CN113032067A - Hidden interface calling method and device, computer equipment and storage medium - Google Patents

Hidden interface calling method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113032067A
CN113032067A CN202110309505.6A CN202110309505A CN113032067A CN 113032067 A CN113032067 A CN 113032067A CN 202110309505 A CN202110309505 A CN 202110309505A CN 113032067 A CN113032067 A CN 113032067A
Authority
CN
China
Prior art keywords
hidden interface
interface
hidden
identity
received
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110309505.6A
Other languages
Chinese (zh)
Inventor
陆曙杰
李政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Waterward Information Co Ltd
Original Assignee
Shenzhen Waterward Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Waterward Information Co Ltd filed Critical Shenzhen Waterward Information Co Ltd
Priority to CN202110309505.6A priority Critical patent/CN113032067A/en
Publication of CN113032067A publication Critical patent/CN113032067A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0485Scrolling or panning

Abstract

The application relates to the field of computers, and discloses a hidden interface calling method, a hidden interface calling device, computer equipment and a storage medium, wherein the method comprises the following steps: detecting whether continuous clicks of specified times are received in a specified area of a function selection interface; if receiving the clicks of the appointed times, carrying out identity confirmation; and if the identity is successfully confirmed, entering a hidden interface. By the aid of the hidden interface calling method, the hidden interface calling device, the computer equipment and the storage medium, background data can be prevented from being modified or lost.

Description

Hidden interface calling method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a hidden interface calling method and apparatus, a computer device, and a storage medium.
Background
The Android control panel is generally adopted in the existing beverage vending machine as the display of machine function options, so that a user can conveniently control the machine to make and select required coffee or other beverages. After the machine is started, the type and the number of the beverages to be made can be directly displayed in the Android control panel. In addition to the above functions, the control panel also provides some background settings related control operations and displays some related information about beverage vending and production statistics. If the information is displayed in front of users who make drinks and buy drinks, the problems that background data is misoperated and mismodified or data leakage is caused are easily caused.
Disclosure of Invention
The application mainly aims to provide a hidden interface calling method, a hidden interface calling device, computer equipment and a storage medium, and aims to solve the technical problem that background data is modified or leaked.
In order to achieve the above object, the present application provides a hidden interface calling method, where the hidden interface is used to display background data, and the method includes the steps of:
detecting whether continuous clicks of specified times are received in a specified area of a function selection interface;
if receiving the clicks of the appointed times, carrying out identity confirmation;
and if the identity is successfully confirmed, entering a hidden interface.
Further, the step of detecting whether continuous clicks of a specified number of times are received in a specified area of the function selection interface includes:
detecting whether a click of a knuckle type is received in a designated area of a function selection interface;
if so, acquiring continuous click times;
comparing the click times with the specified times to obtain a comparison result;
and determining whether the click times reach the specified times according to the comparison result.
Further, the step of performing identity confirmation includes:
acquiring current time and position information;
generating a verification password according to the current time and the position information, and sending the verification password to a prestored mobile terminal;
receiving an input password and verifying whether the input password is the same as the verification password;
if the identity is the same, the identity authentication is successful.
Further, before the step of detecting whether continuous clicks of a specified number of times are received in a specified area of the function selection interface, the method comprises the following steps;
detecting whether a press exceeding a preset time is received or not at a preset position point of the function selection interface;
and if so, forming the designated area at the preset position point.
Further, after the step of forming the designated area at the preset position point, the method includes:
flashing and prompting in the designated area in a designated color;
detecting whether a click operation is received in the designated area;
and if so, stopping the flashing prompt.
Further, after the step of entering the hidden interface, the method includes:
detecting whether an operation on the background data is received within a preset time interval;
and if not, exiting the hidden interface.
Further, the hidden interface comprises an upper frame, a lower frame and two side frames; after the step of entering the hidden interface, the method comprises the following steps:
detecting whether a plurality of fingers slide downwards from an upper frame of the hidden interface at the same time or not;
if yes, calculating a sliding distance;
comparing the sliding distance with a half length of a side frame of the hidden interface;
and if the sliding distance is greater than half of the length of the side frame, exiting the hidden interface. The application also provides a hidden interface calling device, including:
the first detection unit is used for detecting whether continuous clicks of specified times are received in a specified area of the function selection interface;
the identity confirmation unit is used for confirming the identity if the clicks of the specified times are received;
and the access unit is used for entering the hidden interface if the identity is successfully confirmed.
The application also provides a computer device, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of any one of the hidden interface calling methods when executing the computer program.
The present application further provides a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the hidden interface calling method of any one of the above.
According to the hidden interface calling method, the hidden interface calling device, the computer equipment and the storage medium, whether continuous clicks of specified times are received or not is detected in the specified area of the function selection interface; if receiving the clicks of the appointed times, carrying out identity confirmation; and if the identity is successfully confirmed, entering a hidden interface. And if the number of times of clicking reaches the specified number of times, starting an identity determining program to confirm the identity, and entering a hidden interface when the identity is successfully confirmed and the identity is opened by an administrator. The user cannot know that the hidden function interface needs to be triggered by appointed operation in the appointed function area without knowing the method, so that the problem of false triggering is avoided to a certain extent, even if the user mistakenly hits and clicks by mistake, and the number of clicks reaches the appointed number, the user needs to confirm the identity, the identity is not confirmed successfully, the user cannot enter the hidden interface, and the problem that background data is modified or leaked is avoided to a certain extent. And some functions operated by the administrator are hidden, and only functions operated by the user are displayed on the screen, so that more functions related to the user can be displayed.
Drawings
FIG. 1 is a schematic diagram illustrating steps of a hidden interface calling method according to an embodiment of the present application;
FIG. 2 is a block diagram of a hidden interface calling device according to an embodiment of the present application;
fig. 3 is a block diagram illustrating a structure of a computer device according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, an embodiment of the present application provides a hidden interface calling method, including the steps of:
step S1, detecting whether continuous clicks of appointed times are received in the appointed area of the function selection interface;
step S2, if the click of the appointed times is received, the identity is confirmed;
and step S3, if the identity is successfully confirmed, entering a hidden interface.
In this embodiment, the hidden interface calling method can be applied to a vending machine, and an Android control panel is arranged on the vending machine and used for displaying the function selection interface and the hidden interface. The vending machine can be operated by an administrator and a user, the administrator refers to a person having management authority on data, the user refers to a person having selection authority on data, for example, for a beverage vending machine, the administrator can update and delete the types and the quantity of beverages which can be sold currently after entering a hidden interface, and the user can only select the beverages and the quantity which are wanted by the user in the set beverage types on the function selection interface, as described in step S1, the function selection interface is an interface for the user to operate, the function selection interface comprises a plurality of function option icons for the user to select, the hidden interface is an interface for the administrator to operate, the function option icons for the administrator to control operation are included, under normal conditions, the user can only see the function selection interface, and only the hidden interface calling method provided by the present application can enter the hidden interface, and the common user can not know the corresponding rule for entering the hidden interface, so that the data of the administrator is prevented from being modified or leaked.
Setting a designated area on the function selection interface, wherein the designated area can be preset with a fixed size, and presetting a fixed area, such as the {0, 0, 30, 30} area at the upper left corner of the function selection interface; the designated area may also be generated in real time by preset rules. When the designated area is a preset fixed area, the administrator knows the fixed area in advance, and the designated area is generated in real time, the administrator also knows how to generate the designated area in real time, so that the administrator can accurately know the designated area and click according to corresponding rules. Whether the click is received or not is detected in the designated area, whether the number of times of the click reaches the designated number of times or not is determined, the click needs to be continuous, after the interval time between two clicks is long, the previous click cannot be included in the number of times of the click, the designated number of times can be set by an administrator, for example, 3 times or 5 times, the number of times which is set to be 1 time or 2 times is avoided, and the mistaken opening of other people is prevented.
As described in the above steps S2-S3, if the number of clicks reaches the specified number, the identity determination program is activated to perform identity verification, and when the identity verification is successful, which indicates that the user is opened by the administrator, the user enters the hidden interface. The user cannot know that the hidden interface needs to be triggered by appointed operation in the appointed functional area without knowing the method, so that the problem of false triggering is avoided to a certain extent, even if the user mistakenly hits and clicks by mistake, and the number of clicks reaches the appointed number, the user needs to confirm the identity, the user cannot enter the hidden interface, and the problem that background data is modified or leaked is avoided to a certain extent. And some functions operated by the administrator are hidden, and only functions operated by the user are displayed on the screen, so that more functions related to the user can be displayed.
In an embodiment, the step S1 of detecting whether a specified number of consecutive clicks is received in a specified area of the function selection interface includes:
step S11, detecting whether continuous finger joint type clicks are received in the appointed area of the function selection interface;
step S12, if receiving, obtaining continuous click times;
step S13, comparing the click times with the appointed times to obtain a comparison result;
and step S14, determining whether the click frequency reaches the specified frequency according to the comparison result.
In this embodiment, as described in step S11, a corresponding sensor for detecting the type of the knuckle is provided, which can be used to detect whether the click is caused by the click of the knuckle. When the user operates the system, the user usually operates the system on the screen by fingers, and finger joint clicks are not basically adopted, so that whether the clicks are operated by an administrator or not can be determined by the finger joint type clicks.
As described in the above steps S12-S14, when it is detected that there is a click of the knuckle type, the number of consecutive clicks caused by the knuckle is acquired; and determining whether the click times reach the specified times, and if so, performing identity authentication.
In this embodiment, since the user basically performs the touch operation on the touch screen through the finger abdomen, the trigger condition for setting the hidden interface is set as the click of the knuckle (the bending portion when the finger is bent), so that the probability of the misoperation of the user can be further reduced, and the operation safety of the hidden interface is improved. In addition, sometimes, the administrator may just lift something on his or her finger or the finger is stained with dirt, and the hidden interface is triggered by clicking the finger joint, so that the dirt on the finger can be prevented from being stained on the screen. The knuckle type click can be initiated by a single knuckle or by a plurality of knuckles, and when the knuckle type click is a plurality of knuckles, the plurality of knuckles are clicked at the same time to serve as one click.
In an embodiment, the step S2 of performing identity confirmation includes:
step S21, obtaining current time and position information;
step S22, generating a verification password according to the current time and the position information, and sending the verification password to a prestored mobile terminal;
step S23, receiving an input password, and verifying whether the input password is the same as the verification password;
in step S24, if the two are the same, the authentication is successful.
In this embodiment, as described in step S21, the current time is the time when the reception of the specified number of clicks is detected. Since the vending machine is generally fixedly disposed at a place and is not easily moved, the position information may be previously stored in the vending machine. In another embodiment, the position information can be obtained in real time, so that the situation that the position information cannot be updated in time after the position of the vending machine is changed is prevented.
As described in the above step S22, the verification password is generated in real time according to the current time and the location information, so as to prevent others from forging the password, thereby causing the background data to be modified or leaked. The mobile terminal and the vending machine have a corresponding relation, the vending machine stores the communication number of the mobile terminal, and after the verification password is generated, the communication number is directly sent to the mobile terminal in a short message mode.
After the verification password is transmitted to the mobile terminal as described in the above steps S23-S24, a password interface is automatically generated on the designated area, and the password interface includes a keypad for inputting the verification password and an input box for displaying the input password. And the administrator inputs the verification password in the password interface, checks whether the input verification password is the same as the verification password sent to the terminal, and if so, successfully confirms the identity.
In the embodiment, the verification password is generated in real time according to the current time and the position information, so that the condition that others forge the password to carry out identity verification is prevented to a great extent, and data is modified or leaked.
In another embodiment, the identity can be further verified by one or more of fingerprint recognition, password recognition, pattern recognition, face recognition. If identity authentication is carried out through face recognition, a corresponding camera device is arranged, a face picture is obtained through the camera device, the obtained face picture is compared with a face picture stored in advance, and if the comparison is successful, the identity authentication is successful.
In an embodiment, said step S1 of detecting whether a specified number of consecutive clicks is received in a specified area of the function selection interface is preceded by;
step S1A, detecting whether a press exceeding a preset time is received at a preset position point of the function selection interface;
step S1B, if it is detected, forming the designated area at the preset position point.
In this embodiment, the positions where the function option icons appear are not always fixed in different function selection interfaces. In any function selection interface, the preset location point may be a fixed location point in the function selection interface, or may be any location point, if it is detected that there is a press exceeding a preset time at the preset location point, that is, the press time at the preset location point exceeds the preset time, an appointed region is directly formed at the preset location point, specifically, an icon near the preset location point automatically moves away to obtain a blank region with the preset location point as a center, the size of the blank region may be set by itself, the blank region is used as the appointed region, and after a specified number of clicks is detected in the appointed region, an identity confirmation procedure is performed. In this embodiment, the designated area is generated in real time and can be generated at the preset position point, and when the preset position point is any one position point, the administrator can press the designated area at any one position point for a preset time, so that the designated area can be formed without recording the designated position.
In the embodiment, the designated area is generated in real time, an administrator can position and trigger to enter the hidden interface under any function selection interface, and the icon can be automatically far away, so that the blank area is definitely left, the administrator can accurately and intuitively position the designated area needing touch control, and the problem that the hidden interface is difficult to accurately trigger due to inaccurate positioning of the designated area is avoided. At any time, the hidden interface can be triggered by clicking the designated area on any function selection interface without returning to the main function selection interface.
In an embodiment, after the step S1B of forming the designated area at the preset location point, the method includes:
step S1C, the designated area is indicated by flashing with designated color
Step S1D, detecting whether a click operation is received in the designated area;
and step S1E, if so, stopping the flashing prompt.
In this embodiment, in the above similar scenario, in any function selection interface, pressing is performed at any position point for a preset time, so as to form a blank area, and the outline of the blank area that is divided may be flashed in a designated color, such as red, green, and the like, so that the administrator can specify the position of the designated area, thereby performing a subsequent event of identity confirmation. In another embodiment, the whole blank area can be further subjected to flashing prompt in a designated color, when the existence of the clicking operation is detected, the blank area is known by the administrator, and the flashing prompt stops at the moment, so that the subsequent operation of the administrator is prevented from being interfered. Similarly, in the blank area of the flash prompt, after detecting the click of the appointed number of times (finger joint), entering a hidden interface.
In an embodiment, after the step S3 of entering the hidden interface, the method includes:
step S4, detecting whether the operation to the background data is received within a preset time interval;
and step S5, if not, exiting the hidden interface.
In this embodiment, after entering the hidden interface, the administrator may perform a series of operations on the background data, such as deletion, update, insertion, and the like, and after the operations are completed, the administrator may forget to exit the hidden interface. And when the operation on the background data is not detected within a preset time interval, automatically quitting the hidden interface. In another embodiment, a quitting control is arranged on the hidden interface, and the administrator can click the quitting control to quit the hidden interface, or the administrator designs a corresponding quitting gesture by himself, and the administrator can quit the hidden interface by operating the gesture, for example, the administrator can set three fingers to slide from right to left to quit the hidden interface.
In an embodiment, after the step S3 of entering the hidden interface, the method includes:
step S3A, detecting whether the hidden interface receives the simultaneous sliding operation of upward and downward;
and step S3B, if receiving, exiting the hidden interface.
In this embodiment, when the administrator wants to exit the hidden interface, the administrator may perform operations up and down on the hidden interface at the same time, for example, place the thumb and the index finger on the hidden interface separately up and down, and bring the thumb and the index finger together between them at the same time to form operations up and down at the same time, and exit the hidden interface when detecting that the above operations exist.
In another embodiment, the hidden interface comprises an upper border, a lower border and two side borders; after the step S3, the method includes:
step S3a, detecting whether a plurality of fingers slide downwards from the upper frame of the hidden interface at the same time;
step S3b, if yes, calculating a sliding distance;
step S3c, comparing the sliding distance with a half length of a side frame of the hidden interface;
and step S3d, if the sliding distance is greater than half of the length of the side frame, exiting the hidden interface.
In this embodiment, the hidden interface is a quadrilateral interface composed of an upper frame, a lower frame and two side frames, the upper frame moves downward with a finger, so as to change the size of the hidden interface, before the upper frame is dragged by the finger to move downward, the size of the whole hidden interface is fixed, when the sliding distance is greater than half of the side frame, the length of the side frame of the hidden interface is less than half of the length of the initial side frame, and is insufficient to completely display the function option icons on the hidden interface, which indicates that the operation of the administrator is not used for adjusting the size of the hidden interface, but wants to close the whole hidden interface, and therefore, when the sliding distance is greater than half of the side frame, the hidden interface is closed. Under the normal condition, the Android control panel is vertically opposite to the user and the administrator, the administrator can easily slide from top to bottom, whether the administrator wants to close the hidden interface or not is judged through the sliding distance, and a closing key does not need to be independently arranged.
Referring to fig. 2, an embodiment of the present application provides a hidden interface invoking device, including:
a first detecting unit 10, configured to detect whether continuous clicks of a specified number of times are received in a specified area of the function selection interface;
an identity confirmation unit 20, configured to perform identity confirmation if a specified number of clicks are received;
and the entering unit 30 is used for entering the hidden interface if the identity is successfully confirmed.
In this embodiment, the function selection interface is an interface for a user to operate, the function selection interface includes a plurality of function option icons for the user to select, and the hidden interface is an interface for an administrator to operate, where the hidden interface includes function option icons for the administrator to control operations.
A designated area is arranged on the function selection interface, the designated area can be preset with a fixed size, and the area is preset, such as the {0, 0, 30, 30} area at the upper left corner; the designated area may also be generated in real time by preset rules. When the designated area is a pre-fixed area, the administrator knows the fixed area in advance, and the designated area is generated in real time, the administrator also knows how to generate the designated area in real time, so that the administrator can accurately know the designated area and click according to the corresponding rule. When clicking in the designated area, the administrator detects whether the click is received or not, determines whether the number of times of the click reaches the designated number of times or not, the click needs to be continuous, after the interval time between two clicks is long, the previous click cannot be included in the number of times of the click, and the designated number of times can be set by the administrator, such as 3 times or 5 times, so that the condition that the number of times is set to be 1 time or 2 times is avoided, and the mistaken opening of other people is prevented.
And if the number of times of clicking reaches the specified number of times, starting an identity determining program to confirm the identity, and entering a hidden interface when the identity is successfully confirmed and the identity is opened by an administrator. The user cannot know that the hidden function interface needs to be triggered by appointed operation in the appointed function area without knowing the method, so that the problem of false triggering is avoided to a certain extent, even if the user mistakenly hits and clicks by mistake, and the number of clicks reaches the appointed number, the user needs to confirm the identity, the identity is not confirmed successfully, the user cannot enter the hidden interface, and the problem that background data is modified or leaked is avoided to a certain extent. And some functions operated by the administrator are hidden, and only functions operated by the user are displayed on the screen, so that more functions related to the user can be displayed.
In one embodiment, the first detecting unit 10 includes:
the first detection subunit is used for detecting whether a click of the knuckle type is received in a designated area of the function selection interface;
the first obtaining subunit is used for obtaining the continuous click times if the click times are received;
the comparison subunit is used for comparing the click times with the specified times to obtain a comparison result;
and the determining subunit is used for determining whether the number of clicks reaches the specified number according to the comparison result.
In an embodiment, the identity verification unit 20 includes:
the second acquisition subunit is used for acquiring current time and position information;
the sending subunit is used for generating a verification password according to the current time and the position information and sending the verification password to a prestored mobile terminal;
the receiving subunit is used for receiving an input password and verifying whether the input password is the same as the verification password;
and the identity authentication subunit is used for successfully authenticating the identity if the identity is the same.
In an embodiment, the hidden interface invoking device further includes:
the second detection unit is used for detecting whether the press exceeding the preset time is received or not at the preset position point of the function selection interface;
and the forming unit is used for forming the specified area at the preset position point if the detection is detected.
In an embodiment, the hidden interface invoking device further includes:
the prompting unit is used for carrying out flash prompting on the designated area in a designated color;
a third detection unit, configured to detect whether a click operation is received in the designated area;
and the stopping unit is used for stopping the flashing prompt if the receiving is finished.
In an embodiment, the hidden interface invoking device further includes:
the fourth detection unit is used for detecting whether the operation on the background data is received within a preset time interval;
and the first exit unit is used for exiting the hidden interface if the information is not received.
In an embodiment, the hidden interface invoking device further includes:
a fifth detecting unit, configured to detect whether an upward and downward simultaneous sliding operation is received on the hidden interface;
and the second exit unit is used for exiting the hidden interface if the hidden interface is received.
In an embodiment, the hidden interface invoking device further includes:
the sixth detection unit is used for detecting whether a plurality of fingers slide downwards from the upper frame of the hidden interface at the same time;
the calculating unit is used for calculating the sliding distance if the sliding distance exists;
the comparison unit is used for comparing the sliding distance with a half length of a side frame of the hidden interface;
and the third exit unit is used for exiting the hidden interface if the sliding distance is greater than half of the length of the side frame.
In this embodiment, please refer to the above method embodiment for the specific implementation of each unit and sub-unit, which is not described herein again.
Referring to fig. 3, a computer device, which may be a server and whose internal structure may be as shown in fig. 3, is also provided in the embodiment of the present application. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing authentication data and the like. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a hidden interface invocation method.
Those skilled in the art will appreciate that the architecture shown in fig. 3 is only a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects may be applied.
An embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements a hidden interface calling method.
In summary, for the hidden interface calling method, the hidden interface calling device, the computer device, and the storage medium provided in the embodiments of the present application, whether continuous clicks of specified times are received is detected in the specified area of the function selection interface; if receiving the clicks of the appointed times, carrying out identity confirmation; and if the identity is successfully confirmed, entering a hidden interface. According to the hidden interface calling method, the hidden interface calling device, the computer equipment and the storage medium, if the number of times of clicking reaches the specified number of times, the identity determining program is started to confirm the identity, and when the identity confirmation is successful, the administrator opens the hidden interface, so that the hidden interface is entered. The user cannot know that the hidden function interface needs to be triggered by appointed operation in the appointed function area without knowing the method, so that the problem of false triggering is avoided to a certain extent, even if the user mistakenly hits and clicks by mistake, and the number of clicks reaches the appointed number, the user needs to confirm the identity, the identity is not confirmed successfully, the user cannot enter the hidden interface, and the problem that background data is modified or leaked is avoided to a certain extent. And some functions operated by the administrator are hidden, and only functions operated by the user are displayed on the screen, so that more functions related to the user can be displayed.
It will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by hardware associated with instructions of a computer program, which may be stored on a non-volatile computer-readable storage medium, and when executed, may include processes of the above embodiments of the methods. Any reference to memory, storage, database, or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double-rate SDRAM (SSRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only for the preferred embodiment of the present application and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are intended to be included within the scope of the present application.

Claims (10)

1. A hidden interface calling method is characterized in that a hidden interface is used for displaying background data, and comprises the following steps:
detecting whether continuous clicks of specified times are received in a specified area of a function selection interface;
if receiving the clicks of the appointed times, carrying out identity confirmation;
and if the identity is successfully confirmed, entering a hidden interface.
2. The hidden interface calling method according to claim 1, wherein the step of detecting whether a specified number of consecutive clicks is received in a specified area of the function selection interface comprises:
detecting whether a click of a knuckle type is received in a designated area of a function selection interface;
if so, acquiring continuous click times;
comparing the click times with the specified times to obtain a comparison result;
and determining whether the click times reach the specified times according to the comparison result.
3. The hidden interface calling method according to claim 1, wherein the step of performing identity verification comprises:
acquiring current time and position information;
generating a verification password according to the current time and the position information, and sending the verification password to a prestored mobile terminal;
receiving an input password and verifying whether the input password is the same as the verification password;
if the identity is the same, the identity authentication is successful.
4. The hidden interface calling method according to claim 1, wherein the step of detecting whether a specified area of the function selection interface receives a specified number of consecutive clicks is preceded by;
detecting whether a press exceeding a preset time is received or not at a preset position point of the function selection interface;
and if so, forming the designated area at the preset position point.
5. The hidden interface calling method according to claim 4, wherein the step of forming the designated area at the preset location point is followed by:
flashing and prompting in the designated area in a designated color;
detecting whether a click operation is received in the designated area;
and if so, stopping the flashing prompt.
6. The hidden interface calling method according to claim 1, wherein the step of entering the hidden interface is followed by:
detecting whether an operation on the background data is received within a preset time interval;
and if not, exiting the hidden interface.
7. The hidden interface calling method according to claim 1, wherein the hidden interface comprises an upper border, a lower border, and two side borders; after the step of entering the hidden interface, the method comprises the following steps:
detecting whether a plurality of fingers slide downwards from an upper frame of the hidden interface at the same time or not;
if yes, calculating a sliding distance;
comparing the sliding distance with a half length of a side frame of the hidden interface;
and if the sliding distance is greater than half of the length of the side frame, exiting the hidden interface.
8. A hidden interface invocation apparatus, comprising:
the first detection unit is used for detecting whether continuous clicks of specified times are received in a specified area of the function selection interface;
the identity confirmation unit is used for confirming the identity if the clicks of the specified times are received;
and the access unit is used for entering the hidden interface if the identity is successfully confirmed.
9. A computer device comprising a memory and a processor, the memory having stored therein a computer program, wherein the processor when executing the computer program implements the steps of the hidden interface invocation method of any of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the hidden interface invocation method according to any one of claims 1 to 7.
CN202110309505.6A 2021-03-23 2021-03-23 Hidden interface calling method and device, computer equipment and storage medium Pending CN113032067A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110309505.6A CN113032067A (en) 2021-03-23 2021-03-23 Hidden interface calling method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110309505.6A CN113032067A (en) 2021-03-23 2021-03-23 Hidden interface calling method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113032067A true CN113032067A (en) 2021-06-25

Family

ID=76472887

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110309505.6A Pending CN113032067A (en) 2021-03-23 2021-03-23 Hidden interface calling method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113032067A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114241679A (en) * 2021-12-08 2022-03-25 广东电网有限责任公司 Self-service terminal device anti-misoperation touch method and system
CN116028909A (en) * 2023-02-24 2023-04-28 深圳市赛柏特通信技术有限公司 Security office control method, system and medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090177956A1 (en) * 2008-01-04 2009-07-09 Shiling Huang Method and Apparatus for Implementing Browser Based Hypertext Transfer Protocol Session Storage
CN104580731A (en) * 2015-01-13 2015-04-29 广东欧珀移动通信有限公司 Communication interface display method and device and mobile terminal
CN106502682A (en) * 2016-10-31 2017-03-15 珠海市魅族科技有限公司 A kind of function interface methods of exhibiting and device
CN106548347A (en) * 2016-10-08 2017-03-29 宇龙计算机通信科技(深圳)有限公司 A kind of processing meanss of financial payment, method and terminal
CN106874744A (en) * 2017-01-19 2017-06-20 深圳市金立通信设备有限公司 A kind of method and terminal for preventing from missing locking terminal
US20170192646A1 (en) * 2015-12-31 2017-07-06 Le Holdings (Beijing) Co., Ltd. Method and electronic device for hiding application icons and mobile phone
US20180309801A1 (en) * 2015-05-23 2018-10-25 Yogesh Chunilal Rathod Initiate call to present one or more types of applications and media up-to end of call
CN109040411A (en) * 2018-08-21 2018-12-18 宋庚辉 A kind of mobile phone safe and operation method based on user fingerprints
CN111026479A (en) * 2019-11-25 2020-04-17 深圳传音控股股份有限公司 Interface switching method, terminal and computer readable storage medium
CN111054060A (en) * 2019-12-17 2020-04-24 腾讯科技(深圳)有限公司 Game control method, device, computer equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090177956A1 (en) * 2008-01-04 2009-07-09 Shiling Huang Method and Apparatus for Implementing Browser Based Hypertext Transfer Protocol Session Storage
CN104580731A (en) * 2015-01-13 2015-04-29 广东欧珀移动通信有限公司 Communication interface display method and device and mobile terminal
US20180309801A1 (en) * 2015-05-23 2018-10-25 Yogesh Chunilal Rathod Initiate call to present one or more types of applications and media up-to end of call
US20170192646A1 (en) * 2015-12-31 2017-07-06 Le Holdings (Beijing) Co., Ltd. Method and electronic device for hiding application icons and mobile phone
CN106548347A (en) * 2016-10-08 2017-03-29 宇龙计算机通信科技(深圳)有限公司 A kind of processing meanss of financial payment, method and terminal
CN106502682A (en) * 2016-10-31 2017-03-15 珠海市魅族科技有限公司 A kind of function interface methods of exhibiting and device
CN106874744A (en) * 2017-01-19 2017-06-20 深圳市金立通信设备有限公司 A kind of method and terminal for preventing from missing locking terminal
CN109040411A (en) * 2018-08-21 2018-12-18 宋庚辉 A kind of mobile phone safe and operation method based on user fingerprints
CN111026479A (en) * 2019-11-25 2020-04-17 深圳传音控股股份有限公司 Interface switching method, terminal and computer readable storage medium
CN111054060A (en) * 2019-12-17 2020-04-24 腾讯科技(深圳)有限公司 Game control method, device, computer equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114241679A (en) * 2021-12-08 2022-03-25 广东电网有限责任公司 Self-service terminal device anti-misoperation touch method and system
CN116028909A (en) * 2023-02-24 2023-04-28 深圳市赛柏特通信技术有限公司 Security office control method, system and medium
CN116028909B (en) * 2023-02-24 2023-12-19 深圳市赛柏特通信技术有限公司 Security office control method, system and medium

Similar Documents

Publication Publication Date Title
CN113032067A (en) Hidden interface calling method and device, computer equipment and storage medium
US7673149B2 (en) Identification and/or authentication method
JP6441982B2 (en) Digital door lock system
AU2013245980B2 (en) Location-based access control for portable electronic device
EP3122018B1 (en) Mobile terminal and method of controlling the same
CN109324863B (en) Fingerprint identification method and device and computer readable storage medium
CN107145291A (en) Information processor and information processing method
CN104363205B (en) Using login method and device
EP3437020B1 (en) Secure storage of fingerprint related elements
CN104951677B (en) Information processing method and device
CN106066763B (en) Terminal unlocking method and device
CN105511758B (en) Information processing method and electronic equipment
CN108664279A (en) A kind of method and apparatus based on the application of fingerprint recognition synchronous averaging
CN106815504A (en) The method and terminal of a kind of unlock terminal
CN115427948A (en) Application protection method, control device and readable storage medium
CN107871075B (en) Password authentication device
CN112041899B (en) Apparatus and method for identifying user
CN110516424A (en) Start method, mobile terminal and the computer readable storage medium of application program
EP4086792A1 (en) Augmented handwritten signature authentication method and electronic device supporting same
CN108319419A (en) Start the method and device of application
CN107181595A (en) A kind of account method for retrieving and device for retrieving based on intelligent terminal
WO2018006326A1 (en) Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password
CN111369716B (en) Unlocking method, door lock and computer readable storage medium
JP7073937B2 (en) Password authentication device
WO2018006330A1 (en) Method and system for unlocking intelligent entrance guard based on identity card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210625