CN107633174B - User input management method and device and terminal - Google Patents

User input management method and device and terminal Download PDF

Info

Publication number
CN107633174B
CN107633174B CN201610570352.XA CN201610570352A CN107633174B CN 107633174 B CN107633174 B CN 107633174B CN 201610570352 A CN201610570352 A CN 201610570352A CN 107633174 B CN107633174 B CN 107633174B
Authority
CN
China
Prior art keywords
interference
input
bytes
input method
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610570352.XA
Other languages
Chinese (zh)
Other versions
CN107633174A (en
Inventor
姚均营
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing ZTE New Software Co Ltd
Original Assignee
Nanjing ZTE New Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing ZTE New Software Co Ltd filed Critical Nanjing ZTE New Software Co Ltd
Priority to CN201610570352.XA priority Critical patent/CN107633174B/en
Priority to PCT/CN2016/095340 priority patent/WO2018014400A1/en
Publication of CN107633174A publication Critical patent/CN107633174A/en
Application granted granted Critical
Publication of CN107633174B publication Critical patent/CN107633174B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention provides a user input management method, a device and a terminal; the method comprises the following steps: when the input method is called by a target application, detecting the clicking operation of a user on an input interface of the input method, generating interference operation and transmitting the interference operation to the input method after detecting the clicking operation, wherein the interference operation is used for generating interference bytes through the input method, receiving bytes to be input generated by the input method according to the clicking operation and the interference operation, deleting the interference bytes generated by the input method in the bytes to be input according to the interference operation, generating target bytes, and inputting the target bytes into the input interface of the target application. Through the implementation of the embodiment of the invention, as the click operation and the interference operation both generate the corresponding bytes through the input method, the input record obtained through the input method comprises the click operation and the interference operation, the click operation of the user cannot be illegally and accurately obtained through the record of the input method, and further the privacy information of the user cannot be calculated.

Description

User input management method and device and terminal
Technical Field
The present invention relates to the field of user input, and in particular, to a user input management method, device and terminal.
Background
With the rapid popularization of smart phones, services such as mobile payment and the like are rapidly increased at mobile phone terminals, and the consequent theft of customer information and fund loss become a great security threat for common users. For example, a privacy stealing virus- "keyboard blackhand", which was popular overseas, is packaged into a swiftkeykeykeyboard known as a mobile phone input method, and can directly monitor user keyboard input and upload leaked user account password information, even including payment data such as credit cards and internet banking, and the virus is very serious in harm. Namely, when the user inputs the privacy information by using the input method, the input method is invaded, so that the privacy information of the user is leaked.
Disclosure of Invention
The embodiment of the invention provides a user input management method, a device and a terminal, and aims to solve the problem that in the prior art, user privacy information is leaked due to the fact that an input method is invaded.
In one aspect, a user input management method is provided, including:
when the input method is called by a target application, detecting the click operation of a user on an input method input interface;
after the click operation is detected, generating interference operation and transmitting the interference operation to an input method, wherein the interference operation is used for generating interference bytes through the input method;
receiving a byte to be input generated by an input method according to click operation and interference operation;
deleting interference bytes generated by an input method in bytes to be input according to interference operation to generate target bytes;
and inputting the target byte into an input interface of the target application.
In one aspect, a user input management apparatus is provided, including: a detection module, an interference module and an interference elimination module, wherein,
the detection module is used for detecting the clicking operation of a user on an input interface of the input method when the input method is called by a target application;
the interference module is used for generating interference operation and transmitting the interference operation to the input method after the click operation is detected, and the interference operation is used for generating interference bytes through the input method;
the interference removing module is used for receiving the bytes to be input generated by the input method according to the clicking operation and the interference operation, deleting the interference bytes generated by the input method in the bytes to be input according to the interference operation, generating target bytes and inputting the target bytes into an input interface of a target application.
In one aspect, a terminal is provided, including: an input module, an application target, an input method module and a processor, wherein,
the input module is used for receiving user operation and generating click operation;
the application module is used for starting the target application according to the user operation and calling an input method on an input interface of the target application;
the input method module comprises at least one input method and is used for calling the input method to generate bytes according to input operation and outputting the bytes, and the input operation comprises click operation and interference operation;
the processor is used for detecting the clicking operation of a user on an input interface of the input method when the input method is called by a target application, generating interference operation and transmitting the interference operation to the input method after the clicking operation is detected, wherein the interference operation is used for generating interference bytes through the input method, receiving bytes to be input generated by the input method according to the clicking operation and the interference operation, deleting the interference bytes generated by the input method in the bytes to be input according to the interference operation, generating target bytes, and inputting the target bytes into the input interface of the target application.
In another aspect, a computer storage medium having computer-executable instructions stored therein for performing the aforementioned user input management method is provided.
The embodiment of the invention has the following beneficial effects:
the embodiment of the invention provides a user input management method, which comprises the steps of generating an interference operation after detecting that a user inputs a click operation, and deleting an interference byte corresponding to the interference operation on a target application interface; the corresponding bytes are generated through the input method in the click operation and the interference operation, so that the input records acquired through the input method comprise the click operation and the interference operation, even if the input method is invaded, the click operation of the user cannot be illegally and accurately acquired through the records of the input method, the input content of the user cannot be calculated according to the click operation, the privacy information input through the input method by the user cannot be illegally acquired, the problem that the privacy information of the user is leaked due to the fact that the input method is invaded in the prior art is solved, and the use experience of the user is enhanced.
Drawings
FIG. 1 is a flowchart of a user input management method according to a first embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a user input management apparatus according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal according to a third embodiment of the present invention;
FIG. 4 is a schematic diagram of an input method framework according to a fourth embodiment of the present invention;
FIG. 5 is a flow chart of an implementation of a prior art input method;
FIG. 6 is a flowchart of an input method operation provided by a fourth embodiment of the present invention;
fig. 7 is a schematic diagram of an object program input interface according to a fourth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention will now be further explained by means of embodiments in conjunction with the accompanying drawings.
The first embodiment:
fig. 1 is a flowchart of a user input management method according to a first embodiment of the present invention, and as can be seen from fig. 1, the user input management method according to the present embodiment includes:
s101: when the input method is called by a target application, detecting the click operation of a user on an input method input interface;
in practical application, the input method input interface can be realized by directly using a terminal key or can be realized in a touch screen terminal in a virtual key mode; the clicking operation includes a user's key operation and/or pressing, touching, etc. on the virtual keyboard.
S102: after the click operation is detected, generating interference operation and transmitting the interference operation to an input method, wherein the interference operation is used for generating interference bytes through the input method;
the interference operation is triggered by the terminal autonomously, is not clicked by the user, and is used for protecting the actual input purpose of the user from being recorded by the input method.
S103: receiving a byte to be input generated by an input method according to click operation and interference operation;
when the input method receives an input operation, the corresponding byte is generated according to a preset relationship, which is not the focus of the present embodiment and is not described again; in this embodiment, the input operation includes a click operation of the user and an interference operation generated by the terminal, so that the input method cannot learn/record the actual input intention of the user, especially the private information related to fund security such as bank account password.
S104: deleting interference bytes generated by an input method in bytes to be input according to interference operation to generate target bytes;
after the interference byte is deleted, the generated target byte is the content which is actually input by the user, so that the problem of error input by the user due to interference operation is avoided.
S105: and inputting the target byte into an input interface of the target application.
In some embodiments, the generating and transmitting the interference operation to the input method after the click operation is detected in the above embodiments includes:
acquiring position coordinates of each character on an input method input interface;
after the click operation is detected, selecting an interference character to be triggered according to a preset interference rule, and taking the position of the interference character as a position coordinate of the interference operation;
and generating the interference operation according to the position coordinates of the interference operation, and transmitting the interference operation to the input method.
In practical application, the interference rule may be any rule, such as a mode of arbitrarily selecting one or more characters from all characters of the input method input interface as interference characters, or selecting a next character of a character corresponding to a user click operation as an interference character, and the like; in some embodiments, when the plurality of interference rules are that at least one character is selected as an interference character from adjacent characters of characters corresponding to a click operation, the selecting an interference character to be triggered according to a preset interference rule in the above embodiments includes:
acquiring position coordinates of characters corresponding to click operations;
determining adjacent characters of characters corresponding to the click operation according to the position coordinates of the characters on the input interface of the input method and the position coordinates of the characters corresponding to the click operation;
at least one character is selected from the adjacent characters as an interference character.
In some embodiments, the generating the interference operation after the click operation is detected in the above embodiments includes:
after the click operation is detected, generating interference operation before the input method generates bytes according to the click operation; and/or the presence of a gas in the gas,
and after the clicking operation is detected and the input method generates the bytes according to the clicking operation, generating an interference operation.
In some embodiments, before deleting the interference byte generated by the input method in the byte to be input according to the interference operation, the user input management method in the above embodiments further includes:
determining an interference byte corresponding to the interference operation according to the mapping relation of the byte generated by the input method according to the operation;
carrying out identification display on the interference bytes;
deleting the interference bytes generated by the input method in the bytes to be input according to the interference operation comprises the following steps: deleting the bytes identified for display.
In some embodiments, deleting the interference bytes generated by the input method in the bytes to be input according to the interference operation in the above embodiments includes:
immediately deleting interference bytes after detecting that the input method generates the interference bytes according to the interference operation; and/or the presence of a gas in the gas,
and after detecting that the user closes the input method input interface to finish inputting, deleting all interference bytes in all bytes to be input generated by the input method according to the clicking operation and the interference operation.
Second embodiment:
fig. 2 is a schematic structural diagram of a user input management device according to a second embodiment of the present invention, and as can be seen from fig. 2, the user input management device according to the present embodiment includes: a detection module 21, an interference module 22 and an interference elimination module 23, wherein,
the detection module 21 is configured to detect a click operation of a user on an input method input interface when the input method is called by a target application;
the interference module 22 is configured to generate an interference operation and transmit the interference operation to the input method after the click operation is detected, where the interference operation is used to generate an interference byte through the input method;
the interference removing module 23 is configured to receive a byte to be input generated by the input method according to the click operation and the interference operation, delete an interference byte generated by the input method in the byte to be input according to the interference operation, generate a target byte, and input the target byte into an input interface of a target application.
In some embodiments, the interference module 22 in the above embodiments is configured to obtain position coordinates of each character on the input interface of the input method; after the click operation is detected, the position coordinates of the characters corresponding to the click operation are obtained, the adjacent characters of the characters corresponding to the click operation are determined according to the position coordinates of the characters on the input interface of the input method and the position coordinates of the characters corresponding to the click operation, at least one character is selected from the adjacent characters to serve as an interference character, the position of the interference character serves as the position coordinates of the interference operation, the interference operation is generated according to the position coordinates of the interference operation, and the interference operation is transmitted to the input method.
In some embodiments, the interference module 22 in the above embodiments is configured to generate a mapping relationship of bytes according to an input method and an operation, determine an interference byte corresponding to the interference operation, and display the interference byte by an identifier; the interference elimination module is used for deleting the bytes which are marked and displayed.
In some embodiments, the interference elimination module 23 in the above embodiments is configured to delete the interference bytes immediately after detecting that the input method generates the interference bytes according to the interference operation; and/or deleting all interference bytes in all bytes to be input generated by the input method according to the clicking operation and the interference operation after detecting that the user closes the input method input interface to complete input.
In practical applications, all the functional modules in the embodiment shown in fig. 2 may be implemented by using a processor, an editing logic device, or the like.
The third embodiment:
fig. 3 is a schematic structural diagram of a terminal according to a third embodiment of the present invention, and as can be seen from fig. 3, the terminal according to this embodiment includes: an input module 31, an application module 32, an input method module 33, and a processor 34, wherein,
the input module 31 is used for receiving user operation and generating click operation; the touch screen display device can be an entity key on the terminal, a virtual key displayed by the touch screen, a key provided by external auxiliary equipment and the like;
the application module 32 is used for starting the target application according to the user operation and calling an input method on an input interface of the target application; after invoking the input method, a trigger message is sent to processor 34;
the input method module 33 comprises at least one input method, and is used for calling the input method to generate bytes according to input operation and outputting the bytes, wherein the input operation comprises click operation and interference operation;
the processor 34 is configured to detect a click operation of a user on an input interface of the input method when the trigger message is received and the input method is considered to be called by the target application, generate an interference operation after the click operation is detected, and transmit the interference operation to the input method, where the interference operation is used to generate an interference byte through the input method, receive a byte to be input generated by the input method according to the click operation and the interference operation, delete the interference byte generated by the input method in the byte to be input according to the interference operation, generate a target byte, and input the target byte into the input interface of the target application.
In some embodiments, the processor 34 in the above embodiments is configured to obtain position coordinates of each character on the input method input interface; after the click operation is detected, selecting an interference character to be triggered according to a preset interference rule, and taking the position of the interference character as a position coordinate of the interference operation; and generating the interference operation according to the position coordinates of the interference operation, and transmitting the interference operation to the input method.
In some embodiments, when the interference rules are that at least one character is selected from adjacent characters of the character corresponding to the click operation as the interference character, the processor 34 in the above embodiments is configured to obtain the position coordinate of the character corresponding to the click operation; determining adjacent characters of characters corresponding to the click operation according to the position coordinates of the characters on the input interface of the input method and the position coordinates of the characters corresponding to the click operation; at least one character is selected from the adjacent characters as an interference character.
In some embodiments, the processor 34 in the above embodiments is configured to generate the interference operation after detecting the click operation and before the input method generates the byte according to the click operation; and/or generating an interference operation after the click operation is detected and the input method generates the byte according to the click operation.
In some embodiments, the processor 34 in the above embodiments is configured to generate a mapping relationship of bytes according to an operation according to an input method, and determine an interference byte corresponding to the interference operation; carrying out identification display on the interference bytes; deleting the bytes identified for display.
In some embodiments, the processor 34 in the above embodiments is configured to delete the interference bytes immediately after detecting that the input method generates the interference bytes according to the interference operation; and/or deleting all interference bytes in all bytes to be input generated by the input method according to the clicking operation and the interference operation after detecting that the user closes the input method input interface to complete input.
The fourth embodiment:
the present invention will now be further explained with reference to specific application scenarios.
In this embodiment, when the user inputs character information through the input method, the terminal system automatically adds the scrambling code into the character information input by the user, and deletes the scrambling code automatically added by the system from the target program of the input content, so that the input method program cannot accurately acquire the real content input by the user without affecting the normal input of the user, thereby implementing the safe input of the content.
The terminal system automatically adds the scrambling code in the character information input by the user, namely that when the user clicks a certain character in a keyboard on a screen to generate an input coordinate, the system automatically adds other coordinates in a coordinate queue to generate the scrambling code.
In detail, when a user clicks a screen, a system input device file records coordinate values input by the user, for example, in an intelligent system based on L inux, coordinate information of a touch screen is recorded in an input device file/dev/input/event, under a safe input method, the system generates single or multiple interference coordinates according to a certain rule by taking the coordinates generated by the user clicking as a standard, and writes the interference coordinates into the input device file/dev/input/event.
The target program for inputting the content refers to a series of software applications installed on the terminal system, such as social software, mobile banking software and the like.
When the input method program generates characters and transmits the characters to the target program, the terminal system deletes the interference characters in the character queue and only keeps the normal characters input by the user.
The method for deleting the interference characters by the terminal system is to obtain the characters of the control by analyzing the target program interface control and then delete the interference characters on the control.
In detail, the specific method for analyzing the interface control information of the target program is to acquire the current interface control information through a function interface, for example, the control information can be acquired through a dumpWindowHierarchy interface on an Android platform terminal, or the control information can be acquired through a uiautoamtor dump command.
Further, after the interface control information is obtained, the text content of the control can be changed through the function interface. For example, the text information of the control can be set on the Android platform terminal through a settext method in the UiAutomator library, so that the deletion of the interference characters in the control text is completed.
Based on the technical scheme, under the condition that the input method program is maliciously invaded, the malicious program cannot accurately collect the real content input by the user, so that the aim of safe input is fulfilled.
Specifically, taking a mobile phone of an Android system as an example, as shown in fig. 4, an intelligent terminal input method system frame includes three parts, namely a target program, a system process and an input method process; when a target program, such as social software and mobile banking software, needs to input character content, firstly, an input method program is applied to a system process for opening, and when the system process receives the application, an input frame is bound and an input method is displayed. For example, in an Android-based system terminal, collaborative interaction is performed respectively through an InputMethodManager, an InputMethodManagerService and an InputMethodService in a target program, a system process and an input method process. And after the input frame is bound and the input method is displayed, the user clicks the touch screen, the character is generated by the input method process and is transmitted to the target program, and the target program receives the character and displays the character on the corresponding control.
The workflow of the existing input method is shown in fig. 5, a user clicks a touch screen, and a general flow of inputting characters includes the following steps:
s502, the user clicks a certain character on the on-screen input method keyboard, such as the letter a.
S504, the touch screen driving program responds to the clicking action, generates coordinates of the clicking position and reports the coordinate content to the terminal input subsystem.
S506, the terminal input subsystem writes the content reported by the driver into an input device file, for example, in a linux-based intelligent system, the input device file is in a/dev/input/directory.
S508, the terminal input subsystem monitors the content change in the input device file, packages the original coordinate information, and sends the original coordinate information to the upper application program (i.e. input method program) in the mode of input event.
S510, the input method program responds to the input event and generates a character, such as the letter a.
And S512, the target program receives the characters sent by the input program and displays the characters on the control of the current acquired focus.
In the process, all characters expected to be input by a user are generated through an input method program, so that when the input method program is invaded and is not credible, all contents input by the user can be directly stolen, and the security risk is high. The safety input flow proposed by the invention can solve the problem.
The working method of the input method provided by the embodiment is shown in fig. 6, and the safe character input process includes the following steps:
s602, the user clicks a certain character on the keyboard of the on-screen input method, such as the letter a.
And S604, responding to the click action by the touch screen driving program, generating a coordinate of the click position, and reporting the coordinate content to the terminal input subsystem.
And S606, the terminal input subsystem writes the content reported by the driver into an input device file, for example, in a linux-based intelligent system, the input device file is in a/dev/input/directory.
S608, the terminal input subsystem monitors the content change in the input device file, packages the original coordinate information and sends the original coordinate information to the upper application program (i.e. the input method program) in the mode of input events.
S610, the input method program responds to the input event and generates a character, such as the letter a.
And S612, the target program receives the characters sent by the input program and displays the characters on the control of the current acquired focus.
And S614, recording characters, such as a letter a, which are input by a user in the target program by the system process, generating interference coordinates by the system on the basis, and writing the interference coordinates into the/dev/input equipment file.
In detail, the rule for generating the interference coordinate by the system is to obtain the central coordinate position of each letter control by analyzing the layout information of the current interface, and then randomly take out a plurality of letter coordinates as the interference coordinate.
S616, the system monitors the interference coordinate information inserted in the input equipment file, packages the interference coordinate information and sends an interference input event to the input method program.
S618, the input method program generates an interference character, such as the letter b, in response to the input event.
S620, the target program receives and displays all characters, such as ab.
And S622, the terminal system process acquires the character content of the edit box in the target program, compares the character content with the character content recorded in the step S614, and modifies the content of the edit box of the target program into the character content recorded in the step S614, so that the aim of deleting the interference characters is fulfilled.
In detail, steps S620 and S622 are completed in a short time, automatically completed by the program in real time, and the time taken for inputting and deleting characters is in millisecond level, so that the user cannot sense the operation performed by the system process in the normal input process.
In the process, after the user finishes inputting one character, the system quickly and automatically generates interference coordinates and generates interference characters through an input method, and then the system process restores the input content of the target program including the interference characters to the character input by the user, wherein a schematic diagram of the process is shown in fig. 7.
In fig. 7, the schematic diagram of the user clicking the screen to input the letter a is shown as S702; the target program input schematic diagram after the system automatically generates the interference characters is shown as S704, in S704, the characters input by the user and the interference characters inserted by the system can be displayed in different font styles to give friendly prompt instructions to the user, for example, the letter b in the schematic diagram is displayed in color; in S706, the interference character b is deleted, and only the contents input by the user are retained.
The embodiment provides a safe input method, which can safely improve the input of a common input method program on the basis of the existing input system of a mobile terminal, reduce the safety risk caused by the input method program and greatly improve the safety factor of a product.
In summary, the implementation of the embodiment of the present invention has at least the following advantages:
the embodiment of the invention provides a user input management method, which comprises the steps of generating an interference operation after detecting that a user inputs a click operation, and deleting an interference byte corresponding to the interference operation on a target application interface; the corresponding bytes are generated through the input method in the click operation and the interference operation, so that the input records acquired through the input method comprise the click operation and the interference operation, even if the input method is invaded, the click operation of the user cannot be illegally and accurately acquired through the records of the input method, the input content of the user cannot be calculated according to the click operation, the privacy information input through the input method by the user cannot be illegally acquired, the problem that the privacy information of the user is leaked due to the fact that the input method is invaded in the prior art is solved, and the use experience of the user is enhanced.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above embodiments are only examples of the present invention, and are not intended to limit the present invention in any way, and any simple modification, equivalent change, combination or modification made by the technical essence of the present invention to the above embodiments still fall within the protection scope of the technical solution of the present invention.

Claims (11)

1. A user input management method, comprising:
when the input method is called by a target application, detecting the click operation of a user on an input method input interface;
acquiring position coordinates of each character on the input method input interface;
after the click operation is detected, acquiring the position coordinates of the character corresponding to the click operation;
determining adjacent characters of the characters corresponding to the click operation according to the position coordinates of the characters on the input method input interface and the position coordinates of the characters corresponding to the click operation;
selecting at least one character from the adjacent characters as an interference character, and taking the position of the interference character as a position coordinate of interference operation;
generating interference operation according to the position coordinates of the interference operation, and transmitting the interference operation to the input method, wherein the interference operation is used for automatically generating interference bytes through the input method;
receiving a byte to be input generated by the input method according to the click operation and the interference operation;
deleting the interference bytes generated by the input method in the bytes to be input according to the interference operation to generate target bytes;
and inputting the target byte into an input interface of the target application.
2. The method of user input management according to claim 1, wherein generating the perturbation operation upon detecting the click operation comprises:
after the click operation is detected, generating the interference operation before the input method generates bytes according to the click operation; and/or the presence of a gas in the gas,
and generating the interference operation after the click operation is detected and the input method generates bytes according to the click operation.
3. The user input management method of claim 1, further comprising, before deleting the interference bytes in the bytes to be input that the input method generates according to the interference operation:
according to the input method, generating a mapping relation of bytes according to operation, and determining interference bytes corresponding to the interference operation;
the interference bytes are marked and displayed;
deleting the interference bytes generated by the input method in the bytes to be input according to the interference operation, wherein the deleting comprises the following steps: deleting the bytes identified for display.
4. The method according to any one of claims 1 to 3, wherein the deleting the interference bytes generated by the input method in the bytes to be input according to the interference operation comprises:
deleting interference bytes immediately after detecting that the input method generates the interference bytes according to interference operation; and/or the presence of a gas in the gas,
and after detecting that the user closes the input method input interface to finish inputting, deleting all interference bytes in all bytes to be input generated by the input method according to the clicking operation and the interference operation.
5. A user input management device, comprising: a detection module, an interference module and an interference elimination module, wherein,
the detection module is used for detecting the clicking operation of a user on an input interface of the input method when the input method is called by a target application;
the interference module is used for acquiring the position coordinates of each character on the input method input interface; after the click operation is detected, acquiring the position coordinates of the character corresponding to the click operation; determining adjacent characters of the characters corresponding to the click operation according to the position coordinates of the characters on the input method input interface and the position coordinates of the characters corresponding to the click operation; selecting at least one character from the adjacent characters as an interference character, and taking the position of the interference character as a position coordinate of interference operation; generating interference operation according to the position coordinates of the interference operation, and transmitting the interference operation to the input method, wherein the interference operation is used for automatically generating interference bytes through the input method;
the interference removing module is used for receiving the bytes to be input generated by the input method according to the clicking operation and the interference operation, deleting the interference bytes generated by the input method according to the interference operation in the bytes to be input, generating target bytes, and inputting the target bytes into an input interface of the target application.
6. The apparatus according to claim 5, wherein the interference module is configured to determine an interference byte corresponding to the interference operation according to a mapping relationship of bytes generated by the input method according to the operation, and display the interference byte by identification; the interference elimination module is used for deleting the bytes which are marked and displayed.
7. The apparatus according to any of claims 5 to 6, wherein the interference elimination module is configured to delete the interference bytes immediately after detecting that the input method generates the interference bytes according to the interference operation; and/or deleting all interference bytes in all bytes to be input generated by the input method according to the clicking operation and the interference operation after detecting that the user closes the input method input interface to complete input.
8. A terminal, comprising: an input module, an application module, an input method module and a processor, wherein,
the input module is used for receiving user operation and generating click operation;
the application module is used for starting the target application according to the user operation and calling an input method on an input interface of the target application;
the input method module comprises at least one input method and is used for calling the input method to generate bytes according to input operation and outputting the bytes, and the input operation comprises click operation and interference operation;
the processor is used for detecting the clicking operation of a user on an input method input interface when the input method is called by a target application, and acquiring the position coordinates of each character on the input method input interface; after the click operation is detected, acquiring the position coordinates of the character corresponding to the click operation; determining adjacent characters of the characters corresponding to the click operation according to the position coordinates of the characters on the input method input interface and the position coordinates of the characters corresponding to the click operation; selecting at least one character from the adjacent characters as an interference character, and taking the position of the interference character as a position coordinate of interference operation; generating interference operation according to the position coordinates of the interference operation, transmitting the interference operation to the input method, wherein the interference operation is used for automatically generating interference bytes through the input method, receiving bytes to be input generated by the input method according to the click operation and the interference operation, deleting the interference bytes generated by the input method according to the interference operation in the bytes to be input, generating target bytes, and inputting the target bytes into an input interface of the target application.
9. The terminal of claim 8, wherein the processor is configured to generate the perturbation operation after detecting the click operation and before the input method generates the byte according to the click operation; and/or generating the interference operation after the click operation is detected and the input method generates the bytes according to the click operation.
10. The terminal of claim 8, wherein the processor is configured to determine an interference byte corresponding to the interference operation according to a mapping relationship of bytes generated by the input method according to the operation; the interference bytes are marked and displayed; deleting the bytes identified for display.
11. The terminal of any of claims 8 to 10, wherein the processor is configured to delete the interference bytes immediately after detecting that the input method generates the interference bytes according to an interference operation; and/or deleting all interference bytes in all bytes to be input generated by the input method according to the clicking operation and the interference operation after detecting that the user closes the input method input interface to complete input.
CN201610570352.XA 2016-07-18 2016-07-18 User input management method and device and terminal Active CN107633174B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610570352.XA CN107633174B (en) 2016-07-18 2016-07-18 User input management method and device and terminal
PCT/CN2016/095340 WO2018014400A1 (en) 2016-07-18 2016-08-15 User input managing method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610570352.XA CN107633174B (en) 2016-07-18 2016-07-18 User input management method and device and terminal

Publications (2)

Publication Number Publication Date
CN107633174A CN107633174A (en) 2018-01-26
CN107633174B true CN107633174B (en) 2020-07-31

Family

ID=60991664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610570352.XA Active CN107633174B (en) 2016-07-18 2016-07-18 User input management method and device and terminal

Country Status (2)

Country Link
CN (1) CN107633174B (en)
WO (1) WO2018014400A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188532B (en) * 2019-05-05 2020-12-15 珠海格力电器股份有限公司 Password protection method and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104143068A (en) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 Password authentication method and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100485708C (en) * 2007-08-07 2009-05-06 江雨 Input data safe treatment method and device
CN101309260A (en) * 2008-06-05 2008-11-19 周红伟 Network authentication method on the basis of cryptoguard
CN101808077B (en) * 2009-02-13 2013-05-08 普天信息技术研究院有限公司 Information security input processing system and method and smart card
US9652440B2 (en) * 2010-05-27 2017-05-16 Microsoft Technology Licensing, Llc Concurrent utilization of a document by multiple threads

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104143068A (en) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 Password authentication method and system

Also Published As

Publication number Publication date
CN107633174A (en) 2018-01-26
WO2018014400A1 (en) 2018-01-25

Similar Documents

Publication Publication Date Title
CN106778130B (en) Message display method, display device and mobile terminal
US20190332765A1 (en) File processing method and system, and data processing method
CN108171025B (en) Method for realizing multi-user login mode, terminal and computer readable storage medium
WO2016101384A1 (en) Dual-system switch based data security processing method and apparatus
KR102132521B1 (en) Method for invoking local keyboard on html page in user terminal device and apparatus thereof
EP3176719B1 (en) Methods and devices for acquiring certification document
CN101840469A (en) Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain
CN105519038A (en) Data protection based on user input during device boot-up, user login, and device shut-down states
CN108400868B (en) Seed key storage method and device and mobile terminal
CN107944292B (en) Privacy data protection method and system
CN111783055A (en) Account information management method and device and electronic equipment
CN115344835A (en) Picture processing method, storage medium and computer terminal
CN110502894B (en) Operation behavior identification method, device and system
CN111259382A (en) Malicious behavior identification method, device and system and storage medium
CN107633174B (en) User input management method and device and terminal
CN113282364A (en) Display method, display device and electronic equipment
CN116931807A (en) Virtual keyboard character layout control method and device, storage medium and electronic equipment
WO2018053988A1 (en) Secure input system and method, intelligent terminal, and storage medium
CN105446516A (en) Information input method and device
CN102930222B (en) Antibonding disc recording method and system
CN114741727A (en) Data sending method and device
CN113343189A (en) Method and device for preventing malicious swiping of short message verification code
CN104866777A (en) Data protection method, device and electronic equipment
CN112699372A (en) Vulnerability processing method and device and computer readable storage medium
CN114121049B (en) Data processing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200706

Address after: 210012 Nanjing, Yuhuatai District, South Street, Bauhinia Road, No. 68

Applicant after: Nanjing Zhongxing Software Co.,Ltd.

Address before: 518057 Nanshan District science and Technology Industrial Park, Guangdong high tech Industrial Park, ZTE building

Applicant before: ZTE Corp.

GR01 Patent grant
GR01 Patent grant