CN110598489A - Privacy protection method for inputting prompt information and related device - Google Patents

Privacy protection method for inputting prompt information and related device Download PDF

Info

Publication number
CN110598489A
CN110598489A CN201810609503.7A CN201810609503A CN110598489A CN 110598489 A CN110598489 A CN 110598489A CN 201810609503 A CN201810609503 A CN 201810609503A CN 110598489 A CN110598489 A CN 110598489A
Authority
CN
China
Prior art keywords
information
input
input prompt
prompt information
interference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810609503.7A
Other languages
Chinese (zh)
Other versions
CN110598489B (en
Inventor
穆艳学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sogou Technology Development Co Ltd
Original Assignee
Beijing Sogou Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sogou Technology Development Co Ltd filed Critical Beijing Sogou Technology Development Co Ltd
Priority to CN201810609503.7A priority Critical patent/CN110598489B/en
Publication of CN110598489A publication Critical patent/CN110598489A/en
Application granted granted Critical
Publication of CN110598489B publication Critical patent/CN110598489B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a privacy protection method for inputting prompt information and a related device, wherein the method comprises the following steps: responding to the input operation of a user, and obtaining input prompt information; converting the input prompt information into interference information according to a preset conversion rule; displaying the interference information in a code input area. Therefore, in the embodiment of the application, the input prompt information in the code input area is not displayed in a plaintext, but is displayed after being converted into the interference information according to the preset conversion rule, and the interference information prevents other users from knowing the real input prompt information, so that privacy protection of the input prompt information is realized, the potential safety hazard that information is stolen by other users is avoided, and the information safety is improved.

Description

Privacy protection method for inputting prompt information and related device
Technical Field
The present application relates to the field of information technologies, and in particular, to a privacy protection method for inputting prompt information and a related device.
Background
In the field of input methods, after a user inputs information such as Chinese, English or other characters, input prompt information corresponding to the information is displayed in a code input area, so that the user can select the information on a screen conveniently. For example, after the user inputs pinyin, the input prompt information displayed in the code input area includes: the pinyin input by the user and the candidate information corresponding to the pinyin can be selected by the user according to the input pinyin and the candidate information.
However, at present, the input prompt information in the code input area is displayed in plain text, so that the potential safety hazard that information is stolen by others exists, and the information safety is difficult to ensure.
Disclosure of Invention
The technical problem to be solved by the application is to provide a privacy protection method and a related device for inputting prompt information, and through privacy protection of the input prompt information, the potential safety hazard that information is stolen by others is avoided, so that the information safety is improved.
Therefore, the technical scheme for solving the technical problem is as follows:
the embodiment of the application provides a privacy protection method for inputting prompt information, which comprises the following steps:
responding to the input operation of a user, and obtaining input prompt information;
converting the input prompt information into interference information according to a preset conversion rule;
displaying the interference information in a code input area.
Optionally, the input prompt message includes one or more of the following information: the information processing method comprises user input information and candidate information corresponding to the user input information.
Optionally, the preset conversion rule includes a preset synthesis rule; the obtaining and converting the input prompt information into interference information according to a preset conversion rule comprises:
synthesizing the input prompt information and the superposition information according to the preset synthesis rule to obtain the interference information;
the superimposed information is the same as the input prompt information in information type and/or the superimposed information has semantic correlation with the input prompt information.
Optionally, the preset conversion rule includes an information mapping rule; the obtaining and converting the input prompt information into interference information according to a preset conversion rule comprises:
obtaining information which has a mapping relation with the input prompt information according to the information mapping rule;
and obtaining the interference information according to the information which has a mapping relation with the input prompt information.
Optionally, the obtaining, according to the information mapping rule, information having a mapping relationship with the input prompt information includes:
sensitive information in the input prompt information is detected, and information having a mapping relation with the sensitive information is obtained according to the information mapping rule;
obtaining the interference information according to the information having a mapping relationship with the input prompt information, including: and replacing the sensitive information in the input prompt information by using the information which has the mapping relation with the sensitive information to obtain the interference information. The privacy protection method according to claim 1 or 2, wherein the input prompt information includes candidate information corresponding to user input information;
the method further comprises the following steps: performing voice output on the candidate information before the candidate information is displayed on a screen; and/or the presence of a gas in the gas,
responding to the screen-on operation of the user, and performing voice output on candidate information corresponding to the screen-on operation of the user.
Optionally, the interference information includes advertisement information; and the advertisement information points to the jump link address corresponding to the advertisement information.
Optionally, the interference information includes one or more of the following information: characters and pictures.
The embodiment of the application provides a privacy protection device for inputting prompt information, which comprises:
the first obtaining module is used for responding to the input operation of a user and obtaining input prompt information;
the second obtaining module is used for obtaining the input prompt information converted into interference information according to a preset conversion rule;
and the display module is used for displaying the interference information in the code input area.
Optionally, the input prompt message includes one or more of the following information: the information processing method comprises user input information and candidate information corresponding to the user input information.
Optionally, the preset conversion rule includes a preset synthesis rule; the second obtaining module includes: the synthesis submodule is used for synthesizing the input prompt information and the superposition information according to the preset synthesis rule to obtain the interference information;
the superimposed information is the same as the input prompt information in information type and/or the superimposed information has semantic correlation with the input prompt information.
Optionally, the preset conversion rule includes an information mapping rule; the second obtaining module includes:
the first obtaining submodule is used for obtaining information which has a mapping relation with the input prompt information according to the information mapping rule;
and the second obtaining submodule is used for obtaining the interference information according to the information which has a mapping relation with the input prompt information.
Optionally, the first obtaining sub-module is specifically configured to detect sensitive information in the input prompt information, and obtain information having a mapping relationship with the sensitive information according to the information mapping rule;
the second obtaining submodule is specifically configured to replace the sensitive information in the input prompt information with the information having the mapping relationship with the sensitive information, so as to obtain the interference information.
Optionally, the input prompt information includes candidate information corresponding to the user input information; further comprising:
and the voice output module is used for performing voice output on the candidate information before the candidate information is displayed on the screen, and/or responding to the screen display operation of a user and performing voice output on the candidate information corresponding to the screen display operation of the user.
Optionally, the interference information includes advertisement information; and the advertisement information points to the jump link address corresponding to the advertisement information.
Optionally, the interference information includes one or more of the following information: characters and pictures.
An apparatus for privacy protection is provided in an embodiment of the present application and includes a memory and one or more programs, where the one or more programs are stored in the memory and configured to be executed by one or more processors include instructions for:
responding to the input operation of a user, and obtaining input prompt information;
converting the input prompt information into interference information according to a preset conversion rule;
displaying the interference information in a code input area.
Embodiments of the present application provide a machine-readable medium having stored thereon instructions that, when executed by one or more processors, cause an apparatus to perform any of the above-described privacy protection methods.
According to the technical scheme, after the input prompt information is obtained, the input prompt information can be converted into the interference information according to the preset conversion rule, so that other users cannot acquire the real input prompt information, and the user can acquire the specific content of the preset conversion rule because the preset conversion rule can be a rule predefined by the current user, so that the real input prompt information can be acquired according to the interference information, or the user can not know the specific content of the preset conversion rule, but can acquire the real input prompt information in a voice prompt mode and the like. Therefore, in the embodiment of the application, the input prompt information in the code input area is not displayed in a plaintext, but is displayed after being converted into the interference information according to the preset conversion rule, and the interference information prevents other users from knowing the real input prompt information, so that privacy protection of the input prompt information is realized, the potential safety hazard that information is stolen by other users is avoided, and the information safety is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic flow chart of an embodiment of a method provided in an embodiment of the present application;
FIG. 2 is a schematic structural diagram of an embodiment of an apparatus according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of another embodiment of an apparatus according to the present disclosure;
fig. 4 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
Generally, when a user inputs an input by an input method, an input prompt message is displayed in a code input area. The input prompt information comprises user input information and candidate information corresponding to the user input information. According to different input methods, the encoding input area may include an input display area for displaying the user input information and/or a candidate information display area for displaying candidate information corresponding to the user input information. For example, the user enters pinyin: nihao, in the input display area and displaying the pinyin input by the user: nihao, displaying the words converted from the pinyin in a candidate information display area: hello, howls, etc. At present, input prompt information in a code input area is displayed in plain text, for example, pinyin input by a user and words converted from the pinyin are displayed in plain text, so that the potential safety hazard that information is stolen by others exists, and the information safety is difficult to ensure.
The technical problem to be solved by the application is to provide a privacy protection method and a related device for inputting prompt information, and through privacy protection of the input prompt information, the potential safety hazard that information is stolen by others is avoided, so that the information safety is improved.
Referring to fig. 1, an embodiment of a privacy protection method for inputting prompt information is provided.
The method of the embodiment comprises the following steps:
s101: and responding to the input operation of the user, and obtaining input prompt information.
In the embodiment of the application, when the current user needs to input characters such as characters, the user input operation can be executed. The user input operation includes an input operation performed by an input device such as a touch screen or a keyboard, and may also include a voice input operation performed by a recording device such as a microphone, which is not limited in the embodiment of the present application.
Wherein, the input prompt message comprises one or more of the following messages: the information processing method comprises user input information and candidate information corresponding to the user input information. The user input information refers to input information corresponding to user input operation executed by a current user, for example, a current user inputs pinyin through a touch screen: nihao. The candidate information refers to information obtained by converting user input information according to a word library, a picture library, and the like, and the information type may be characters (for example, graphics composed of words, symbols, and numbers), pictures, and the like. For example, the current user input pinyin: "nihao" translates to the word: "hello", and "howl", etc.
It should be noted that, in the embodiment of the present application, the input prompt information may be displayed in real time according to the user input operation, for example, the user input information is displayed in the input display area, and at the same time, the candidate information corresponding to the user input information may be displayed in the candidate information display area, for example, pinyin is displayed in the input display area: nihao, while displaying the words into which "nihao" is converted in the candidate information display area: "hello", and "howl", etc.
S102: and obtaining interference information converted from the input prompt information according to a preset conversion rule.
In the embodiment of the application, after the input prompt information is obtained, the input prompt information can be converted into the interference information according to the preset conversion rule, so that other users cannot acquire the real input prompt information, and the user can acquire the specific content of the preset conversion rule because the preset conversion rule can be a rule predefined by the current user, so that the real input prompt information can be acquired according to the interference information, or the user can not know the specific content of the preset conversion rule, but can acquire the real input prompt information in a voice prompt mode or the like. Therefore, the interference information prevents other users from knowing the real input prompt information, and privacy protection of the input prompt information is realized.
Wherein, the input prompt information may include user input information and/or candidate information. Correspondingly, the interference information may include interference information into which the user input information and/or the candidate information is converted according to a preset conversion rule. For example, the user enters pinyin: "nihao" and obtain the word corresponding to the pinyin: after "hello", and "howline", the interference information may include inputting pinyin to the user according to a preset conversion rule: interference information into which "nihao" is converted; or the method can also comprise the following steps of carrying out conversion on the words corresponding to the pinyin according to a preset conversion rule: the interference information converted from "hello", and "howlo", wherein the interference information may include the interference information obtained by converting each word; or may include both interference information. Therefore, privacy protection can be performed on the user input information, or privacy protection can be performed on the candidate information, or privacy protection can be performed on the user input information and the candidate information at the same time in the embodiment of the application. The interference information may be characters, such as chinese characters, words, symbols, and the like, such as english, chinese, and the like, or may also be pictures, such as emoticons, local pictures collected by the user, and the like, or may also be a combination of characters and pictures, and the like.
S103: displaying the interference information in a code input area.
For example, pinyin is displayed in the input display area: the interference information converted from the nihao is displayed in the candidate information display area, or the words corresponding to the pinyin are displayed in the candidate information display area: the interference information converted from hello, hello and howls, or the two interference information are displayed simultaneously in the input display area and the candidate information display area.
It can be seen that, in the embodiment of the present application, after the input prompt information is obtained, the input prompt information may be converted into the interference information according to the preset conversion rule, so that other users cannot obtain the real input prompt information, and since the preset conversion rule may be a rule predefined by the current user, the user may obtain the specific content of the preset conversion rule, so as to obtain the real input prompt information according to the interference information, or the user may not know the specific content of the preset conversion rule, but obtain the real input prompt information through voice prompt or the like. Therefore, in the embodiment of the application, the input prompt information in the code input area is not displayed in a plaintext, but is converted into the interference information according to the preset conversion rule and then displayed, and the interference information enables other users except the current user to be incapable of obtaining the real input prompt information, so that privacy protection of the input prompt information is realized, the potential safety hazard that information is stolen by other people is avoided, and the information safety is improved.
The input prompt information obtained in real time can be converted, and the interference information can be output in real time. For example, as characters input by the user are added and/or subtracted, the interference information is obtained and displayed in real time.
The method and the device for converting the input prompt information into the interference information can be used in the terminal device, wherein the terminal device can obtain the interference information locally, namely the terminal device converts the input prompt information into the interference information according to a preset conversion rule. Alternatively, the terminal device may also obtain the interference information through other devices such as a server, for example, the terminal device sends the user input information to the server, and obtains the interference information into which the server converts the input prompt information according to a preset conversion rule. Or the terminal device may also obtain the interference information through the two manners, which is not limited in this embodiment of the application.
In the embodiment of the application, when the input prompt information is converted into the interference information, the conversion can be performed in various ways. This will be explained in detail below.
In an alternative embodiment, the interference information is obtained by adding information to the input prompt.
Specifically, the preset conversion rule includes a preset composition rule, and S102 may include: and synthesizing the input prompt information and the superposed information according to the preset synthesis rule to obtain the interference information. This will be explained in detail below.
The superimposed information may be characters, such as chinese characters, words, symbols, and the like, such as english, chinese, and the like, or may also be pictures, such as emoticons, local pictures collected by the user, and the like, or may be a combination of characters and pictures, and the like.
Optionally, the preset synthesis rule may be used to indicate a generation rule of the superimposed information, and specifically, the preset synthesis rule includes one or more of the following information: setting rules of information length, setting rules of information type and generating mode of information content. The setting rule of the information length is used to indicate how to set the length of the superimposition information, for example, to indicate the number of characters of the superimposition information. The setting rule of the information type is used to indicate how to set the information type of the superimposition information, for example, to indicate whether the superimposition information is a character, a picture, or the like. The information content generation method is used to indicate the generation method of the content of the superimposed information, and for example, the generation method is random, generated according to a certain formula, or a combination of multiple generation methods.
Optionally, the preset composition rule may be further configured to indicate a position relationship between the input prompt information and the superimposition information. The position relationship may be a random position relationship or a fixed position relationship, for example, the superimposed information may be placed in front of or behind the input prompt information, or the superimposed information may be inserted in the middle of the input prompt information.
And synthesizing the input prompt information and the superposition information according to a preset synthesis rule to obtain the interference information, so that other users cannot acquire the real input prompt information. The current user can obtain real input prompt information according to a preset synthesis rule and by combining the interference information.
For example, the current user can know the input prompt information according to the information length and the position relationship of the superimposed information. For example, five characters input by the user are: lk, the candidate information corresponding to the five characters comprises: "add", "back", "go home", and "+". The preset synthesis rule may be that 3 characters are generated and placed behind the input prompt message, and therefore, the generated overlay message corresponding to the lk may be: "enp", the candidate information may include the corresponding overlay information: "subtract, multiply and divide," what me "," Tiananmen "," don't learn "," - "and/". The interference information obtained after the synthesis comprises: lkenp, addition, subtraction, multiplication and division, what's me ' comes back, anan ' comes back, not go to school when coming home, and plus, minus, plus and minus. And the current user can know that the last 3 characters are superposed information, so that the real input prompt information can be judged. It is supplementary stated that some confirmation prompt messages may be displayed behind the candidate messages, so that the current user can confirm the candidate messages and select the screen by inputting the confirmation prompt messages, for example: a confirmation prompt may be displayed following "back": "go", when the user enters this information: "go", then select the corresponding candidate information: and returning to the screen. The confirmation prompt may be deleted when the input prompt and the superimposition information are combined. For example, if the user cannot know the preset composition rule, a separator may be added between the displayed superimposition information and the input prompt information to facilitate the user to distinguish, for example, a "-" or "-" may be added between the displayed superimposition information and the input prompt information.
After the screen-on operation is performed on part or all of the interference information, the input prompt information may be displayed without displaying the superimposed information, or the input prompt information and the superimposed information may be displayed simultaneously, and a separator such as a "-" or "-" may be added between the input prompt information and the superimposed information for distinguishing.
It should be noted that, in order to avoid the distinction between the superimposed information and the input prompt information by other users except the current user, the superimposed information may be the same as the information type of the input prompt information and/or the superimposed information may have semantic relevance to the input prompt information. As explained below, the superimposed information may be of the same type as the input prompt information, for example, the input prompt information includes characters of the symbol type: "+", the generated overlay information may also be a character of the symbol class: and the "- +/", other users are prevented from distinguishing the superposed information from the input prompt information according to the information types. Before generating the superimposed information, a semantic analysis result of the input prompt information may be obtained, and the superimposed information having semantic correlation with the input prompt information is generated according to the semantic analysis result. For example, entering the prompt includes: the method generates the superposed information heaven and earth door with semantic correlation with the Hui, thereby forming the interference information Hui Tian Anmen with smooth sentences and avoiding other users from distinguishing the superposed information from the input prompt information according to the semantics.
For example, in one input process, 3 characters can be randomly generated as the superimposed information and placed in front of the input prompt information, and in another input process, 5 characters can be randomly generated as the superimposed information and placed behind the input prompt information. By setting different preset synthesis rules in different input processes, the privacy of the information can be further increased.
In another optional implementation, the interference information is obtained by mapping part or all of the input prompt information. This will be explained in detail below.
Specifically, the preset conversion rule includes an information mapping rule, and S102 includes: obtaining information which has a mapping relation with the input prompt information according to an information mapping rule; and obtaining the interference information according to the information which has a mapping relation with the input prompt information.
The information mapping rule refers to a mapping rule between information, and may include rules such as adjusting the order of characters in the information, and mapping the information according to an information mapping relationship. The information mapping relationship may include a mapping relationship between characters and pictures. For example, the information mapping relationship includes a mapping relationship between characters, and the input prompt information includes characters: "upper school" obtains, from the information mapping relationship, a character having a mapping relationship with "upper school": the character "happy" having the mapping relationship may be used as the interference information. For example, the information mapping relationship includes a mapping relationship between characters and pictures, where the pictures may be emoticons, local pictures collected by users, advertisement pictures recommended by a server, and the pictures having a mapping relationship with the input prompt information are used as the interference information. The mapping relationship may be established in advance by a user. For example, the server recommends pictures such as advertisement pictures and emoticons to the user according to the historical use condition of the user, and the user establishes a mapping relationship between characters such as preset words, sentences and characters and the pictures recommended by the server.
The interference information can be obtained by mapping all input prompt information, or by mapping only sensitive information in the input prompt information. This will be explained in detail below.
The sensitive information may refer to information related to user privacy or property security, for example, the information may include any one or more of a name, a phone number, address information, an identification number, a bank card number, and the like of the user. Specifically, sensitive information in the input prompt information is detected, and information having a mapping relation with the sensitive information is obtained according to the information mapping rule; wherein the sensitive information may be predefined by a user or automatically detected by the device according to default rules. And replacing the sensitive information in the input prompt information by using the information which has the mapping relation with the sensitive information to obtain the interference information. For example, the user input information includes: the 'shoujihao 131 …' detects the sensitive information '131 …', the information mapping rule is that 1 corresponds to 9, 3 corresponds to 7, the sensitive information is mapped to '979 …' according to the information mapping rule, the mapped information is used for replacing the actually input information, and the information is displayed in the input display area: "shoujihao 979 …", thereby making other users unable to know the user's true mobile phone number, and realizing the privacy protection for the user.
In the embodiment of the application, in order to enable a user to know the actual candidate information, the actual candidate information may be subjected to voice output before the candidate information is displayed on a screen. For example, the five characters input by the user are: lk, the candidate information corresponding to the five characters comprises: the method includes the steps of adding, returning and plus, displaying plus, minus, multiply and divide, what is coming back, returning to the sky, safe, not learning home and plus minus plus minus plus minus plus minus plus minus plus minus plus minus plus minus. Or, in the embodiment of the present application, after the user performs the user screen-up operation, responding to the user screen-up operation, and performing voice output on the real candidate information corresponding to the user screen-up operation. For example, after the user selects the label corresponding to the interference information "what me i am back", the actual candidate information can be: and goes back to perform voice output. Therefore, when the user cannot know the specific content of the preset conversion rule, the user can know the real input prompt information in a voice prompt mode. And in the voice output process, whether the output mode is the earphone output mode can be further detected, and if the output mode is the earphone output mode, the voice output is carried out.
In the embodiment of the application, in order to increase the information amount of the interference information and increase the information utilization rate, the advertisement information may be further carried in the interference information. For example, the overlay information includes advertisement information, e.g., the overlay information may include advertisement keywords, advertisement links, pictures containing advertisement icons, and so forth. For another example, when the input prompt information is mapped according to the information mapping rule, the input prompt information may be mapped to the information including the advertisement information, for example, the terminal device obtains a picture including the advertisement information recommended by the server to the user, and establishes a mapping relationship between characters and the picture, so that after the prompt information is input, the input prompt information is mapped to the picture including the advertisement information according to the mapping relationship.
The advertisement information can also point to a jump link address corresponding to the advertisement information, wherein the jump link address can be highlighted so as to be distinguished from other information, and the same display mode can be adopted with other information. And when the user selects the advertisement information by mouse clicking, touch on a touch screen and the like, jumping to the display content corresponding to the jump link address. For example, the jump link address may be a web page address of a search page to which a user jumps when clicking the advertisement information.
Corresponding to the above method embodiments, the present application further provides corresponding apparatus embodiments, which are specifically described below.
Referring to fig. 2, the present application provides an apparatus embodiment of a privacy protecting apparatus for inputting a hint, comprising: a first obtaining module 201, a second obtaining module 202 and a display module 203.
A first obtaining module 201, configured to obtain input prompt information in response to a user input operation.
A second obtaining module 202, configured to obtain that the input prompt information is converted into interference information according to a preset conversion rule.
A display module 203, configured to display the interference information in the code input area.
Optionally, the input prompt message includes one or more of the following information: the information processing method comprises user input information and candidate information corresponding to the user input information.
Optionally, the preset conversion rule includes a preset synthesis rule; the second obtaining module includes: the synthesis submodule is used for synthesizing the input prompt information and the superposition information according to the preset synthesis rule to obtain the interference information; the superimposed information is the same as the input prompt information in information type and/or the superimposed information has semantic correlation with the input prompt information.
Optionally, the preset conversion rule includes an information mapping rule; the second obtaining module includes:
the first obtaining submodule is used for obtaining information which has a mapping relation with the input prompt information according to the information mapping rule;
and the second obtaining submodule is used for obtaining the interference information according to the information which has a mapping relation with the input prompt information.
Optionally, the first obtaining sub-module is specifically configured to detect sensitive information in the input prompt information, and obtain information having a mapping relationship with the sensitive information according to the information mapping rule;
the second obtaining submodule is specifically configured to replace the sensitive information in the input prompt information with the information having the mapping relationship with the sensitive information, so as to obtain the interference information.
Optionally, the input prompt information includes candidate information corresponding to the user input information; further comprising:
and the voice output module is used for performing voice output on the candidate information before the candidate information is displayed on the screen, and/or responding to the screen display operation of a user and performing voice output on the candidate information corresponding to the screen display operation of the user.
Optionally, the interference information includes advertisement information; and the advertisement information points to the jump link address corresponding to the advertisement information.
Optionally, the interference information includes one or more of the following information: characters and pictures.
Fig. 3 is a block diagram illustrating an apparatus 300 for privacy protection according to an example embodiment. For example, the apparatus 300 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 3, the apparatus 300 may include one or more of the following components: processing component 302, memory 304, power component 306, multimedia component 308, audio component 310, input/output (I/O) interface 312, sensor component 314, and communication component 316.
The processing component 302 generally controls overall operation of the device 300, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 302 may include one or more processors 320 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 302 can include one or more modules that facilitate interaction between the processing component 302 and other components. For example, the processing component 302 can include a multimedia module to facilitate interaction between the multimedia component 308 and the processing component 302.
The memory 304 is configured to store various types of data to support operations at the device 300. Examples of such data include instructions for any application or method operating on device 300, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 304 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 306 provides power to the various components of the device 300. The power components 306 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 300.
The multimedia component 308 includes a screen that provides an output interface between the device 300 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 308 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 300 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 310 is configured to output and/or input audio signals. For example, audio component 310 includes a Microphone (MIC) configured to receive external audio signals when apparatus 300 is in an operating mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 304 or transmitted via the communication component 316. In some embodiments, audio component 310 also includes a speaker for outputting audio signals.
The I/O interface 312 provides an interface between the processing component 302 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 314 includes one or more sensors for providing various aspects of status assessment for the device 300. For example, sensor assembly 314 may detect an open/closed state of device 300, the relative positioning of components, such as a display and keypad of apparatus 300, the change in position of apparatus 300 or a component of apparatus 300, the presence or absence of user contact with apparatus 300, the orientation or acceleration/deceleration of apparatus 300, and the change in temperature of apparatus 300. Sensor assembly 314 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 314 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 314 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 316 is configured to facilitate wired or wireless communication between the apparatus 300 and other devices. The device 300 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication section 316 receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 316 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 300 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 304 comprising instructions, executable by the processor 320 of the apparatus 300 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium having instructions therein which, when executed by a processor of a mobile terminal, enable the mobile terminal to perform a privacy preserving method of inputting reminder information, the method comprising:
responding to the input operation of a user, and obtaining input prompt information;
converting the input prompt information into interference information according to a preset conversion rule;
displaying the interference information in a code input area.
Fig. 4 is a schematic structural diagram of a server in an embodiment of the present invention. The server 400 may vary significantly due to configuration or performance, and may include one or more Central Processing Units (CPUs) 422 (e.g., one or more processors) and memory 432, one or more storage media 430 (e.g., one or more mass storage devices) storing applications 442 or data 444. Wherein the memory 432 and storage medium 430 may be transient or persistent storage. The program stored on the storage medium 430 may include one or more modules (not shown), each of which may include a series of instruction operations for the server. Still further, the central processor 422 may be arranged to communicate with the storage medium 430, and execute a series of instruction operations in the storage medium 430 on the server 400.
The server 400 may also include one or more power supplies 426, one or more wired or wireless network interfaces 450, one or more input-output interfaces 458, one or more keyboards 456, and/or one or more operating systems 441, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and so forth.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This invention is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is only limited by the appended claims
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (11)

1. A privacy protection method for inputting prompt information is characterized by comprising the following steps:
responding to the input operation of a user, and obtaining input prompt information;
converting the input prompt information into interference information according to a preset conversion rule;
displaying the interference information in a code input area.
2. The privacy protection method of claim 1, wherein the input prompt information includes one or more of: the information processing method comprises user input information and candidate information corresponding to the user input information.
3. The privacy protection method according to claim 1 or 2, wherein the preset conversion rule includes a preset composition rule; the obtaining and converting the input prompt information into interference information according to a preset conversion rule comprises:
synthesizing the input prompt information and the superposition information according to the preset synthesis rule to obtain the interference information;
the superimposed information is the same as the input prompt information in information type and/or the superimposed information has semantic correlation with the input prompt information.
4. The privacy protection method according to claim 1 or 2, wherein the preset conversion rule comprises an information mapping rule; the obtaining and converting the input prompt information into interference information according to a preset conversion rule comprises:
obtaining information which has a mapping relation with the input prompt information according to the information mapping rule;
and obtaining the interference information according to the information which has a mapping relation with the input prompt information.
5. The privacy protection method according to claim 4, wherein the obtaining information having a mapping relationship with the input prompt information according to the information mapping rule comprises:
sensitive information in the input prompt information is detected, and information having a mapping relation with the sensitive information is obtained according to the information mapping rule;
obtaining the interference information according to the information having a mapping relationship with the input prompt information, including: and replacing the sensitive information in the input prompt information by using the information which has the mapping relation with the sensitive information to obtain the interference information.
6. The privacy protection method according to claim 1 or 2, wherein the input prompt information includes candidate information corresponding to user input information;
the method further comprises the following steps: performing voice output on the candidate information before the candidate information is displayed on a screen; and/or the presence of a gas in the gas,
responding to the screen-on operation of the user, and performing voice output on candidate information corresponding to the screen-on operation of the user.
7. The privacy protection method according to claim 1 or 2, wherein the interference information includes advertisement information; and the advertisement information points to the jump link address corresponding to the advertisement information.
8. The privacy protection method according to claim 1 or 2, wherein the interference information includes one or more of the following: characters and pictures.
9. A privacy securing apparatus for inputting a hint information, comprising:
the first obtaining module is used for responding to the input operation of a user and obtaining input prompt information;
the second obtaining module is used for obtaining the input prompt information converted into interference information according to a preset conversion rule;
and the display module is used for displaying the interference information in the code input area.
10. An apparatus for privacy protection comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors the one or more programs including instructions for:
responding to the input operation of a user, and obtaining input prompt information;
converting the input prompt information into interference information according to a preset conversion rule;
displaying the interference information in a code input area.
11. A machine-readable medium having stored thereon instructions, which when executed by one or more processors, cause an apparatus to perform a privacy preserving method as recited in one or more of claims 1-8.
CN201810609503.7A 2018-06-13 2018-06-13 Privacy protection method and related device for input prompt information Active CN110598489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810609503.7A CN110598489B (en) 2018-06-13 2018-06-13 Privacy protection method and related device for input prompt information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810609503.7A CN110598489B (en) 2018-06-13 2018-06-13 Privacy protection method and related device for input prompt information

Publications (2)

Publication Number Publication Date
CN110598489A true CN110598489A (en) 2019-12-20
CN110598489B CN110598489B (en) 2024-05-28

Family

ID=68849225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810609503.7A Active CN110598489B (en) 2018-06-13 2018-06-13 Privacy protection method and related device for input prompt information

Country Status (1)

Country Link
CN (1) CN110598489B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111669443A (en) * 2020-06-04 2020-09-15 华北电力科学研究院有限责任公司 Information processing method and device for electric power Internet of vehicles

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1702998A (en) * 2005-06-09 2005-11-30 石国伟 A method for inputting private data in network application
CN103853992A (en) * 2012-11-30 2014-06-11 国际商业机器公司 Method and device for receiving privacy-sensitive information input
CN104239824A (en) * 2014-08-27 2014-12-24 百度在线网络技术(北京)有限公司 Method and device used for displaying input information
CN105099878A (en) * 2015-06-29 2015-11-25 小米科技有限责任公司 Information display method, device and terminal
CN105511638A (en) * 2015-12-03 2016-04-20 魅族科技(中国)有限公司 Application method and device for input method
CN105786207A (en) * 2016-02-25 2016-07-20 百度在线网络技术(北京)有限公司 Information input method and device
CN105809042A (en) * 2014-12-31 2016-07-27 中兴通讯股份有限公司 Information protection method and device, information display method and device, and terminal
CN106155493A (en) * 2015-04-16 2016-11-23 阿里巴巴集团控股有限公司 A kind of method carrying out input prompt in display interface and device thereof
CN106445189A (en) * 2016-12-16 2017-02-22 北京小米移动软件有限公司 Candidate word display method and device
WO2017080356A1 (en) * 2015-11-09 2017-05-18 国民技术股份有限公司 Secure input method, device and system
CN106815534A (en) * 2017-01-17 2017-06-09 广东欧珀移动通信有限公司 A kind of method for protecting privacy of user, device and mobile terminal
WO2018014400A1 (en) * 2016-07-18 2018-01-25 中兴通讯股份有限公司 User input managing method, device and terminal
US20180032753A1 (en) * 2016-07-26 2018-02-01 International Business Machines Corporation Privacy protection in network input methods
CN107688399A (en) * 2016-08-05 2018-02-13 北京搜狗科技发展有限公司 A kind of input method and device, a kind of device for being used to input
CN108073291A (en) * 2016-11-09 2018-05-25 北京搜狗科技发展有限公司 A kind of input method and device, a kind of device for input

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1702998A (en) * 2005-06-09 2005-11-30 石国伟 A method for inputting private data in network application
CN103853992A (en) * 2012-11-30 2014-06-11 国际商业机器公司 Method and device for receiving privacy-sensitive information input
CN104239824A (en) * 2014-08-27 2014-12-24 百度在线网络技术(北京)有限公司 Method and device used for displaying input information
CN105809042A (en) * 2014-12-31 2016-07-27 中兴通讯股份有限公司 Information protection method and device, information display method and device, and terminal
CN106155493A (en) * 2015-04-16 2016-11-23 阿里巴巴集团控股有限公司 A kind of method carrying out input prompt in display interface and device thereof
CN105099878A (en) * 2015-06-29 2015-11-25 小米科技有限责任公司 Information display method, device and terminal
WO2017080356A1 (en) * 2015-11-09 2017-05-18 国民技术股份有限公司 Secure input method, device and system
CN105511638A (en) * 2015-12-03 2016-04-20 魅族科技(中国)有限公司 Application method and device for input method
CN105786207A (en) * 2016-02-25 2016-07-20 百度在线网络技术(北京)有限公司 Information input method and device
CN107633174A (en) * 2016-07-18 2018-01-26 中兴通讯股份有限公司 A kind of user inputs management method and device, terminal
WO2018014400A1 (en) * 2016-07-18 2018-01-25 中兴通讯股份有限公司 User input managing method, device and terminal
US20180032753A1 (en) * 2016-07-26 2018-02-01 International Business Machines Corporation Privacy protection in network input methods
CN107688399A (en) * 2016-08-05 2018-02-13 北京搜狗科技发展有限公司 A kind of input method and device, a kind of device for being used to input
CN108073291A (en) * 2016-11-09 2018-05-25 北京搜狗科技发展有限公司 A kind of input method and device, a kind of device for input
CN106445189A (en) * 2016-12-16 2017-02-22 北京小米移动软件有限公司 Candidate word display method and device
CN106815534A (en) * 2017-01-17 2017-06-09 广东欧珀移动通信有限公司 A kind of method for protecting privacy of user, device and mobile terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
TY;: "搜狗拼音输入法4.0抢先体验", 网络与信息, no. 02 *
傅建明;李鹏伟;李晶雯;: "敏感信息输入安全技术探究", 信息网络安全, no. 03 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111669443A (en) * 2020-06-04 2020-09-15 华北电力科学研究院有限责任公司 Information processing method and device for electric power Internet of vehicles
CN111669443B (en) * 2020-06-04 2023-02-07 华北电力科学研究院有限责任公司 Information processing method and device for electric power Internet of vehicles

Also Published As

Publication number Publication date
CN110598489B (en) 2024-05-28

Similar Documents

Publication Publication Date Title
US20180046336A1 (en) Instant Message Processing Method and Apparatus, and Storage Medium
CN107948708B (en) Bullet screen display method and device
EP3337146B1 (en) Method and apparatus for displaying notification message
US20170293403A1 (en) Method and device for displaying pages in application program and computer-readable medium
US10078422B2 (en) Method and device for updating a list
EP3239836A1 (en) Information displaying method and apparatus, computer program and recording medium
CN110781813B (en) Image recognition method and device, electronic equipment and storage medium
US20170155604A1 (en) Method and device for processing information
CN105786944B (en) Method and device for processing automatic page turning of browser
CN107239351B (en) Pasting method and device
CN112035031B (en) Note generation method and device, electronic equipment and storage medium
CN110413169B (en) Information display method, device and medium
CN106331328B (en) Information prompting method and device
US20160349947A1 (en) Method and device for sending message
CN107360322B (en) Information prompting method and device
EP3416070A1 (en) Page display method and device and storage medium
CN111368329B (en) Message display method and device, electronic equipment and storage medium
CN106447747B (en) Image processing method and device
CN105955637B (en) Method and device for processing text input box
CN107885571B (en) Display page control method and device
CN110598489B (en) Privacy protection method and related device for input prompt information
CN111092971A (en) Display method and device for displaying
CN106371714B (en) Information display method and device
CN111131000B (en) Information transmission method, device, server and terminal
CN110929484B (en) Text processing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant