CN112149193A - Keyboard authorization monitoring method and device, computer equipment and storage medium - Google Patents

Keyboard authorization monitoring method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN112149193A
CN112149193A CN202011209937.1A CN202011209937A CN112149193A CN 112149193 A CN112149193 A CN 112149193A CN 202011209937 A CN202011209937 A CN 202011209937A CN 112149193 A CN112149193 A CN 112149193A
Authority
CN
China
Prior art keywords
keyboard
authorization
information
behavior
authorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011209937.1A
Other languages
Chinese (zh)
Inventor
苏远锋
林标文
徐航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kehwin Technology Co ltd
Original Assignee
Shenzhen Kehwin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kehwin Technology Co ltd filed Critical Shenzhen Kehwin Technology Co ltd
Priority to CN202011209937.1A priority Critical patent/CN112149193A/en
Publication of CN112149193A publication Critical patent/CN112149193A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3041Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is an input/output interface
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to a keyboard authorization monitoring method, a device, computer equipment and a storage medium, wherein the method comprises the steps of carrying out biological characteristic authorization setting on a keyboard to obtain keyboard authorization information; acquiring information to be authorized; judging whether the information to be authorized can be successfully matched with the keyboard authorization information; if the information to be authorized can be successfully matched with the keyboard authorization information, the successfully matched information is sent to the second terminal, so that the second terminal can carry out secondary authorization; and when the result of the secondary authorization is that the authorization is approved, starting the use of the keyboard. According to the method and the device, authorization setting is carried out on the keyboard, verification of biological characteristics such as voiceprints and the like is required when the keyboard is used each time, secondary authorization of parents is carried out when the obtained information to be authorized is matched with the keyboard authorization information, the fact that the users agree to use at home is ensured, authorization control and monitoring of the input equipment matched with the electronic product and monitoring of the use condition are achieved, and therefore time of children using the electronic product is effectively controlled.

Description

Keyboard authorization monitoring method and device, computer equipment and storage medium
Technical Field
The invention relates to a keyboard monitoring method, in particular to a keyboard authorization monitoring method, a device, computer equipment and a storage medium.
Background
A keyboard is a command and data input device used to operate equipment and also refers to a set of function keys such as typewriters, computer keyboards, arranged to operate a machine or equipment through the system. The keyboard is also a part of a keyboard musical instrument, and may also refer to a musical instrument using a keyboard, such as a piano, a digital piano, or an electronic organ, etc., which is useful for practicing typing. The keyboard is the most common and main input device, and english letters, numbers, punctuations and the like can be input into the computer through the keyboard, so as to send commands, input data and the like to the computer. There are also keyboards with various shortcut keys. With the lapse of time, independent products with various quick functions are sold separately in the market gradually, and the products are provided with special driving and setting software, so that personalized operation can be realized on a compatible machine.
The existing keyboards are all used commonly, authorization control, use monitoring and the like are not performed, many parents cannot monitor the use condition of the keyboard matched with a computer at home, many children at home like playing games and surfing on the internet and the like by using the computer, and the parents cannot monitor the condition that the children use the keyboard by performing special treatment on the keyboard, so that the children cannot be effectively prevented from using electronic products in a transitional mode.
Therefore, it is necessary to design a new method for implementing authorization control and usage monitoring on the input device matched with the electronic product, so as to effectively control the time of the child using the electronic product.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a keyboard authorization monitoring method, a device, computer equipment and a storage medium.
In order to achieve the purpose, the invention adopts the following technical scheme: the keyboard authorization monitoring method comprises the following steps:
performing biological characteristic authorization setting on the keyboard to obtain keyboard authorization information;
acquiring information to be authorized;
judging whether the information to be authorized can be successfully matched with the keyboard authorization information;
if the information to be authorized can be successfully matched with the keyboard authorization information, the successfully matched information is sent to the second terminal, so that the second terminal can carry out secondary authorization;
and when the result of the secondary authorization is that the authorization is approved, starting the use of the keyboard.
The further technical scheme is as follows: after the starting of the use of the keyboard, the method further comprises the following steps:
acquiring the use condition of a keyboard;
analyzing the behavior of the keyboard to obtain the operation behavior of the user;
and sending the user operation behavior to a second terminal.
The further technical scheme is as follows: the setting of the biological feature authorization for the keyboard to obtain the keyboard authorization information includes:
acquiring a feature code and a request corresponding to the biological feature information uploaded from the keyboard to obtain keyboard authorization information;
and storing the keyboard authorization information and sending the keyboard authorization information to a second terminal.
The further technical scheme is as follows: the information to be authorized comprises a voiceprint feature code to be authorized and an authorization request.
The further technical scheme is as follows: the behavior analysis of the keyboard use condition to obtain the user operation behavior comprises:
and carrying out AI analysis on the keyboard use condition to obtain the user operation behavior.
The further technical scheme is as follows: the AI analysis of the keyboard use condition to obtain the user operation behavior comprises:
judging whether the use frequency of the direction keys in a set time period meets a first preset condition or not according to the use condition of the keyboard;
if the use frequency of the direction keys in a set time period meets a first preset condition, generating behavior information of a current user playing a game to obtain user operation behaviors;
if the direction key use frequency in the set time period does not accord with the first preset condition, judging whether the specific key use frequency in the set time period accords with the second preset condition;
if the use frequency of the specific key in the set time period meets a second preset condition, generating behavior information of the current user browsing the webpage to obtain user operation behaviors;
and if the use frequency of the specific key in the set time period meets a second preset condition, generating behavior information that the current user does not play games and browse webpages to obtain user operation behaviors.
The invention also provides a keyboard authorization monitoring device, comprising:
the authorization setting unit is used for carrying out biological characteristic authorization setting on the keyboard to obtain keyboard authorization information;
the information acquisition unit is used for acquiring information to be authorized;
the matching judgment unit is used for judging whether the information to be authorized can be successfully matched with the keyboard authorization information;
the secondary authorization unit is used for sending the successfully matched information to the second terminal if the information to be authorized can be successfully matched with the keyboard authorization information, so that the second terminal can carry out secondary authorization;
and the starting unit is used for starting the use of the keyboard when the result of the secondary authorization is that the authorization is approved.
The further technical scheme is as follows: further comprising:
the using condition acquiring unit is used for acquiring the using condition of the keyboard;
the behavior analysis unit is used for carrying out behavior analysis on the keyboard use condition to obtain a user operation behavior;
and the behavior sending unit is used for sending the user operation behavior to the second terminal.
The invention also provides computer equipment which comprises a memory and a processor, wherein the memory is stored with a computer program, and the processor realizes the method when executing the computer program.
The invention also provides a storage medium storing a computer program which, when executed by a processor, is operable to carry out the method as described above.
Compared with the prior art, the invention has the beneficial effects that: according to the method and the device, authorization setting is carried out on the keyboard, verification of biological characteristics such as voiceprints and the like is required when the keyboard is used each time, secondary authorization of parents is carried out when the obtained information to be authorized is matched with the keyboard authorization information, the fact that the users agree to use at home is ensured, authorization control and monitoring of the input equipment matched with the electronic product and monitoring of the use condition are achieved, and therefore time of children using the electronic product is effectively controlled.
The invention is further described below with reference to the accompanying drawings and specific embodiments.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario of a keyboard authorization monitoring method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a keyboard authorization monitoring method according to an embodiment of the present invention;
FIG. 3 is a sub-flow diagram of a keyboard authorization monitoring method according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a keyboard authorization monitoring method according to another embodiment of the present invention;
FIG. 5 is a sub-flowchart of a keyboard authorization monitoring method according to another embodiment of the present invention;
FIG. 6 is a schematic block diagram of a keyboard authorization monitoring apparatus provided in an embodiment of the present invention;
FIG. 7 is a schematic block diagram of an authorization setup unit of the keyboard authorization monitoring apparatus according to the embodiment of the present invention;
FIG. 8 is a schematic block diagram of a keyboard authorization monitoring apparatus according to another embodiment of the present invention;
fig. 9 is a schematic block diagram of a behavior analysis unit of a keyboard authorization monitoring apparatus according to another embodiment of the present invention;
FIG. 10 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic view of an application scenario of a keyboard authorization monitoring method according to an embodiment of the present invention. Fig. 2 is a schematic flow chart of a keyboard authorization monitoring method according to an embodiment of the present invention. The method for monitoring the authorization of the keyboard is applied to a first terminal, the first terminal performs data interaction with the keyboard and a second terminal, authorization processing is performed after biological characteristic information is obtained from the keyboard, secondary authorization is performed by the second terminal during sending, authorization operation is mainly performed by the fact that a user operates the first terminal to approve or reject processing, in addition, when the keyboard is started to be used, the first terminal can continuously obtain the operation condition of the keyboard, AI analysis is performed, behaviors are sent to the second terminal, and the behaviors are searched by parents.
Fig. 2 is a flowchart illustrating a keyboard authorization monitoring method according to an embodiment of the present invention. As shown in fig. 2, the method includes the following steps S110 to S160.
And S110, performing biological characteristic authorization setting on the keyboard to obtain keyboard authorization information.
In this embodiment, the keyboard authorization information refers to biometric information authorized to pass by both the first terminal and the second terminal, and may include a voiceprint feature code and the like.
In an embodiment, referring to fig. 3, the step S110 may include steps S111 to S112.
And S111, acquiring the feature code and the request corresponding to the biometric information uploaded from the keyboard to obtain the keyboard authorization information.
In the present embodiment, the biometric information refers to voiceprint information and the like.
An authorization key and a sound collector are arranged on the keyboard, after the authorization key is pressed for a long time, the keyboard can initiate an authorization request to the first terminal, and when the keyboard is in authorization request use in the authorization process, an indicator light of the keyboard is in a green light flash state; when the keyboard is authorized to be used, the indicating lamp is long-lighted in green; when the keyboard is in the disabled state, the indicator light appears as a non-illuminated light.
In this embodiment, after the sound transmitted by the sound collector is acquired, the voiceprint feature code is extracted and sent to the first terminal through the HID together with the request, so as to record the voiceprint feature code by the first terminal.
And S112, storing the keyboard authorization information and sending the keyboard authorization information to a second terminal.
And S120, obtaining the information to be authorized.
In this embodiment, the information to be authorized refers to voiceprint information collected by the sound collector when an authorization request initiated before the keyboard is started to be used is made each time. The information to be authorized comprises a voiceprint feature code to be authorized and an authorization request.
Specifically, the authorization key is pressed for a long time, and an authorization word is spoken to start an authorization request.
S130, judging whether the information to be authorized can be successfully matched with the keyboard authorization information;
and S140, if the information to be authorized can be successfully matched with the keyboard authorization information, sending the successfully matched information to the second terminal so as to enable the second terminal to carry out secondary authorization.
Specifically, after the first terminal authorizes, the second terminal is needed to authorize, and the second terminal is held by the parent, so that the parent can conveniently monitor the condition that the child uses the electronic product. And after receiving the authorization request, the second terminal identifies whether the voiceprint feature code is valid, and can refuse or approve the authorization, wherein the authorization can be complete authorization or time-period authorization. When the parents click the authorization command, the authorization command is sent to the first terminal and then sent to the keyboard, and the keyboard receives the command and then synchronizes authorization information so as to start and use the keyboard.
In this embodiment, the keyboard includes a USB keyboard device and a USB hid device, the USB keyboard device is mainly used to complete a conventional keyboard function, the USB hid device is mainly used for data communication to configure and manage some permissions of the keyboard, and the USB hid device is used to refer to a keypad and a private channel of security software, thereby avoiding the problem that the use of hook technology to monitor the keyboard often causes viruses and poor experience.
And S150, when the result of the secondary authorization is that the authorization is approved, starting the use of the keyboard.
And S160, if the information to be authorized cannot be successfully matched with the keyboard authorization information, prohibiting the keyboard from being started.
When the second authorization and the authorization of the first terminal pass, the keyboard can be started for the user to use, and when the first terminal is not authorized or the second authorization is not agreed, the keyboard is prohibited from being started, namely, the identity of the user of the electronic product is qualified, and the parents also agree that the user uses the keyboard.
According to the keyboard authorization monitoring method, the keyboard is authorized, the voiceprint and other biological characteristics need to be checked every time the keyboard is used, when the obtained information to be authorized is matched with the keyboard authorization information, the secondary authorization of parents is carried out, the situation that the user agrees to use at home is ensured, the authorization control and the monitoring of the use condition of the input equipment matched with the electronic product are realized, and the time of using the electronic product by a child is effectively controlled.
Fig. 4 is a flowchart illustrating a keyboard authorization monitoring method according to another embodiment of the present invention. As shown in fig. 4, the keyboard authorization monitoring method of the present embodiment includes steps S210-S270. Steps S210 to S250 are similar to steps S110 to S150 in the above embodiments, and are not described herein again. The added steps S260 to S270 in the present embodiment are explained in detail below.
And S270, acquiring the keyboard use condition.
In this embodiment, the keyboard usage indicates the operation times and operation time of the keyboard keys. The keyboard usage is uploaded to the first terminal over the HID private channel.
And S280, performing behavior analysis on the keyboard use condition to obtain user operation behaviors.
In the present embodiment, the user operation behavior refers to whether the user is playing a game or browsing a web page or performing other operations except for the two cases.
Specifically, AI analysis is carried out on the keyboard use condition to obtain the user operation behavior.
In an embodiment, referring to fig. 5, the step S280 may include steps S281 to S285.
And S281, judging whether the use frequency of the direction keys in a set time period meets a first preset condition according to the use condition of the keyboard.
In this embodiment, if the user uses a direction key such as the W, A, S, D key in the keyboard usage situation, and the usage ratio of the direction key used in one hour is 30%, the current behavior is considered as the game behavior, and of course, the ratio may be other values.
S282, if the use frequency of the direction keys in the set time period meets a first preset condition, generating behavior information of the current user playing the game to obtain user operation behaviors;
s283, if the use frequency of the direction key in the set time period does not accord with the first preset condition, judging whether the use frequency of the specific key in the set time period accords with the second preset condition;
and S284, if the use frequency of the specific key in the set time period meets a second preset condition, generating behavior information of the current user browsing the webpage to obtain the operation behavior of the user.
In this embodiment, if the user frequently inputs www keys in the keyboard usage situation, and the number of times of inputting www keys in the set time exceeds the number of times that is initially set, such as thirty times, the current behavior is considered to be a behavior of browsing a web page, and of course, the number of times that is initially set may be other values.
And S285, if the use frequency of the specific key in the set time period meets a second preset condition, generating behavior information that the current user does not play games and browse webpages to obtain user operation behaviors.
And S290, sending the user operation behavior to a second terminal.
In addition, the handle of the application can be acquired, and as the handle class of each application contains the name of the application, the first terminal can upload the handle class name of the application to the second terminal to monitor the operated application.
Fig. 6 is a schematic block diagram of a keyboard authorization monitoring apparatus 300 according to an embodiment of the present invention. As shown in fig. 6, the present invention further provides a keyboard authorization monitoring apparatus 300 corresponding to the above keyboard authorization monitoring method. The keyboard authorization monitoring apparatus 300 includes a unit for performing the above-described keyboard authorization monitoring method, and the apparatus may be configured in a first terminal. Specifically, referring to fig. 6, the keyboard authorization monitoring apparatus 300 includes an authorization setting unit 301, an information obtaining unit 302, a matching determining unit 303, a secondary authorization unit 304, and a starting unit 305.
An authorization setting unit 301, configured to perform biometric authorization setting on a keyboard to obtain keyboard authorization information; an information obtaining unit 302, configured to obtain information to be authorized; a matching judgment unit 303, configured to judge whether the information to be authorized can be successfully matched with the keyboard authorization information; a secondary authorization unit 304, configured to send information that is successfully matched to the second terminal if the information to be authorized can be successfully matched with the keyboard authorization information, so that the second terminal performs secondary authorization; an initiating unit 305, configured to initiate the use of the keyboard when the result of the secondary authorization is that the authorization is granted.
In an embodiment, as shown in fig. 7, the authorization setting unit 301 includes an authorization information obtaining subunit 3011 and a storage subunit 3012.
An authorization information obtaining subunit 3011, configured to obtain a feature code and a request corresponding to biometric information uploaded from a keyboard, so as to obtain keyboard authorization information; and the storage subunit 3012 is configured to store the keyboard authorization information, and send the keyboard authorization information to the second terminal.
Fig. 8 is a schematic block diagram of a keyboard authorization monitoring apparatus 300 according to another embodiment of the present invention. As shown in fig. 8, the keyboard authorization monitoring apparatus 300 of the present embodiment is the above embodiment, and is added with a usage obtaining unit 306, a behavior analyzing unit 307, and a behavior transmitting unit 308.
A use condition acquiring unit 306 for acquiring a keyboard use condition; a behavior analysis unit 307, configured to perform behavior analysis on the keyboard usage to obtain a user operation behavior; a behavior sending unit 308, configured to send the user operation behavior to the second terminal.
In an embodiment, the behavior analysis unit 307 is configured to perform AI analysis on the keyboard usage to obtain a user operation behavior.
In one embodiment, as shown in fig. 9, the authorization setting unit 301 includes a first determining subunit 3011, a first generating subunit 3012, a second determining subunit 3013, a second generating subunit 3014, and a third generating subunit 3015.
The first judging subunit 3011 is configured to judge, according to the keyboard usage, whether the usage frequency of the direction key in a set time period meets a first preset condition; the first generating subunit 3012, configured to generate behavior information that the current user is playing a game if the frequency of use of the direction key in the set time period meets a first preset condition, so as to obtain a user operation behavior; a second determining subunit 3013, configured to determine whether the usage frequency of the specific key in the set time period meets a second preset condition if the usage frequency of the direction key in the set time period does not meet the first preset condition; the second generating subunit 3014, configured to generate behavior information that the current user is browsing a web page if the usage frequency of the specific key in the set time period meets a second preset condition, so as to obtain a user operation behavior; the third generating subunit 3015 is configured to generate behavior information that the current user is not playing a game and browsing a web page if the frequency of using the specific key in the set time period meets a second preset condition, so as to obtain a user operation behavior.
It should be noted that, as can be clearly understood by those skilled in the art, the specific implementation process of the keyboard authorization monitoring apparatus 300 and each unit may refer to the corresponding description in the foregoing method embodiment, and for convenience and brevity of description, no further description is provided herein.
The keyboard authorization monitoring apparatus 300 may be implemented in the form of a computer program that can run on a computer device as shown in fig. 10.
Referring to fig. 10, fig. 10 is a schematic block diagram of a computer device according to an embodiment of the present application. The computer device 500 may be a first terminal, wherein the first terminal may be an electronic device with a communication function, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant, and a wearable device.
Referring to fig. 10, the computer device 500 includes a processor 502, memory, and a network interface 505 connected by a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
The non-volatile storage medium 503 may store an operating system 5031 and a computer program 5032. The computer programs 5032 include program instructions that, when executed, cause the processor 502 to perform a keyboard authorization monitoring method.
The processor 502 is used to provide computing and control capabilities to support the operation of the overall computer device 500.
The internal memory 504 provides an environment for the execution of the computer program 5032 in the non-volatile storage medium 503, and when the computer program 5032 is executed by the processor 502, the processor 502 can be enabled to execute a keyboard authorization monitoring method.
The network interface 505 is used for network communication with other devices. Those skilled in the art will appreciate that the configuration shown in fig. 10 is a block diagram of only a portion of the configuration relevant to the present teachings and is not intended to limit the computing device 500 to which the present teachings may be applied, and that a particular computing device 500 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
Wherein the processor 502 is configured to run the computer program 5032 stored in the memory to implement the following steps:
performing biological characteristic authorization setting on the keyboard to obtain keyboard authorization information; acquiring information to be authorized; judging whether the information to be authorized can be successfully matched with the keyboard authorization information; if the information to be authorized can be successfully matched with the keyboard authorization information, the successfully matched information is sent to the second terminal, so that the second terminal can carry out secondary authorization; and when the result of the secondary authorization is that the authorization is approved, starting the use of the keyboard.
The information to be authorized comprises a voiceprint feature code to be authorized and an authorization request.
In one embodiment, after the step of enabling the keyboard, the processor 502 further performs the following steps:
acquiring the use condition of a keyboard; analyzing the behavior of the keyboard to obtain the operation behavior of the user; and sending the user operation behavior to a second terminal.
In an embodiment, when the processor 502 implements the step of performing the biometric authorization setting on the keyboard to obtain the keyboard authorization information, the following steps are specifically implemented:
acquiring a feature code and a request corresponding to the biological feature information uploaded from the keyboard to obtain keyboard authorization information; and storing the keyboard authorization information and sending the keyboard authorization information to a second terminal.
In an embodiment, when implementing the step of performing behavior analysis on the keyboard usage by the processor 502 to obtain the user operation behavior, the following steps are specifically implemented:
and carrying out AI analysis on the keyboard use condition to obtain the user operation behavior.
In an embodiment, when implementing the step of performing AI analysis on the keyboard usage to obtain the user operation behavior, the processor 502 specifically implements the following steps:
judging whether the use frequency of the direction keys in a set time period meets a first preset condition or not according to the use condition of the keyboard; if the use frequency of the direction keys in a set time period meets a first preset condition, generating behavior information of a current user playing a game to obtain user operation behaviors; if the direction key use frequency in the set time period does not accord with the first preset condition, judging whether the specific key use frequency in the set time period accords with the second preset condition; if the use frequency of the specific key in the set time period meets a second preset condition, generating behavior information of the current user browsing the webpage to obtain user operation behaviors; and if the use frequency of the specific key in the set time period meets a second preset condition, generating behavior information that the current user does not play games and browse webpages to obtain user operation behaviors.
It should be understood that in the embodiment of the present Application, the Processor 502 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It will be understood by those skilled in the art that all or part of the flow of the method implementing the above embodiments may be implemented by a computer program instructing associated hardware. The computer program includes program instructions, and the computer program may be stored in a storage medium, which is a computer-readable storage medium. The program instructions are executed by at least one processor in the computer system to implement the flow steps of the embodiments of the method described above.
Accordingly, the present invention also provides a storage medium. The storage medium may be a computer-readable storage medium. The storage medium stores a computer program, wherein the computer program, when executed by a processor, causes the processor to perform the steps of:
performing biological characteristic authorization setting on the keyboard to obtain keyboard authorization information; acquiring information to be authorized; judging whether the information to be authorized can be successfully matched with the keyboard authorization information; if the information to be authorized can be successfully matched with the keyboard authorization information, the successfully matched information is sent to the second terminal, so that the second terminal can carry out secondary authorization; and when the result of the secondary authorization is that the authorization is approved, starting the use of the keyboard.
The information to be authorized comprises a voiceprint feature code to be authorized and an authorization request.
In one embodiment, after the step of using the starting keyboard is realized by the processor executing the computer program, the following steps are further realized:
acquiring the use condition of a keyboard; analyzing the behavior of the keyboard to obtain the operation behavior of the user; and sending the user operation behavior to a second terminal.
In an embodiment, when the processor executes the computer program to implement the step of performing the biometric authorization setting on the keyboard to obtain the keyboard authorization information, the following steps are specifically implemented:
acquiring a feature code and a request corresponding to the biological feature information uploaded from the keyboard to obtain keyboard authorization information; and storing the keyboard authorization information and sending the keyboard authorization information to a second terminal.
In an embodiment, when the processor executes the computer program to implement the behavior analysis on the keyboard usage to obtain the user operation behavior step, the following steps are specifically implemented:
and carrying out AI analysis on the keyboard use condition to obtain the user operation behavior.
In an embodiment, when the processor executes the computer program to implement the AI analysis on the keyboard usage to obtain the user operation behavior step, the following steps are specifically implemented:
judging whether the use frequency of the direction keys in a set time period meets a first preset condition or not according to the use condition of the keyboard; if the use frequency of the direction keys in a set time period meets a first preset condition, generating behavior information of a current user playing a game to obtain user operation behaviors; if the direction key use frequency in the set time period does not accord with the first preset condition, judging whether the specific key use frequency in the set time period accords with the second preset condition; if the use frequency of the specific key in the set time period meets a second preset condition, generating behavior information of the current user browsing the webpage to obtain user operation behaviors; and if the use frequency of the specific key in the set time period meets a second preset condition, generating behavior information that the current user does not play games and browse webpages to obtain user operation behaviors.
The storage medium may be a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk, which can store various computer readable storage media.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative. For example, the division of each unit is only one logic function division, and there may be another division manner in actual implementation. For example, various elements or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs. The units in the device of the embodiment of the invention can be merged, divided and deleted according to actual needs. In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a terminal, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. The keyboard authorization monitoring method is characterized by comprising the following steps:
performing biological characteristic authorization setting on the keyboard to obtain keyboard authorization information;
acquiring information to be authorized;
judging whether the information to be authorized can be successfully matched with the keyboard authorization information;
if the information to be authorized can be successfully matched with the keyboard authorization information, the successfully matched information is sent to the second terminal, so that the second terminal can carry out secondary authorization;
and when the result of the secondary authorization is that the authorization is approved, starting the use of the keyboard.
2. The keyboard authorization monitoring method according to claim 1, further comprising, after the initiating the use of the keyboard:
acquiring the use condition of a keyboard;
analyzing the behavior of the keyboard to obtain the operation behavior of the user;
and sending the user operation behavior to a second terminal.
3. The keyboard authorization monitoring method according to claim 1, wherein the performing of the biometric authorization setting on the keyboard to obtain the keyboard authorization information includes:
acquiring a feature code and a request corresponding to the biological feature information uploaded from the keyboard to obtain keyboard authorization information;
and storing the keyboard authorization information and sending the keyboard authorization information to a second terminal.
4. The keyboard authorization monitoring method according to claim 1, wherein the information to be authorized includes a voiceprint feature code to be authorized and an authorization request.
5. The keyboard authorization monitoring method according to claim 2, wherein the performing behavior analysis on the keyboard usage to obtain the user operation behavior comprises:
and carrying out AI analysis on the keyboard use condition to obtain the user operation behavior.
6. The keyboard authorization monitoring method according to claim 5, wherein the AI analysis of the keyboard usage to obtain user operation behavior comprises:
judging whether the use frequency of the direction keys in a set time period meets a first preset condition or not according to the use condition of the keyboard;
if the use frequency of the direction keys in a set time period meets a first preset condition, generating behavior information of a current user playing a game to obtain user operation behaviors;
if the direction key use frequency in the set time period does not accord with the first preset condition, judging whether the specific key use frequency in the set time period accords with the second preset condition;
if the use frequency of the specific key in the set time period meets a second preset condition, generating behavior information of the current user browsing the webpage to obtain user operation behaviors;
and if the use frequency of the specific key in the set time period meets a second preset condition, generating behavior information that the current user does not play games and browse webpages to obtain user operation behaviors.
7. Keyboard authorization monitoring device, characterized by, includes:
the authorization setting unit is used for carrying out biological characteristic authorization setting on the keyboard to obtain keyboard authorization information;
the information acquisition unit is used for acquiring information to be authorized;
the matching judgment unit is used for judging whether the information to be authorized can be successfully matched with the keyboard authorization information;
the secondary authorization unit is used for sending the successfully matched information to the second terminal if the information to be authorized can be successfully matched with the keyboard authorization information, so that the second terminal can carry out secondary authorization;
and the starting unit is used for starting the use of the keyboard when the result of the secondary authorization is that the authorization is approved.
8. The keyboard authorization monitoring device according to claim 7, further comprising:
the using condition acquiring unit is used for acquiring the using condition of the keyboard;
the behavior analysis unit is used for carrying out behavior analysis on the keyboard use condition to obtain a user operation behavior;
and the behavior sending unit is used for sending the user operation behavior to the second terminal.
9. A computer device, characterized in that the computer device comprises a memory, on which a computer program is stored, and a processor, which when executing the computer program implements the method according to any of claims 1 to 6.
10. A storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 6.
CN202011209937.1A 2020-11-03 2020-11-03 Keyboard authorization monitoring method and device, computer equipment and storage medium Pending CN112149193A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011209937.1A CN112149193A (en) 2020-11-03 2020-11-03 Keyboard authorization monitoring method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011209937.1A CN112149193A (en) 2020-11-03 2020-11-03 Keyboard authorization monitoring method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112149193A true CN112149193A (en) 2020-12-29

Family

ID=73953843

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011209937.1A Pending CN112149193A (en) 2020-11-03 2020-11-03 Keyboard authorization monitoring method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112149193A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800409A (en) * 2021-01-08 2021-05-14 杭州雾联科技有限公司 Method, device and medium for bypassing login protection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102667797A (en) * 2009-10-26 2012-09-12 深圳市永盛世纪科技有限公司 Security keyboard and authorization usage method thereof
CN110221706A (en) * 2019-07-18 2019-09-10 许超 Multi-functional wireless keyboard
CN110516480A (en) * 2019-08-15 2019-11-29 苏州浪潮智能科技有限公司 A kind of control method of keyboard and device
CN110580211A (en) * 2019-08-23 2019-12-17 鹏城实验室 Monitoring method, device, keyboard and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102667797A (en) * 2009-10-26 2012-09-12 深圳市永盛世纪科技有限公司 Security keyboard and authorization usage method thereof
CN110221706A (en) * 2019-07-18 2019-09-10 许超 Multi-functional wireless keyboard
CN110516480A (en) * 2019-08-15 2019-11-29 苏州浪潮智能科技有限公司 A kind of control method of keyboard and device
CN110580211A (en) * 2019-08-23 2019-12-17 鹏城实验室 Monitoring method, device, keyboard and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112800409A (en) * 2021-01-08 2021-05-14 杭州雾联科技有限公司 Method, device and medium for bypassing login protection

Similar Documents

Publication Publication Date Title
EP3182316B1 (en) Fingerprint authentication method and system, and terminal supporting fingerprint authentication
CN106778303B (en) Authorization policy optimization method and authorization policy optimization device
WO2016110002A1 (en) Screen interface unlocking method and screen interface unlocking device
CN102073807A (en) Information processing apparatus, information processing method, and program
WO2016155072A1 (en) Method and apparatus for hiding and opening applications
KR20080085763A (en) System and method for registering a fingerprint, for setting a login method of an application, and for logining in the application
JP2018517917A (en) Method of starting business by voice in communication software and apparatus corresponding thereto
KR101369676B1 (en) Auxiliary IO apparatus of portable computer and Operatimg method of application using of auxiliary IO apparatus
JP2004086356A (en) Authentication method and authentication system
US20190130411A1 (en) Method and system for data processing
CN109085975A (en) Screenshotss method, apparatus, storage medium and electronic device
CN106098069B (en) Identity authentication method and terminal equipment
CN107533598B (en) Input method and device of login password of application program and terminal
WO2016198019A1 (en) Operation method and apparatus for electronic device, and electronic device
CN117390613A (en) Echo pattern user authentication
CN104506317A (en) An authentication method and device based on multiple authentication modes
WO2017084294A1 (en) Password input method, terminal device, and electronic device
CN112149193A (en) Keyboard authorization monitoring method and device, computer equipment and storage medium
CN109219003A (en) Information ciphering method, device, storage medium and electronic equipment
WO2016197717A1 (en) Method and device for inputting information on mobile terminal
US20190130084A1 (en) Authentication method, electronic device, and computer-readable program medium
CN105141750B (en) A kind of screen locking method and terminal
CN105787313B (en) Cryptographic system and electronic equipment with the cryptographic system
JP4807041B2 (en) Certification program
CN105260632B (en) A kind of method for authenticating and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination