CN113687925B - Equipment operation processing method and device, storage medium and computer equipment - Google Patents

Equipment operation processing method and device, storage medium and computer equipment Download PDF

Info

Publication number
CN113687925B
CN113687925B CN202110832827.9A CN202110832827A CN113687925B CN 113687925 B CN113687925 B CN 113687925B CN 202110832827 A CN202110832827 A CN 202110832827A CN 113687925 B CN113687925 B CN 113687925B
Authority
CN
China
Prior art keywords
data
processed
program
input
shielding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110832827.9A
Other languages
Chinese (zh)
Other versions
CN113687925A (en
Inventor
易钟鸣
潘明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Luyi Technology Co ltd
Original Assignee
Chengdu Luyi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Luyi Technology Co ltd filed Critical Chengdu Luyi Technology Co ltd
Priority to CN202110832827.9A priority Critical patent/CN113687925B/en
Publication of CN113687925A publication Critical patent/CN113687925A/en
Application granted granted Critical
Publication of CN113687925B publication Critical patent/CN113687925B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4812Task transfer initiation or dispatching by interrupt, e.g. masked

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a device operation processing method and device, a storage medium and computer equipment, wherein the method comprises the following steps: registering a target shielding program at a bottom layer of the system; receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed; the target shielding program identifies whether the data to be processed belongs to a preset shielding data type or not, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type. According to the application, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, so that the shielding of the user operation is realized, the interference of the user operation on the client device is avoided, the running efficiency of the program in the client device is ensured, and the safety of the client device is protected.

Description

Equipment operation processing method and device, storage medium and computer equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a device operation processing method and apparatus, a storage medium, and a computer device.
Background
With the widespread popularity of electronic information technology, more and more households purchase computers, and many users use computers to download files, compile files, write documents, and the like. In some application environments, when the computer needs to keep a starting running state, for example, downloading resources and transmitting resources, after many users start downloading tasks and transmitting tasks in these use scenarios, the computer will often not wait in front of the computer all the time, at this time, the computer may be used by other people, for example, children in the home may play the computer while parents are not at the time, which not only may slow the task execution speed of the computer, for example, slow the speed of downloading data and transmitting data, but also may lead to children being indulged in the computer.
Disclosure of Invention
In view of the above, the present application provides a device operation processing method and apparatus, a storage medium, and a computer device, which are helpful for realizing shielding of user operations in a specific scenario.
According to one aspect of the present application, there is provided a device operation processing method, applied to a client, including:
registering a target shielding program at a bottom layer of the system;
receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed;
the target shielding program identifies whether the data to be processed belongs to a preset shielding data type or not, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
Optionally, the preset mask data type includes a device type of a preset input device;
the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type, and specifically comprises the following steps:
the target shielding program identifies whether the data to be processed is data input through an input device, and acquires the type of the input device corresponding to the data to be processed when the data to be processed is the data input by the input device;
and discarding the data to be processed if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment.
Optionally, after the obtaining the input device type corresponding to the data to be processed, the method further includes:
and if the input equipment type corresponding to the data to be processed does not belong to the equipment type of the preset input equipment, transmitting the data to be processed to a corresponding application program so as to process the data to be processed through the application program.
Optionally, the registering the target shielding program in the bottom layer of the system specifically includes:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program in the system bottom layer through the equipment protection tool.
Optionally, the device protection tool includes preset protection tool closing input information, where the preset protection tool closing input information is used to instruct device input data of the target shielding program to be logged out; before the input device type corresponding to the data to be processed is obtained, the method further includes:
judging whether the data to be processed is matched with the closing input information of the preset protection tool or not;
if the input device types are not matched, acquiring the input device types corresponding to the data to be processed;
and if so, canceling the target shielding program.
Optionally, the device lock instruction includes a program logout time and/or a program logout signal; after the registering, by the device protection tool, the target shielding program at the system bottom layer, the method further includes:
when the program logout time is reached, logging out the target shielding program; and/or the number of the groups of groups,
and when the program logout signal is monitored, logging out the target shielding program.
Optionally, after the target mask program is registered at the bottom layer of the system, the method further includes:
controlling the client to enter a screen locking state;
correspondingly, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, the method further comprises:
and outputting prompt information to prompt a user that the client is currently in a device locking state.
According to another aspect of the present application, there is provided an apparatus for processing an operation of a device, applied to a client, including:
the registration module is used for registering the target shielding program in the bottom layer of the system;
the data receiving module is used for receiving data to be processed and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, and the system bottom layer informs the target shielding program to process the data to be processed;
and the operation shielding module is used for identifying whether the data to be processed belongs to a preset shielding data type or not by the target shielding program, and discarding the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
Optionally, the preset mask data type includes a device type of a preset input device;
the operation shielding module is specifically configured to:
the target shielding program identifies whether the data to be processed is data input through an input device, and acquires the type of the input device corresponding to the data to be processed when the data to be processed is the data input by the input device;
and discarding the data to be processed if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment.
Optionally, the apparatus further comprises:
and the data processing module is used for transmitting the data to be processed to a corresponding application program after the input equipment type corresponding to the data to be processed is acquired, and processing the data to be processed through the application program if the input equipment type corresponding to the data to be processed does not belong to the equipment type of the preset input equipment.
Optionally, the registration module is specifically configured to:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program in the system bottom layer through the equipment protection tool.
Optionally, the device protection tool includes preset protection tool closing input information, where the preset protection tool closing input information is used to instruct device input data of the target shielding program to be logged out; the apparatus further comprises:
the data identification module is used for judging whether the data to be processed is matched with the closing input information of the preset protection tool before the input equipment type corresponding to the data to be processed is acquired; if the input device types are not matched, acquiring the input device types corresponding to the data to be processed; and if so, canceling the target shielding program.
Optionally, the device lock instruction includes a program logout time and/or a program logout signal; the apparatus further comprises:
a cancellation module, configured to cancel, by using the device protection tool, the target shielding program when the program cancellation time is reached after the target shielding program is registered by the system bottom layer; and/or when the program logout signal is monitored, logging out the target shielding program.
Optionally, the apparatus further comprises:
the screen locking module is used for controlling the client to enter a screen locking state after the target shielding program is registered at the bottom layer of the system;
correspondingly, the operation shielding module is further configured to output a prompt message to prompt a user that the client is currently in a device locking state if the input device type corresponding to the data to be processed belongs to the device type of the preset input device.
According to still another aspect of the present application, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described apparatus operation processing method.
According to still another aspect of the present application, there is provided a computer device including a storage medium, a processor, and a computer program stored on the storage medium and executable on the processor, the processor implementing the above device operation processing method when executing the program.
By means of the technical scheme, the device operation processing method, the device operation processing device, the storage medium and the computer device register the target shielding program in the system bottom layer, so that when data to be processed is transferred to the system bottom layer, the system bottom layer informs the target shielding program to process the data, the target shielding program can specifically identify the data type of the data to be processed, and when the data to be processed is identified to belong to the preset shielding data type, the data to be processed is discarded, and shielding of the data to be processed is achieved. According to the application, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, so that the shielding of the user operation is realized, the interference of the user operation on the client device is avoided, the running efficiency of the program in the client device is ensured, and the safety of the client device is protected.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
fig. 1 shows a schematic flow chart of a device operation processing method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of another method for processing operation of a device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an apparatus operation processing device according to an embodiment of the present application.
Detailed Description
The application will be described in detail hereinafter with reference to the drawings in conjunction with embodiments. It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other.
In this embodiment, there is provided a device operation processing method, as shown in fig. 1, including:
step 101, registering a target shielding program in a system bottom layer;
102, receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed;
step 103, the target mask program identifies whether the data to be processed belongs to a preset mask data type, and discards the data to be processed when the data to be processed is identified to belong to the preset mask data type.
The embodiment of the application can be applied to the client, and particularly can comprise computer equipment. In this embodiment, the target shielding program may be integrated in the device protection tool, for example, the device protection tool may be a device lock tool, and after the device protection tool is installed and started in the computer device, the registration of the target shielding program is performed by the device protection tool.
In practical application scenarios, the operation of the computer device by the user is almost completed through an external hardware device, for example, the operation of the computer device is realized through a bluetooth or USB input device such as a mouse, a keyboard, etc., so that in some application scenarios that do not want other users to use the computer device, the protection of the computer device can be realized through shielding the operation data of the hardware device. In an operating system of a computer device, after a user operates the device, operation data of the user is input into a hardware abstraction layer, namely a HAL layer, and then is transmitted into a system bottom layer through the HAL layer, and the system bottom layer transmits the operation data to a corresponding application program so as to process the operation data through the application program and realize response to the user operation. Therefore, the embodiment of the application realizes the shielding of the user operation by shielding the user operation data at the bottom layer of the system.
Firstly, registering a target shielding program at a system bottom layer of an operating system, after registering the program to the system bottom layer, informing the target shielding program of processing after data input behavior exists in the system, and then transmitting the processed data to other programs at an application layer. Then, after registering the target shielding program, when the operating system receives the data to be processed, the data to be processed is firstly transferred to the HAL layer and then transferred to the system bottom layer, and after the system bottom layer receives the data to be processed, the system bottom layer informs the target shielding program of the data to be processed received by the target shielding program due to the fact that the target shielding program is registered in advance. Finally, after receiving the notification, the target shielding program can identify the data type of the data to be processed to identify whether the data to be processed belongs to the data type to be shielded, namely, identify whether the data to be processed belongs to the preset shielding data type, wherein the preset shielding data type can be specifically hardware equipment input data, and discard the data to be processed when the data to be processed is identified to belong to the hardware equipment input data, so as to realize shielding of user operation.
By applying the technical scheme of the embodiment, the target shielding program is registered in the bottom layer of the system, so that when the data to be processed is transferred to the bottom layer of the system, the bottom layer of the system informs the target shielding program to process the data, the target shielding program can specifically identify the data type of the data to be processed, and when the data to be processed is identified to belong to the preset shielding data type, the data to be processed is discarded, so that the shielding of the data to be processed is realized. According to the embodiment of the application, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, so that the shielding of the user operation is realized, the disturbance of the client device by the user operation is avoided, the running efficiency of the program in the client device is ensured, and the safety of the client device is protected.
In the embodiment of the application, in order to realize shielding of user operation in the computer equipment, optionally, the preset shielding data type comprises an equipment type of preset input equipment; the step 103 may specifically include:
step 103-1, the target shielding program identifies whether the data to be processed is data input through an input device, and obtains the type of the input device corresponding to the data to be processed when the data to be processed is the data input by the input device;
step 103-2, discarding the data to be processed if the input device type corresponding to the data to be processed belongs to the device type of the preset input device;
step 103-3, if the input device type corresponding to the data to be processed does not belong to the device type of the preset input device, transmitting the data to be processed to a corresponding application program, so as to process the data to be processed through the application program.
In the above embodiment, since the operation of the computer device by the user is almost all completed by the hardware device that is externally accessed, it is specifically possible to identify whether the data to be processed is data input by the specific type of external access device, where the preset mask data type may specifically include a device type of the preset input device. When the target shielding program receives the notification of the bottom layer of the system, the target shielding program can specifically identify whether the data to be processed is equipment input data, if the data to be processed is equipment input data, whether the type of the input equipment corresponding to the data to be processed belongs to the equipment type of the preset input equipment or not can be further judged, for example, the preset input equipment can comprise a USB mouse, a USB keyboard, a Bluetooth mouse, a Bluetooth keyboard and the like, when the type of the input equipment corresponding to the data to be processed is identified to belong to the equipment type of the preset input equipment, the data to be processed is discarded, the operation of a user is shielded, otherwise, the data to be processed can be processed according to the original rule, and the equipment to be processed can be specifically transferred to the corresponding application program, so that the data to be processed is processed through the corresponding application program, and the response of the data to be processed is realized.
In an actual application scene, a user can freely set the type of input equipment needing shielding, for example, the user sets to shield external input equipment such as a USB mouse and the like, the user can realize the control of the computer equipment through a mobile phone which is connected with the computer equipment in a Bluetooth pairing mode, the Bluetooth mobile phone is not set to be preset input equipment, and thus the user can respond to the operation of the computer equipment through the Bluetooth mobile phone, so that the shielding of the computer equipment is more flexible and meets the user requirements.
In the embodiment of the present application, the target shielding program may be registered through the device protection tool, and optionally, step 101 may specifically include:
step 101-1, receiving a device locking instruction input by a user, and starting a device protection tool;
step 101-2, registering, by the device protection tool, the target shielding program at the system floor.
In the above embodiment, the device protection tool may be pre-installed in the computer device, and when some operations in the device need to be masked, the device protection tool installed in the computer device may be started, where after the device protection tool registers the target masking program in the system bottom layer. In a specific application scenario, the device protection tool is started in response to a device lock instruction. Wherein the device lock instruction may be generated based on an active operation of the user, such as a double-click of the device protection tool by the user to trigger the tool to start. The device locking instruction can be automatically generated when the computer device detects that the computer device reaches a certain condition, for example, the computer device detects that the downloading task of the downloading tool runs for more than a preset time period, and the computer device does not receive any operation data of the hardware input device within the preset time period, so that the device protection tool is started. Of course, other automatic starting conditions may be set, and embodiments of the present application are not limited herein.
In this embodiment of the present application, optionally, the device protection tool includes preset protection tool closing input information, where the preset protection tool closing input information is used to indicate device input data for logging out the target shielding program; in step 103-1, before the input device type corresponding to the data to be processed is obtained, the method further includes: judging whether the data to be processed is matched with the closing input information of the preset protection tool or not; if the input device types are not matched, acquiring the input device types corresponding to the data to be processed; and if so, canceling the target shielding program.
In the above embodiment, a command for logging out the target shielding program and closing the device protection tool may be set, that is, the preset protection tool closing input information may be set, and the user may log out the target shielding program and closing the device protection tool by inputting data matched with the preset protection tool closing input information, so that the computer device is restored to a normal use state. In a specific application scenario, when it is identified that the data to be processed is data input by the input device, whether the data to be processed is matched with closing input information of a preset protection tool can be judged first, for example, the closing input information of the preset protection tool is a plurality of key identifiers on a keyboard device, when a user wants to restore normal use of the computer device, closing of the device protection tool can be triggered by pressing a preset key, when it is judged that the data to be processed is that a plurality of preset keys are pressed simultaneously, that is, when the data to be processed is matched with the closing input information of the preset protection attack, a target shielding program is logged out, and the device protection tool is closed, otherwise, the input operation of the external device is not the operation that the user wants to restore normal use of the computer device, but is possibly the false touch or unauthorized use of other personnel, a process of the type of the input device corresponding to the data to be processed can be further obtained in step 103-1, and whether the type of the input device of the data to be processed is the type of the device to be judged to be the preset input device is the device, so that whether the data to be discarded should be identified.
In the embodiment of the present application, optionally, the device locking instruction includes a program logout time and/or a program logout signal; after step 101, the method further comprises:
104, when the program logout time is reached, logging out the target shielding program; and/or when the program logout signal is monitored, logging out the target shielding program.
In the above embodiment, the device lock instruction may include a program logout time and/or a program logout signal, for example, when the user issues a device lock instruction for opening the device protection tool, the user may specify a closing time and/or a closing signal of the device protection tool, that is, the program logout time and/or the program logout signal, and when the closing time is reached and/or the closing signal is detected, the device protection tool may logout the target shielding program at the bottom layer of the system, so that when the specific time is reached and the specific signal is sensed, the computer device may resume normal use, for example, after the program logout time is 2 hours, then the target shielding program is automatically logged off from registration, for example, after 2 hours, the program logout signal is a signal for ending downloading a specific file, then when the downloading of the specific file is ended, the target shielding program is automatically logged off, so that when the downloading task is performed, the computer device is not used by other people, and the downloading speed is ensured.
In an embodiment of the present application, optionally, step 101 may further include: controlling the client to enter a screen locking state; correspondingly, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, the method may further include: and outputting prompt information to prompt a user that the client is currently in a device locking state.
In the above embodiment, after the device protection tool is opened and the target shielding program is registered, the computer device may be locked, specifically, the locked screen saver may be displayed, so that other users are prevented from seeing the operation condition on the computer device. The unlocking time of the device, i.e. the program logout time, may also be prompted so that the user uses the device after the device is unlocked.
In a specific application scene, optionally, the starting time and the closing time of the equipment protection tool can be set, so that the equipment can be automatically started and closed at corresponding time, and can be used by children in a specific period, and the children are prevented from using computers for a long time, so that eyesight is prevented from being influenced, and network is prevented from being indulged.
Further, as a refinement and extension of the foregoing embodiment, in order to fully describe the implementation procedure of this embodiment, another apparatus operation processing method is provided, as shown in fig. 2, and the method includes:
step 201, receiving a device locking instruction input by a user, and starting a device protection tool; registering the target shielding program in the system bottom layer through the equipment protection tool.
Step 202, receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed;
step 203, the target masking program identifies whether the data to be processed is data input through an input device, and judges whether the data to be processed is matched with the preset protection tool closing input information when the data to be processed is the data input through the input device;
step 204, if not, acquiring the input device type corresponding to the data to be processed;
step 205, if the result is matched, the target shielding program is logged off;
step 206, discarding the data to be processed if the input device type corresponding to the data to be processed belongs to the device type of the preset input device;
step 207, if the input device type corresponding to the data to be processed does not belong to the device type of the preset input device, transmitting the data to be processed to a corresponding application program, so as to process the data to be processed through the application program.
Step 208, when the program logout time is reached, logging out the target shielding program; and/or when the program logout signal is monitored, logging out the target shielding program.
Further, as a specific implementation of the method of fig. 1, an embodiment of the present application provides an apparatus operation processing device, which is applied to a client, as shown in fig. 3, and the apparatus includes:
the registration module is used for registering the target shielding program in the bottom layer of the system;
the data receiving module is used for receiving data to be processed and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, and the system bottom layer informs the target shielding program to process the data to be processed;
and the operation shielding module is used for identifying whether the data to be processed belongs to a preset shielding data type or not by the target shielding program, and discarding the data to be processed when the data to be processed is identified to belong to the preset shielding data type.
Optionally, the preset mask data type includes a device type of a preset input device;
the operation shielding module is specifically configured to:
the target shielding program identifies whether the data to be processed is data input through an input device, and acquires the type of the input device corresponding to the data to be processed when the data to be processed is the data input by the input device;
and discarding the data to be processed if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment.
Optionally, the apparatus further comprises:
and the data processing module is used for transmitting the data to be processed to a corresponding application program after the input equipment type corresponding to the data to be processed is acquired, and processing the data to be processed through the application program if the input equipment type corresponding to the data to be processed does not belong to the equipment type of the preset input equipment.
Optionally, the registration module is specifically configured to:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program in the system bottom layer through the equipment protection tool.
Optionally, the device protection tool includes preset protection tool closing input information, where the preset protection tool closing input information is used to instruct device input data of the target shielding program to be logged out; the apparatus further comprises:
the data identification module is used for judging whether the data to be processed is matched with the closing input information of the preset protection tool before the input equipment type corresponding to the data to be processed is acquired; if the input device types are not matched, acquiring the input device types corresponding to the data to be processed; and if so, canceling the target shielding program.
Optionally, the device lock instruction includes a program logout time and/or a program logout signal; the apparatus further comprises:
a cancellation module, configured to cancel, by using the device protection tool, the target shielding program when the program cancellation time is reached after the target shielding program is registered by the system bottom layer; and/or when the program logout signal is monitored, logging out the target shielding program.
Optionally, the apparatus further comprises:
the screen locking module is used for controlling the client to enter a screen locking state after the target shielding program is registered at the bottom layer of the system;
correspondingly, the operation shielding module is further configured to output a prompt message to prompt a user that the client is currently in a device locking state if the input device type corresponding to the data to be processed belongs to the device type of the preset input device.
It should be noted that, for other corresponding descriptions of each functional unit related to the device operation processing apparatus provided by the embodiment of the present application, reference may be made to corresponding descriptions in the methods of fig. 1 to fig. 2, and no further description is given here.
Based on the above-mentioned method shown in fig. 1 to 2, correspondingly, the embodiment of the present application further provides a storage medium, on which a computer program is stored, which when executed by a processor, implements the above-mentioned device operation processing method shown in fig. 1 to 2.
Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.), and includes several instructions for causing a computer device (may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective implementation scenario of the present application.
Based on the method shown in fig. 1 to fig. 2 and the virtual device embodiment shown in fig. 3, in order to achieve the above object, the embodiment of the present application further provides a computer device, which may specifically be a personal computer, a server, a network device, etc., where the computer device includes a storage medium and a processor; a storage medium storing a computer program; a processor for executing a computer program to implement the above-described device operation processing method as shown in fig. 1 to 2.
Optionally, the computer device may also include a user interface, a network interface, a camera, radio Frequency (RF) circuitry, sensors, audio circuitry, WI-FI modules, and the like. The user interface may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), etc., and the optional user interface may also include a USB interface, a card reader interface, etc. The network interface may optionally include a standard wired interface, a wireless interface (e.g., bluetooth interface, WI-FI interface), etc.
It will be appreciated by those skilled in the art that the architecture of a computer device provided in the present embodiment is not limited to the computer device, and may include more or fewer components, or may combine certain components, or may be arranged in different components.
The storage medium may also include an operating system, a network communication module. An operating system is a program that manages and saves computer device hardware and software resources, supporting the execution of information handling programs and other software and/or programs. The network communication module is used for realizing communication among all components in the storage medium and communication with other hardware and software in the entity equipment.
Through the description of the above embodiments, it is clear for those skilled in the art that the present application may be implemented by adding a necessary general hardware platform to software, or may register a target mask program on a system bottom layer through hardware implementation, so that when data to be processed is transferred to the system bottom layer, the system bottom layer notifies the target mask program to process the data, and the target mask program may specifically identify a data type of the data to be processed, and discard the data to be processed when it is identified that the data to be processed belongs to a preset mask data type, so as to implement masking of the data to be processed. According to the embodiment of the application, the target shielding program is registered at the bottom layer of the system, the type of the data to be processed can be identified through the target shielding program, so that the shielding of the user operation is realized, the disturbance of the client device by the user operation is avoided, the running efficiency of the program in the client device is ensured, and the safety of the client device is protected.
Those skilled in the art will appreciate that the drawing is merely a schematic illustration of a preferred implementation scenario and that the modules or flows in the drawing are not necessarily required to practice the application. Those skilled in the art will appreciate that modules in an apparatus in an implementation scenario may be distributed in an apparatus in an implementation scenario according to an implementation scenario description, or that corresponding changes may be located in one or more apparatuses different from the implementation scenario. The modules of the implementation scenario may be combined into one module, or may be further split into a plurality of sub-modules.
The above-mentioned inventive sequence numbers are merely for description and do not represent advantages or disadvantages of the implementation scenario. The foregoing disclosure is merely illustrative of some embodiments of the application, and the application is not limited thereto, as modifications may be made by those skilled in the art without departing from the scope of the application.

Claims (9)

1. A device operation processing method, applied to a client, comprising:
registering a target shielding program at a bottom layer of the system; the target shielding program is integrated in the equipment protection tool so as to register the target shielding program through the equipment protection tool;
receiving data to be processed, and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, wherein the system bottom layer informs the target shielding program to process the data to be processed;
the target shielding program identifies whether the data to be processed belongs to a preset shielding data type or not, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type; the preset shielding data type comprises a device type of preset input devices; the target shielding program identifies whether the data to be processed belongs to a preset shielding data type, and discards the data to be processed when the data to be processed is identified to belong to the preset shielding data type, and specifically comprises the following steps:
the target shielding program identifies whether the data to be processed is data input through an input device, and acquires the type of the input device corresponding to the data to be processed when the data to be processed is the data input by the input device;
and discarding the data to be processed if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment.
2. The method according to claim 1, wherein after the obtaining the input device type corresponding to the data to be processed, the method further comprises:
and if the input equipment type corresponding to the data to be processed does not belong to the equipment type of the preset input equipment, transmitting the data to be processed to a corresponding application program so as to process the data to be processed through the application program.
3. The method of claim 1, wherein registering the target mask program at the system bottom layer specifically comprises:
receiving an equipment locking instruction input by a user, and starting an equipment protection tool;
registering the target shielding program in the system bottom layer through the equipment protection tool.
4. A method according to claim 3, wherein the device protection tool includes preset protection tool closing input information, the preset protection tool closing input information being used for indicating device input data for logging out the target shielding program; before the input device type corresponding to the data to be processed is obtained, the method further includes:
judging whether the data to be processed is matched with the closing input information of the preset protection tool or not;
if the input device types are not matched, acquiring the input device types corresponding to the data to be processed;
and if so, canceling the target shielding program.
5. The method according to claim 3 or 4, wherein the device lock instruction comprises a program logout time and/or a program logout signal; after the registering, by the device protection tool, the target shielding program at the system bottom layer, the method further includes:
when the program logout time is reached, logging out the target shielding program; and/or the number of the groups of groups,
and when the program logout signal is monitored, logging out the target shielding program.
6. The method of any of claims 1 to 4, wherein after the registering the target mask program at the system bottom layer, the method further comprises:
controlling the client to enter a screen locking state;
correspondingly, if the input device type corresponding to the data to be processed belongs to the device type of the preset input device, the method further comprises:
and outputting prompt information to prompt a user that the client is currently in a device locking state.
7. A device operation processing apparatus, characterized by being applied to a client, comprising:
the registration module is used for registering the target shielding program in the bottom layer of the system; the target shielding program is integrated in the equipment protection tool so as to register the target shielding program through the equipment protection tool;
the data receiving module is used for receiving data to be processed and sequentially transmitting the data to be processed to a hardware abstraction layer and the system bottom layer, and the system bottom layer informs the target shielding program to process the data to be processed;
the operation shielding module is used for identifying whether the data to be processed belongs to a preset shielding data type or not by the target shielding program, and discarding the data to be processed when the data to be processed is identified to belong to the preset shielding data type;
the preset shielding data type comprises a device type of preset input devices;
the operation shielding module is specifically configured to:
the target shielding program identifies whether the data to be processed is data input through an input device, and acquires the type of the input device corresponding to the data to be processed when the data to be processed is the data input by the input device;
and discarding the data to be processed if the input equipment type corresponding to the data to be processed belongs to the equipment type of the preset input equipment.
8. A storage medium having stored thereon a computer program, which when executed by a processor, implements the method of any of claims 1 to 6.
9. A computer device comprising a storage medium, a processor and a computer program stored on the storage medium and executable on the processor, characterized in that the processor implements the method of any one of claims 1 to 6 when executing the computer program.
CN202110832827.9A 2021-07-22 2021-07-22 Equipment operation processing method and device, storage medium and computer equipment Active CN113687925B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110832827.9A CN113687925B (en) 2021-07-22 2021-07-22 Equipment operation processing method and device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110832827.9A CN113687925B (en) 2021-07-22 2021-07-22 Equipment operation processing method and device, storage medium and computer equipment

Publications (2)

Publication Number Publication Date
CN113687925A CN113687925A (en) 2021-11-23
CN113687925B true CN113687925B (en) 2023-09-29

Family

ID=78577751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110832827.9A Active CN113687925B (en) 2021-07-22 2021-07-22 Equipment operation processing method and device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN113687925B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114265660B (en) * 2022-03-01 2022-05-03 成都鲁易科技有限公司 Desktop screen locking method and device, storage medium and computer equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1553316A (en) * 2003-03-12 2004-12-08 中兴通讯股份有限公司 Universal locking system of windows applied programm interface and method thereof
CN102681845A (en) * 2012-04-24 2012-09-19 深圳创维数字技术股份有限公司 Method and device for managing input events
WO2014032413A1 (en) * 2012-08-31 2014-03-06 华为技术有限公司 Method, controller and system for processing data packet
CN105893886A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 System locking method and device
CN106909295A (en) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 The processing method and terminal of application program
CN109165059A (en) * 2018-07-11 2019-01-08 小草数语(北京)科技有限公司 page locking method and device thereof
CN109977703A (en) * 2019-03-26 2019-07-05 北京智游网安科技有限公司 A kind of encryption method of safety keyboard, storage medium and terminal device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1553316A (en) * 2003-03-12 2004-12-08 中兴通讯股份有限公司 Universal locking system of windows applied programm interface and method thereof
CN102681845A (en) * 2012-04-24 2012-09-19 深圳创维数字技术股份有限公司 Method and device for managing input events
WO2014032413A1 (en) * 2012-08-31 2014-03-06 华为技术有限公司 Method, controller and system for processing data packet
CN106909295A (en) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 The processing method and terminal of application program
CN105893886A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 System locking method and device
CN109165059A (en) * 2018-07-11 2019-01-08 小草数语(北京)科技有限公司 page locking method and device thereof
CN109977703A (en) * 2019-03-26 2019-07-05 北京智游网安科技有限公司 A kind of encryption method of safety keyboard, storage medium and terminal device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于Linux的轻量级嵌入式GUI系统及实现;赵英涛等;《微计算机信息》;77-78 *

Also Published As

Publication number Publication date
CN113687925A (en) 2021-11-23

Similar Documents

Publication Publication Date Title
US10148693B2 (en) Exploit detection system
US10715542B1 (en) Mobile application risk analysis
US9438613B1 (en) Dynamic content activation for automated analysis of embedded objects
EP2766846B1 (en) System and method for profile based filtering of outgoing information in a mobile environment
AU2018229557A1 (en) Methods and apparatus for identifying and removing malicious applications
JP6038924B2 (en) Networking function per process
US11328056B2 (en) Suspicious event analysis device and related computer program product for generating suspicious event sequence diagram
US10586045B2 (en) System and method for detecting malware in mobile device software applications
CN101483658B (en) System and method for input content protection of browser
JP7020630B2 (en) Methods and equipment for managing hardware resource access in electronic devices
WO2019022573A1 (en) Methods and apparatus to monitor permission-controlled hidden sensitive application behavior at run-time
Schmidt et al. Malicious software for smartphones
CN103036852B (en) A kind of method and device realizing network entry
CN113687925B (en) Equipment operation processing method and device, storage medium and computer equipment
Kandukuru et al. Android malicious application detection using permission vector and network traffic analysis
Muzammal et al. ScreenStealer: Addressing screenshot attacks on android devices
Zaitsev Skeleton keys: the purpose and applications of keyloggers
Gupta et al. A risk-driven model to minimize the effects of human factors on smart devices
US8479293B2 (en) Security technique for an open computing platform system
US10552626B2 (en) System and method for selecting a data entry mechanism for an application based on security requirements
CN111444539A (en) Authority processing method and device, storage medium and terminal
Aldoseri et al. A Tale of Four Gates: Privilege Escalation and Permission Bypasses on Android Through App Components
Anwar et al. Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs
CN113688419B (en) Data protection method and device, storage medium and computer equipment
Khan et al. Differences in Inter-App Communication Between Android and iOS Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant