of each character and clicking operation correspond to the position coordinates of character on face, determine that clicking operation corresponds to the phase of character
Adjacent character, at least one character of selection from adjacent character operate the position for disturbing character as interference as interference character
Position coordinates, according to the position coordinates of interference operation, generation interference operation, and transmit to input method.
In certain embodiments, the interference module 22 in above-described embodiment is used to generate byte according to operation according to input method
Mapping relations, it is determined that interference operation corresponding to interference byte, will interference byte be identified display;Interference module is gone to be used to delete
Except the byte of identified display.
In certain embodiments, interference module 23 is gone to be used to detect input method according to interference behaviour in above-described embodiment
After making generation interference byte, interference byte is deleted immediately;And/or detecting that it is defeated that user closes the completion of input method inputting interface
After entering, in input method operates all bytes to be entered of generation according to clicking operation and interference, all interference bytes are deleted.
In actual applications, all functional modules in embodiment illustrated in fig. 2, processor, editorial logic can be used
The modes such as device are realized.
3rd embodiment:
Fig. 3 is the structural representation for the terminal that third embodiment of the invention provides, from the figure 3, it may be seen that what the present embodiment provided
Terminal includes:Input module 31, application module 32, input method module 33 and processor 34, wherein,
Input module 31 is used to receive user's operation, generates clicking operation;It can be physical button in terminal, touch
Shield the virtual key of display, can also be button that external accessory provides etc.;
Application module 32, which is used to be operated according to user, starts intended application, and calls input in the inputting interface of intended application
Method;After input method is called, a triggering message can be sent to processor 34;
Input method module 33 includes at least one input method, for calling input method to generate byte according to input operation, and
Output, input operation include clicking operation and interference operation;
Processor 34 is used to receive triggering message, it is believed that when input method is called by intended application, user is defeated for detection
Enter the clicking operation of method inputting interface, after clicking operation is detected, generation interference is operated and transmitted to input method, interference operation
For generating interference byte by input method, the byte to be entered that input method operates generation according to clicking operation and interference is received,
The interference byte that the input method in byte to be entered operates generation according to interference is deleted, generates target byte, target byte is defeated
Enter the inputting interface of intended application.
In certain embodiments, the processor 34 in above-described embodiment is used to obtain each character on input method inputting interface
Position coordinates;After clicking operation is detected, according to default interference rule, interference character to be triggered is selected, by noise word
Position coordinates of the position of symbol as interference operation;According to the position coordinates of interference operation, generation interference operation, and transmit to defeated
Enter method.
In certain embodiments, if upper interference rule is to select at least one in the adjacent character for correspond to character from clicking operation
When individual character is as interference character, states the processor 34 in embodiment and be used to obtain the position coordinates that clicking operation corresponds to character;
The position coordinates of character is corresponded to according to the position coordinates of each character and clicking operation on input method inputting interface, it is determined that clicking on
The adjacent character of the corresponding character of operation;At least one character of selection from adjacent character is as interference character.
In certain embodiments, the processor 34 in above-described embodiment is used for after clicking operation is detected, input method root
Before byte being generated according to clicking operation, generation interference operation;And/or detect clicking operation and input method according to click on grasp
After making generation byte, generation interference operation.
In certain embodiments, the processor 34 in above-described embodiment is used to generate byte according to operation according to input method
Mapping relations, it is determined that interference byte corresponding to interference operation;Interference byte is identified display;Delete the word for being identified display
Section.
In certain embodiments, the processor 34 in above-described embodiment is used to detect input method according to interference operation life
Into after interference byte, interference byte is deleted immediately;And/or after detecting that user closes the completion input of input method inputting interface,
In input method operates all bytes to be entered of generation according to clicking operation and interference, all interference bytes are deleted.
Fourth embodiment:
Further annotation explanation is done to the present invention in conjunction with concrete application scene.
For the present embodiment when user is by input method inputting character information, terminal system is automatically in the character letter of user's input
Scrambler, and the scrambler that deletion system is automatically added in the target program of input content are added in breath, can so not influenceed
For user normally in the case of input, input method procedure can not be accurately obtained the real content of user's input, realize the peace of content
Full input.
Terminal system adds scrambler in the character information of user's input automatically, refers to click on enter key on screen in user
Some character in disk, when producing input coordinate, system in coordinate queue, adds other coordinates, for generating scrambler automatically.
In detail, user click on screen when, system input device file can record user input coordinate value, such as
In intelligence system based on Linux, the coordinate information of touch screen can be recorded in input equipment file/dev/input/event*
In.Under the method for safety input, system can click on the coordinate of generation as standard using user, single according to certain rule, generation
Or multiple interference coordinates, and be written in input equipment file/dev/input/event*.When input method procedure, to respond these defeated
When entering coordinate, multiple characters can be sequentially generated, the normal character of user's input and doing for system addition are contained in these characters
Character is disturbed, these characters of input method generation can all be sent to target program.
The target program of input content refers to a series of software applications installed in terminal system, such as social software, hand
Machine banking software etc..
When input method procedure generates character, and character is sent into target program, terminal system is by character queue
Character deletion is disturbed, only retains the normal character of user's input.
Terminal system delete interference character method be by parsing target program interface control, obtaining the character of control,
Then by the interference character deletion on control.
In detail, the specific method for parsing target program interface control information is to obtain current interface control by function interface
Part information, such as control information can be obtained by dumpWindowHierarchy interfaces in Android platform terminal, or
Control information is obtained by UiAutomator dump orders.
Further, the word content of control can be changed by function interface after interface control information is got.Example
The text envelope of control can be set such as in Android platform terminal by the settext methods in UiAutomator class libraries
Breath, so as to complete to disturb character deletion in control text.
Based on above-mentioned technical proposal, in the case where input method procedure is by malicious intrusions, rogue program also can not be received accurately
Collect the real content of user's input, so as to reach the purpose inputted safely.
Specifically, by taking the mobile phone of android system as an example, as shown in figure 4, intelligent terminal input method system framework includes
Target program, system process, input method process three parts;Work as target program, as social software, Mobile banking's software need to input
During character content, input method procedure is opened to system process application first, when system process receives application, binding input frame is simultaneously
Display input method.Such as respectively in target program, system process and input method process in the system terminal based on Android
It is middle to be carried out respectively by InputMethodManager, InputMethodManagerService, InputMethodService
Collaborative interactive.When binding input frame and after display input method, user's point touching screen, input method process generation character, and by word
Symbol sends target program to, after target program receives character, is shown on corresponding control.
As shown in figure 5, user's point touching screen, input the general flow of character is included such as existing input method workflow
Under several steps:
S502, user click on some character on screen entering method keyboard, such as alphabetical a.
S504, touch-screen driver response click action, generates the coordinate of click location, and co-ordinate content is reported
Terminal input subsystem.
S506, terminal input subsystem will drive the content reported to write in input equipment file, such as based on linux
Intelligence system in, input equipment file is under/dev/input/ catalogues.
S508, terminal input subsystem monitors the content change in input equipment file, and original coordinates information is carried out
Encapsulation, is sent to upper level applications (i.e. in a manner of incoming event:Input method procedure).
S510, input method procedure response incoming event, generates character, such as alphabetical a.
S512, target program receive the character that sends over of input program, and by the currently displayed focus that obtains of character
On control.
Above process step completes the input of character, and in this flow, user it is expected that all characters of input pass through
Input method procedure generates, so, when input method procedure is invaded, when input method procedure is insincere, all the elements of user's input
Can directly it be stolen, security risk is very high.Safety input flow proposed by the present invention can solve this problem.
The method of work for the input method that the present embodiment provides is as shown in fig. 6, character safety input flow comprises the following steps:
S602, user click on some character on screen entering method keyboard, such as alphabetical a.
S604, touch-screen driver response click action, generates the coordinate of click location, and co-ordinate content is reported
Terminal input subsystem.
S606, terminal input subsystem will drive the content reported to write in input equipment file, such as based on linux
Intelligence system in, input equipment file is under/dev/input/ catalogues.
S608, terminal input subsystem monitors the content change in input equipment file, and original coordinates information is carried out
Encapsulation, is sent to upper level applications (i.e. in a manner of incoming event:Input method procedure).
S610, input method procedure response incoming event, generates character, such as alphabetical a.
S612, target program receive the character that sends over of input program, and by the currently displayed focus that obtains of character
On control.
S614, system process record the character that user has inputted in target program, such as alphabetical a, on this basis, system
Generation interference coordinate, be written to/dev/input input equipment files in.
In detail, the rule of system generation interference coordinate is the layout information by parsing current interface, obtains each word
The centre coordinate position of female control, some alphabetic coordinates therein are then taken out at random as interference coordinate.
S616, system monitor the interference coordinate information of the insertion in input equipment file, and are packaged, and it is defeated to send interference
Incoming event is to input method procedure.
S618, input method procedure response incoming event, generation interference character, such as alphabetical b.
S620, target program receives and shows all characters, such as ab.
S622, terminal system process obtain the character content of edit box in target program, and with record in step S614
Character content is compared, and is the character content recorded in step S614 by the content modification of target program edit box, so as to reach
To the purpose for deleting interference character.
In detail, step S620 and S622 is to complete in a short time, is automatically performed in real time by program, inputs character and deletes
Except the time shared by character can not the operation that is carried out of sensory perceptual system process all in Millisecond, the normal input process of user.
Above process step completes the safety input of character, in this flow, when user completes the input of a character
Afterwards, system quickly automatically generates interference coordinate, and generates interference character by input method, and then system process is by target program
In contain the input content of interference character and recover the character of user's input, the schematic diagram of this process is as shown in Figure 7.
In the figure 7, user clicks on screen and inputs alphabetical a schematic diagram as shown in S702;System automatically generates interference character
Target program inputs schematic diagram as shown in S704 afterwards, the character that can input user in S704 and the interference of system insertion
Character is shown with different font styles, is given user and is illustrated with the prompting of close friend, as the alphabetical b in schematic diagram is aobvious with colour
Show;In S706, interference character b is deleted, and only retains the content of user's input.
The present embodiment proposes a kind of secured inputting method, and this method can be on the existing input system basis of mobile terminal
On, security improvement is done in the input to common input method procedure, reduces the security risk brought in itself by input method procedure, larger journey
The safety coefficient of the lifting product of degree.
In summary, by the implementation of the embodiment of the present invention, following beneficial effect at least be present:
The embodiments of the invention provide a kind of user to input management method, and this method is detecting one click of user's input
After operation, an interference operation is generated, interference byte corresponding to interference operation is deleted at intended application interface;Due to clicking operation
And interference operation all generates corresponding byte by input method, therefore, the input record obtained by input method includes clicking operation
And interference operation, even if so input method is invaded, it can not obtain user's by the record of input method come illegal, accurate
Clicking operation, and then the input content of user can not be calculated according to clicking operation, it can not illegally obtain user and pass through input
The privacy information of method input, it is existing because input method is invaded asking of causing user privacy information compromised to solve prior art
Topic, enhance the usage experience of user.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardware
Formula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storage
The form for the computer program product that medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.).
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
It the above is only the embodiment of the present invention, any formal limitation not done to the present invention, it is every
Any simple modification, equivalent variations, combination or the modification that technical spirit according to the present invention is made to embodiment of above, still
Belong to the protection domain of technical solution of the present invention.
Claims (16)
1. a kind of user inputs management method, including:
When input method is called by intended application, clicking operation of the detection user in input method inputting interface;
After clicking operation is detected, generation interference, which is operated and transmitted to the input method, the interference operation, to be used to pass through institute
State input method generation interference byte;
Receive the byte to be entered that the input method operates generation according to the clicking operation and the interference;
The interference byte that the input method in byte to be entered operates generation according to the interference is deleted, generates target byte;
The target byte is inputted to the inputting interface of the intended application.
2. user as claimed in claim 1 inputs management method, it is characterised in that it is described after clicking operation is detected, it is raw
Operating and transmit to the input method into interference includes:
Obtain the position coordinates of each character on the input method inputting interface;
After clicking operation is detected, according to default interference rule, interference character to be triggered is selected, the position of character will be disturbed
Put the position coordinates as the interference operation;
According to the position coordinates of the interference operation, generation interference operation, and transmit to the input method.
3. user as claimed in claim 2 inputs management method, it is characterised in that if the interference rule is from clicking operation
It is described according to default interference rule, choosing when at least one character is selected in the adjacent character of corresponding character as interference character
Selecting interference character to be triggered includes:
Obtain the position coordinates that the clicking operation corresponds to character;
The position that character is corresponded to according to the position coordinates of each character and the clicking operation on the input method inputting interface is sat
Mark, determines that the clicking operation corresponds to the adjacent character of character;
At least one character of selection from the adjacent character is as interference character.
4. user as claimed in claim 1 inputs management method, it is characterised in that it is described after clicking operation is detected, it is raw
Include into interference operation:
After clicking operation is detected, before the input method generates byte according to clicking operation, the interference operation is generated;
And/or
Detect clicking operation and the input method according to clicking operation generate byte after, generate it is described interference operation.
5. user as claimed in claim 1 inputs management method, it is characterised in that described defeated in byte to be entered is deleted
Before entering interference byte of the method according to the interference operation generation, in addition to:
The mapping relations of byte are generated according to operation according to the input method, determine interference byte corresponding to the interference operation;
The interference byte is identified display;
The interference byte that the input method deleted in byte to be entered operates generation according to the interference includes:Delete quilt
Identify the byte of display.
6. the user as described in any one of claim 1 to 5 inputs management method, it is characterised in that described to delete word to be entered
The interference byte that the input method in section operates generation according to the interference includes:
After detecting the input method according to interference operation generation interference byte, the interference byte is deleted immediately;And/or
After detecting that user closes the input method inputting interface completion input, in the input method according to the clicking operation
And in all bytes to be entered of the interference operation generation, delete all interference bytes.
7. a kind of user inputs managing device, including:Detection module, interference module and interference module is gone, wherein,
The detection module is used for when input method is called by intended application, and detection user grasps in the click of input method inputting interface
Make;
The interference module is used for after clicking operation is detected, generation interference is operated and transmitted to the input method, described dry
Operation is disturbed to be used to generate interference byte by the input method;
It is described go interference module be used for receive the input method according to the clicking operation and it is described interference operate generation treat it is defeated
Enter byte, delete the interference byte that the input method in byte to be entered operates generation according to the interference, generate target word
Section, the target byte is inputted to the inputting interface of the intended application.
8. user as claimed in claim 7 inputs managing device, it is characterised in that the interference module is described defeated for obtaining
Enter the position coordinates of each character on method inputting interface;After clicking operation is detected, obtain the clicking operation and correspond to character
Position coordinates, character is corresponded to according to the position coordinates of each character and the clicking operation on the input method inputting interface
Position coordinates, determine that the clicking operation corresponds to the adjacent character of character, at least one character of the selection from the adjacent character
As interference character, the position of character will be disturbed as the position coordinates of the interference operation, according to the position of the interference operation
Coordinate, generation interference operation are put, and is transmitted to the input method.
9. user as claimed in claim 7 inputs managing device, it is characterised in that the interference module is used for according to described defeated
Enter the mapping relations that method generates byte according to operation, interference byte corresponding to the interference operation is determined, by the interference byte
It is identified display;It is described to go interference module to be used to delete the byte for being identified display.
10. the user as described in any one of claim 7 to 9 inputs managing device, it is characterised in that described to go interference module to use
In after detecting the input method according to interference operation generation interference byte, the interference byte is deleted immediately;And/or
Detect that user is closed after the input method inputting interface completes input, in the input method according to the clicking operation and described
In all bytes to be entered of interference operation generation, all interference bytes are deleted.
11. a kind of terminal, including:Input module, application module, input method module and processor, wherein,
The input module is used to receive user's operation, generates clicking operation;
The application module, which is used to be operated according to user, starts intended application, and calls input in the inputting interface of intended application
Method;
The input method module includes at least one input method, for calling input method to generate byte according to input operation, and it is defeated
Go out, the input operation includes clicking operation and interference operation;
The processor is used for when input method is called by intended application, and detection user grasps in the click of input method inputting interface
Make, after clicking operation is detected, generation interference, which is operated and transmitted to the input method, the interference operation, to be used for by described
Input method generation interference byte, receives the word to be entered that the input method operates generation according to the clicking operation and the interference
Section, the interference byte that the input method in byte to be entered operates generation according to the interference is deleted, generates target byte, will
The target byte inputs the inputting interface of the intended application.
12. terminal as claimed in claim 11, it is characterised in that the processor is used to obtain the input method inputting interface
The position coordinates of upper each character;After clicking operation is detected, according to default interference rule, noise word to be triggered is selected
Symbol, the position of character will be disturbed as the position coordinates of the interference operation;According to the position coordinates of the interference operation, generation
Interference operation, and transmit to the input method.
13. terminal as claimed in claim 12, it is characterised in that if the interference rule is to correspond to character from clicking operation
When at least one character is selected in adjacent character as interference character, the processor corresponds to word for obtaining the clicking operation
The position coordinates of symbol;Word is corresponded to according to the position coordinates of each character and the clicking operation on the input method inputting interface
The position coordinates of symbol, determine that the clicking operation corresponds to the adjacent character of character;Selection from the adjacent character is at least one
Character is as interference character.
14. terminal as claimed in claim 11, it is characterised in that the processor is used for after clicking operation is detected, institute
Before input method is stated according to clicking operation generation byte, the interference operation is generated;And/or detecting clicking operation and institute
After input method is stated according to clicking operation generation byte, the interference operation is generated.
15. terminal as claimed in claim 11, it is characterised in that the processor is used for according to the input method according to operation
The mapping relations of byte are generated, determine interference byte corresponding to the interference operation;The interference byte is identified display;
Delete the byte for being identified display.
16. the terminal as described in any one of claim 11 to 15, it is characterised in that the processor be used for detect it is described
After input method operates generation interference byte according to interference, the interference byte is deleted immediately;And/or detecting user's closing
After the input method inputting interface completes input, generation is operated according to the clicking operation and the interference in the input method
In all bytes to be entered, all interference bytes are deleted.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610570352.XA CN107633174B (en) | 2016-07-18 | 2016-07-18 | User input management method and device and terminal |
PCT/CN2016/095340 WO2018014400A1 (en) | 2016-07-18 | 2016-08-15 | User input managing method, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610570352.XA CN107633174B (en) | 2016-07-18 | 2016-07-18 | User input management method and device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107633174A true CN107633174A (en) | 2018-01-26 |
CN107633174B CN107633174B (en) | 2020-07-31 |
Family
ID=60991664
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610570352.XA Active CN107633174B (en) | 2016-07-18 | 2016-07-18 | User input management method and device and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107633174B (en) |
WO (1) | WO2018014400A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110188532A (en) * | 2019-05-05 | 2019-08-30 | 珠海格力电器股份有限公司 | Password protection method and device |
CN110598489A (en) * | 2018-06-13 | 2019-12-20 | 北京搜狗科技发展有限公司 | Privacy protection method for inputting prompt information and related device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101101625A (en) * | 2007-08-07 | 2008-01-09 | 江雨 | Input data safe treatment method and device |
CN104143068A (en) * | 2014-07-16 | 2014-11-12 | 宇龙计算机通信科技(深圳)有限公司 | Password authentication method and system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309260A (en) * | 2008-06-05 | 2008-11-19 | 周红伟 | Network authentication method on the basis of cryptoguard |
CN101808077B (en) * | 2009-02-13 | 2013-05-08 | 普天信息技术研究院有限公司 | Information security input processing system and method and smart card |
US9652440B2 (en) * | 2010-05-27 | 2017-05-16 | Microsoft Technology Licensing, Llc | Concurrent utilization of a document by multiple threads |
-
2016
- 2016-07-18 CN CN201610570352.XA patent/CN107633174B/en active Active
- 2016-08-15 WO PCT/CN2016/095340 patent/WO2018014400A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101101625A (en) * | 2007-08-07 | 2008-01-09 | 江雨 | Input data safe treatment method and device |
CN104143068A (en) * | 2014-07-16 | 2014-11-12 | 宇龙计算机通信科技(深圳)有限公司 | Password authentication method and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110598489A (en) * | 2018-06-13 | 2019-12-20 | 北京搜狗科技发展有限公司 | Privacy protection method for inputting prompt information and related device |
CN110598489B (en) * | 2018-06-13 | 2024-05-28 | 北京搜狗科技发展有限公司 | Privacy protection method and related device for input prompt information |
CN110188532A (en) * | 2019-05-05 | 2019-08-30 | 珠海格力电器股份有限公司 | Password protection method and device |
CN110188532B (en) * | 2019-05-05 | 2020-12-15 | 珠海格力电器股份有限公司 | Password protection method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2018014400A1 (en) | 2018-01-25 |
CN107633174B (en) | 2020-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2021202959B2 (en) | User interface for managing access to credentials for use in an operation | |
US9760707B2 (en) | Unlocking electronic devices using touchscreen input gestures | |
CN103891242B (en) | System and method for profile based filtering of outgoing information in a mobile environment | |
US20140201831A1 (en) | Method and apparatus for authenticating password of user terminal | |
CN105335633B (en) | A kind of mobile terminal glance prevention method and mobile terminal | |
CN105519038A (en) | Data protection based on user input during device boot-up, user login, and device shut-down states | |
CN105518699A (en) | Data protection based on user and gesture recognition | |
CN103810414A (en) | Password Presentation Management | |
CN106484231A (en) | A kind of method and device of application hides | |
CN111783055A (en) | Account information management method and device and electronic equipment | |
CN106355059A (en) | Password input method and terminal | |
CN106936999A (en) | Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently | |
CN107483704A (en) | A kind of private space method to set up and terminal device | |
CN106529235A (en) | Unlocking method and terminal | |
CN104346550A (en) | Information processing method and electronic equipment | |
CN103745150A (en) | Creation method of picture password account and application method of picture password account | |
CN107633174A (en) | A kind of user inputs management method and device, terminal | |
CN104966017B (en) | A kind of Password Input protects system and method | |
AU2016367092A1 (en) | Interception of touch pad events for handling in a secure environment | |
CN113282364A (en) | Display method, display device and electronic equipment | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium | |
WO2018053988A1 (en) | Secure input system and method, intelligent terminal, and storage medium | |
CN113238691A (en) | Application icon management method and device and electronic equipment | |
CN107577391A (en) | The method, apparatus and terminal device of a kind of Cipher Processing | |
CN106599642A (en) | Information leakage prevention method and electronic terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200706 Address after: 210012 Nanjing, Yuhuatai District, South Street, Bauhinia Road, No. 68 Applicant after: Nanjing Zhongxing Software Co.,Ltd. Address before: 518057 Nanshan District science and Technology Industrial Park, Guangdong high tech Industrial Park, ZTE building Applicant before: ZTE Corp. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |