CN115967723A - Safe keyboard input method, device, equipment and storage medium - Google Patents

Safe keyboard input method, device, equipment and storage medium Download PDF

Info

Publication number
CN115967723A
CN115967723A CN202211312820.5A CN202211312820A CN115967723A CN 115967723 A CN115967723 A CN 115967723A CN 202211312820 A CN202211312820 A CN 202211312820A CN 115967723 A CN115967723 A CN 115967723A
Authority
CN
China
Prior art keywords
input
keyboard
user
mobile phone
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211312820.5A
Other languages
Chinese (zh)
Inventor
王传金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202211312820.5A priority Critical patent/CN115967723A/en
Publication of CN115967723A publication Critical patent/CN115967723A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses a security keyboard input method, a security keyboard input device, security keyboard input equipment and a storage medium, which are applied to a cloud mobile phone terminal, wherein the method comprises the following steps: acquiring an initial keyboard, wherein the initial keyboard is generated on a first interface of the cloud mobile phone end; responding to a first operation of a user on the initial keyboard, and sending a first input instruction to the client; according to the first input instruction, the client generates a safety keyboard on a second interface; in response to a second operation of the user on the secure keyboard, the client generates input information; and receiving the input information to complete the input operation at the cloud mobile phone end. According to the embodiment of the application, privacy and safety of the information input by the user can be effectively guaranteed at the cloud mobile phone end.

Description

Safe keyboard input method, device, equipment and storage medium
Technical Field
The invention relates to the field of computers, in particular to a safe keyboard input method, device equipment and a storage medium.
Background
A cloud mobile phone (Cloudphone) is a mobile phone which applies a cloud computing technology to a network terminal service and realizes a cloud service through a cloud server. Various mobile applications can be installed in the cloud mobile phone, and increasingly, the mobile applications need to enter user private information, such as payment passwords and identity card numbers, and how to ensure the user information security becomes more and more important in the entering process.
However, the cloud mobile phone allows a plurality of users to log in for use, and due to different operating environments of different users, input information may be leaked and stolen, so that privacy and security of user information are difficult to guarantee.
Disclosure of Invention
The embodiment of the invention provides a safe keyboard input method, device and storage medium, and the method can effectively guarantee privacy and safety of information input by a user at a cloud mobile phone end.
On one hand, the embodiment of the invention provides a safe keyboard input method which is applied to a cloud mobile phone end and comprises the following steps:
acquiring an initial keyboard, wherein the initial keyboard is generated on a first interface of the cloud mobile phone end;
responding to a first operation of a user on the initial keyboard, and sending a first input instruction to the client;
according to the first input instruction, the client generates a safety keyboard on a second interface;
in response to a second operation of the user on the secure keyboard, the client generates input information;
and receiving the input information to complete the input operation at the cloud mobile phone end.
Optionally, the sending, to the client, a first input instruction in response to a first operation of the user on the initial keyboard includes:
detecting whether the first operation meets a preset condition;
if yes, sending the first input instruction to the client in a first mode;
and if not, not generating the first input instruction.
Optionally, the preset condition includes that the first operation satisfies a password input behavior, and the password input behavior includes a first behavior for characterizing a suspected password input behavior and a second behavior for characterizing a correct password input behavior.
Optionally, the first mode is transmission through a websocket protocol.
Optionally, the client generates input information in response to a second operation of the user on the secure keyboard, including:
detecting whether the second operation comprises a password input completion operation or a password input confirmation operation;
if yes, continuing to generate the input information;
if not, the input information is not generated.
Optionally, the method further comprises:
generating a first hash value and a first code according to the input information;
generating an encryption code and a corresponding decryption code according to the correct password corresponding to the input information;
if the second code is matched with the decryption code, generating a second hash value, and judging whether the second hash value is consistent with the first hash value;
and if the second hash value is consistent with the first hash value, the cloud mobile phone end decrypts the input information.
On the other hand, the embodiment of the invention provides a security keyboard input device, which is applied to a cloud mobile phone terminal, and the device comprises:
the initial keyboard acquisition module is used for acquiring an initial keyboard, and the initial keyboard is generated on a first interface of the cloud mobile phone end;
the input instruction sending module is used for responding to a first operation of a user on the initial keyboard and sending a first input instruction to the client;
the safe keyboard generation module is used for generating a safe keyboard on a second interface by the client according to the first input instruction;
the input information generating module is used for responding to a second operation of the user on the safety keyboard, and the client generates input information;
and the input information receiving module is used for receiving the input information so as to complete the input operation at the cloud mobile phone end.
Optionally, the input instruction sending module is further specifically configured to:
detecting whether the first operation meets a preset condition;
if yes, sending the first input instruction to the client in a first mode;
if not, not generating the first input instruction, and on the other hand, the embodiment of the invention provides a security keyboard input device, which comprises a memory and a processor; the memory stores an application program, and the processor is used for running the application program in the memory to execute the operation in the safe keyboard input method.
In another aspect, an embodiment of the present invention provides a storage medium, where the storage medium stores a plurality of instructions, and the instructions are suitable for being loaded by a processor to perform the steps in the security keyboard input method.
Therefore, according to the embodiment of the application, the password input behavior of the user is detected at the cloud mobile phone terminal, and the security keyboard is generated at the client of the user, so that the user can input information at the security keyboard in the client environment with higher privacy and security, and then the input information is transmitted to the cloud mobile phone terminal through the network protocol, and the privacy and security of the user for inputting and acquiring the information at the cloud mobile phone terminal can be greatly improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario of a security keyboard input method according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating an embodiment of a security keyboard input method according to an embodiment of the present invention;
FIG. 3 is a schematic overall interaction diagram of a security keyboard input method provided by an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an embodiment of a security keyboard input device provided in an embodiment of the present invention;
FIG. 5 is a schematic structural diagram of a server according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an apparatus provided in an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first", "second", and "third", etc. in the present invention are used for distinguishing different objects, and are not used for describing a specific order. Also, the terms "comprises" and "comprising," as well as any variations thereof, are intended to cover a non-exclusive inclusion.
The embodiment of the invention provides a safe keyboard input method, a safe keyboard input device, safe keyboard input equipment and a storage medium. In accordance with an embodiment of the secure keyboard input method provided by the embodiments of the present invention, it should be noted that the steps shown in the flowchart of the drawings may be executed in a computer system such as a set of computer executable instructions, and although a logical order is shown in the flowchart shown, in some cases, the steps described or shown may be executed in an order different from the execution order shown.
In some embodiments of the present invention, the security keyboard input method may be applied to at least one of a computer device and a terminal device, where the computer device may be an independent server, or may be a server network or a server cluster composed of servers, for example, a computer, a network host, a single network server, multiple network server sets, or a cloud server composed of multiple servers. Among them, the Cloud server is constituted by a large number of computers or web servers based on Cloud Computing (Cloud Computing). The terminal device includes but is not limited to a smart phone, a tablet computer and a PC terminal. In some embodiments of the present invention, when the security keyboard input method may be applied to a computer device and a terminal device, the terminal device and the computer device may implement communication through any communication method, where the communication method includes, but is not limited to, mobile communication based on third Generation Partnership project (3 gpp), long Term Evolution (LTE), worldwide Interoperability for Microwave Access (WiMAX), or computer network communication based on TCP/IP Protocol Suite (TCP/IP), user Datagram Protocol (UDP), and the like.
Referring to fig. 1, for example, the security keyboard input device is integrated in an electronic device, the electronic device may obtain an initial keyboard, where the initial keyboard is generated on a first interface of the cloud mobile phone end; responding to a first operation of a user on the initial keyboard, and sending a first input instruction to the client; according to the first input instruction, the client generates a safety keyboard on a second interface; in response to a second operation of the user on the secure keyboard, the client generates input information; and receiving the input information to complete the input operation at the cloud mobile phone end.
In some embodiments of the present invention, the secure keyboard input method may be applied to scenarios such as inputting a password to a user, using a cloud phone application, and the like. As shown in fig. 2 and fig. 3, fig. 2 is a schematic flowchart of an embodiment of a security keyboard input method according to an embodiment of the present invention, where the security keyboard input method includes steps 201 to 205:
step 201, obtaining an initial keyboard.
The initial keyboard can be generated on a first interface of the cloud mobile phone end. The cloud mobile phone (Cloudphone) is a mobile phone which applies a cloud computing technology to network terminal service and realizes cloud service through a cloud server, and a first interface is a display and operation interface of a cloud mobile phone end.
It can be understood that in a scenario where a user uses a cloud mobile phone end application, operations such as password input, personal information, file transmission and the like may be involved, the cloud mobile phone end may be used by a plurality of different users, and operating environments corresponding to different users may be different, so that the user may face a situation that input information is stolen or leaked when performing the above operations on an initial keyboard generated on a first interface of the cloud mobile phone end.
Step 202, responding to a first operation of the user on the initial keyboard, and sending a first input instruction to the client.
Optionally, step 202 may further include:
detecting whether the first operation meets a preset condition;
if so, sending the first input instruction to the client in a first mode;
and if not, not generating the first input instruction.
The preset condition may include that the first operation satisfies a password input behavior, and the password input behavior may include a first behavior for characterizing a suspected password input behavior and a second behavior for characterizing a correct password input behavior.
In some scenarios, when the user continuously inputs letters, numbers, special symbols, or a combination of the three in the initial keyboard, it may be detected that the user triggers the first behavior, and the predetermined condition is satisfied. Accordingly, the server may detect that the user enters a partial character of the correct password in the initial keyboard, and the detection determines that the user triggers the second action. For example, if the correct password is "123456789", and if it is detected that the user enters "123" in the initial keyboard, it is determined that the target has entered the first three characters of the correct password, it is determined that the user triggered the second action. It should be noted that, the embodiment is not limited to the number of characters that the user needs to input to trigger the second action.
Wherein, the first mode can be transmission through websocket protocol to further enhance security and privacy.
Therefore, based on the behaviors, the user can skip the subsequent input behaviors to the client through triggering the operation of the preset condition on the basis that the cloud mobile phone end incompletely inputs the password or other important information, so that the safety and privacy of information input can be remarkably improved.
Step 203, according to the first input instruction, the client generates a security keyboard on a second interface.
As can be seen from the description in step 202, after the user performs the first operation satisfying the preset condition, in order to ensure security and privacy, the subsequent operation of inputting information may be transferred to the client for continuing the operation, so that the subsequent operation may be performed on any keyboard of the client having an information input function. For example, a new security keyboard may be generated at the second interface of the client, or a client-installed security keyboard may be invoked.
And step 204, responding to a second operation of the user on the safety keyboard, and generating input information by the client.
Optionally, step 204 may further include the steps of:
detecting whether the second operation comprises a password input completion operation or a password input confirmation operation;
if yes, continuing to generate the input information;
and if not, not generating the input information.
The input completion operation refers to an operation of completing information input by a user. In some embodiments, the non-operation duration of entering the non-operation state after the user inputs the information may be detected, and if the non-operation duration is greater than a preset threshold, for example, the preset threshold may be 5 seconds, 10 seconds, 1 minute, or the like, it indicates that the user has completed the operation of inputting the information with a high probability, and the client confirms that the input information input by the user is generated. In other embodiments, the client may determine that the second operation is an input completion operation when detecting that the user has input the correct password and information, which indicates that the user has correctly and completely input the corresponding password.
In some embodiments, whether the user completes inputting the information can be further identified by detecting the password input confirmation behavior. For example, after the user finishes inputting information, the client may detect the user by clicking a function control for confirmation, completion, login, sending, and the like.
And 205, receiving the input information to complete the input operation at the cloud mobile phone end.
Specifically, the client can transmit the input information to the cloud mobile phone end through the websocket protocol, so that the input information can act on the application of the cloud mobile phone end in a safe transmission environment.
Optionally, the embodiment of the present application may further include the following steps:
generating a first hash value and a first code according to the input information;
generating an encryption code and a corresponding decryption code according to a correct password corresponding to the input information;
if the second code is matched with the decryption code, generating a second hash value, and judging whether the second hash value is consistent with the first hash value;
and if the second hash value is consistent with the first hash value, the cloud mobile phone end decrypts the input information.
Specifically, after the input information is encrypted and stored in the memory, a first hash value may be generated, where the first hash value is used to verify whether the first hash value is consistent with a second hash value generated when the input information is decrypted, so as to determine whether a memory tampering operation exists.
Therefore, according to the embodiment of the application, the password input behavior of the user is detected at the cloud mobile phone terminal, and the security keyboard is generated at the client of the user, so that the user can input information at the security keyboard in the client environment with higher privacy and security, and then the input information is transmitted to the cloud mobile phone terminal through the network protocol, and the privacy and security of the user for inputting and acquiring the information at the cloud mobile phone terminal can be greatly improved.
In order to better implement the security keyboard input method provided by the embodiment of the present invention, on the basis of the security keyboard input method, a security keyboard input device is provided, as shown in fig. 4, where fig. 4 is a schematic structural diagram of an embodiment of the security keyboard input device provided by the embodiment of the present invention, and the security keyboard input device shown includes:
an initial keyboard obtaining module 301, configured to obtain an initial keyboard, where the initial keyboard is generated in a first interface of the cloud mobile phone end;
an input instruction sending module 302, configured to send a first input instruction to the client in response to a first operation of a user on the initial keyboard;
the security keyboard generation module 303 is configured to, according to the first input instruction, generate a security keyboard on a second interface by the client;
an input information generating module 304, configured to, in response to a second operation of the user on the secure keyboard, generate input information by the client;
an input information receiving module 305, configured to receive the input information, so as to complete an input operation at the cloud mobile phone end.
Optionally, the input instruction sending module 302 is further specifically configured to:
detecting whether the first operation meets a preset condition;
if so, sending the first input instruction to the client in a first mode;
and if not, not generating the first input instruction.
Therefore, according to the embodiment of the application, the password input behavior of the user is detected at the cloud mobile phone terminal, and the security keyboard is generated at the client of the user, so that the user can input information at the security keyboard in the client environment with higher privacy and security, and then the input information is transmitted to the cloud mobile phone terminal through the network protocol, and the privacy and security of the user for inputting and acquiring the information at the cloud mobile phone terminal can be greatly improved.
An embodiment of the present invention further provides a security keyboard input device, as shown in fig. 5, which shows a schematic structural diagram of the security keyboard input device according to the embodiment of the present invention, specifically:
the secure keyboard input device may include components such as a processing module 401 of one or more processing cores, a storage module 402 of one or more computer-readable storage media, a power module 403, and an input module 404. Those skilled in the art will appreciate that the configuration of the security keypad input device shown in fig. 5 does not constitute a limitation of the security keypad input device and may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. Wherein:
the processing module 401 is a control center of the security keyboard input device, connects various parts of the entire security keyboard input device by using various interfaces and lines, and executes various functions of the security keyboard input device and processes data by running or executing software programs and/or modules stored in the storage module 402 and calling data stored in the storage module 402. Optionally, the processing module 401 may include one or more processing cores; preferably, the processing module 401 may integrate an application processor and a modem processor, wherein the application processor mainly handles operating systems, user interfaces, application programs, and the like, and the modem processor mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processing module 401.
The storage module 402 may be used to store software programs and modules, and the processing module 401 executes various functional applications and data processing by operating the software programs and modules stored in the storage module 402. The storage module 402 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to use of the security keypad input device, and the like. Further, the memory module 402 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory module 402 may also include a memory controller to provide the processing module 401 access to the memory module 402.
The security keyboard input device further comprises a power module 403 for supplying power to each component, and preferably, the power module 403 may be logically connected to the processing module 401 through a power management system, so as to implement functions of managing charging, discharging, and power consumption management through the power management system. The power module 403 may also include one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and any other components.
The security keyboard input device may also include an input module 404, the input module 404 operable to receive entered numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the security keypad input device may further include a display unit and the like, which will not be described in detail herein. Specifically, in this embodiment, the processing module 401 in the input device of the secure keyboard loads the executable file corresponding to the process of one or more application programs into the storage module 402 according to the following instructions, and the processing module 401 runs the application programs stored in the storage module 402, thereby implementing various functions as follows:
acquiring an initial keyboard, wherein the initial keyboard is generated on a first interface of the cloud mobile phone end;
responding to a first operation of a user on the initial keyboard, and sending a first input instruction to the client;
according to the first input instruction, the client generates a safety keyboard on a second interface;
in response to a second operation of the user on the secure keyboard, the client generates input information;
and receiving the input information to complete the input operation at the cloud mobile phone end.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, embodiments of the present invention provide a storage medium, in which a plurality of instructions are stored, where the instructions can be loaded by a processor to execute steps in any one of the security keyboard input methods provided in the embodiments of the present invention. For example, the instructions may perform the steps of:
acquiring an initial keyboard, wherein the initial keyboard is generated on a first interface of the cloud mobile phone end;
responding to a first operation of a user on the initial keyboard, and sending a first input instruction to the client;
according to the first input instruction, the client generates a safety keyboard on a second interface;
in response to a second operation of the user on the secure keyboard, the client generates input information;
and receiving the input information to complete the input operation at the cloud mobile phone end.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
Wherein the storage medium may include: read Only Memory (ROM), random Access Memory (RAM), magnetic or optical disks, and the like.
Since the instructions stored in the storage medium can execute the steps in any of the security keyboard input methods provided in the embodiments of the present invention, the beneficial effects that can be achieved by any of the security keyboard input methods provided in the embodiments of the present invention can be achieved, which are detailed in the foregoing embodiments and will not be described herein again.
In an embodiment, the electronic device provided in the embodiments of the present application includes a terminal, a server, and the like, which are separately described.
An embodiment of the present application also provides a terminal, as shown in fig. 6, the terminal may include a Radio Frequency (RF) circuit 501, a memory 502 having one or more computer-readable storage media, an input unit 503, a display unit 504, a sensor 505, an audio circuit 506, a Wireless Fidelity (WiFi) module 507, a processor 508 of one or more processing cores, and a power supply 509. Those skilled in the art will appreciate that the terminal structure shown in fig. 6 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the processor 508 is a control center of the terminal, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 502 and calling data stored in the memory 502, thereby integrally monitoring the mobile phone. In one embodiment, processor 508 may include one or more processing cores; preferably, the processor 508 may integrate an application processor, which primarily handles operating systems, user interfaces, application programs, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 508.
WiFi belongs to short-distance wireless transmission technology, and the terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 507, and provides wireless broadband internet access for the user. Although fig. 6 shows the WiFi module 507, it is understood that it does not belong to the essential constitution of the terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The memory 502 may be used to store software programs and modules, and the processor 508 executes various functional applications and data processing by operating the computer programs and modules stored in the memory 502. The memory 502 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal, etc. Further, the memory 502 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 502 may also include a memory controller to provide the processor 508 and the input unit 503 access to the memory 502.
The audio circuit 506 includes a speaker and a microphone may provide an audio interface between the user and the terminal. The audio circuit 506 may transmit the electrical signal converted from the received audio data to a speaker, and convert the electrical signal into a sound signal for output; on the other hand, the microphone converts the collected sound signal into an electric signal, which is received by the audio circuit 506 and converted into audio data, which is then processed by the audio data output processor 508, and then transmitted to, for example, another terminal via the RF circuit 501, or the audio data is output to the memory 502 for further processing. The audio circuit 506 may also include an earbud jack to provide communication of peripheral headphones with the terminal.
The display unit 504 may be used to display information input by or provided to a user and various graphic user interfaces of the terminal, which may be configured of graphics, text, icons, video, and any combination thereof. The display unit 504 may include a display panel, and in one embodiment, the display panel may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch-sensitive surface may overlay the display panel, and when a touch operation is detected on or near the touch-sensitive surface, the touch operation is transmitted to the processor 508 to determine the type of touch event, and then the processor 508 provides a corresponding visual output on the display panel according to the type of touch event. Although in FIG. 6 the touch-sensitive surface and the display panel are two separate components to implement input and output functions, in some embodiments the touch-sensitive surface may be integrated with the display panel to implement input and output functions.
The input unit 503 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, in one particular embodiment, the input unit 503 may include a touch-sensitive surface as well as other input devices. The touch-sensitive surface, also referred to as a touch display screen or a touch pad, may collect touch operations by a user (e.g., operations by a user on or near the touch-sensitive surface using a finger, a stylus, or any other suitable object or attachment) thereon or nearby, and drive the corresponding connection device according to a predetermined program. In one embodiment, the touch sensitive surface may include two portions, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 508, and can receive and execute commands sent by the processor 508. In addition, touch sensitive surfaces may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. The input unit 503 may include other input devices in addition to the touch-sensitive surface. In particular, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The terminal may also include at least one sensor 505, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel according to the brightness of ambient light, and a proximity sensor that may turn off the display panel and/or the backlight when the terminal moves to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor and the like which can be configured at the terminal are not described in detail herein.
The terminal also includes a power supply 509 (e.g., a battery) for powering the various components, which may preferably be logically connected to the processor 508 via a power management system that may be used to manage charging, discharging, and power consumption. The power supply 509 may also include any component such as one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
The RF circuit 501 may be used for receiving and transmitting signals during a message transmission or communication process, and in particular, for receiving downlink information from a base station and then sending the received downlink information to the one or more processors 508 for processing; in addition, data relating to uplink is transmitted to the base station. In general, RF circuit 501 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 501 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communications (GSM), general Packet Radio Service (GPRS), code Division Multiple Access (CDMA), wideband Code Division Multiple Access (WCDMA), long Term Evolution (LTE), email, short Messaging Service (SMS), etc.
Although not shown, the terminal may further include a camera, a bluetooth module, and the like, which will not be described herein. Specifically, in this embodiment, the processor 508 in the terminal loads the executable file corresponding to the process of one or more application programs into the memory 502 according to the following instructions, and the processor 508 runs the application program stored in the memory 502, so as to implement the following functions:
acquiring an initial keyboard, wherein the initial keyboard is generated on a first interface of the cloud mobile phone end;
responding to a first operation of a user on the initial keyboard, and sending a first input instruction to the client;
according to the first input instruction, the client generates a safety keyboard on a second interface;
in response to a second operation of the user on the secure keyboard, the client generates input information;
and receiving the input information to complete the input operation at the cloud mobile phone end.
The above detailed description is provided for the input method, apparatus, device and storage medium of the security keyboard according to the embodiments of the present invention, and the specific examples are applied herein to explain the principle and the implementation of the present invention, and the description of the above embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for those skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A safe keyboard input method is applied to a cloud mobile phone terminal and comprises the following steps:
acquiring an initial keyboard, wherein the initial keyboard is generated on a first interface of the cloud mobile phone end;
responding to a first operation of a user on the initial keyboard, and sending a first input instruction to a client;
according to the first input instruction, the client generates a safety keyboard on a second interface;
in response to a second operation of the user on the secure keyboard, the client generates input information;
and receiving the input information to complete the input operation at the cloud mobile phone end.
2. The secure keyboard input method of claim 1, wherein the sending a first input instruction to a client in response to a first operation by a user on the initial keyboard comprises:
detecting whether the first operation meets a preset condition or not;
if yes, sending the first input instruction to the client in a first mode;
and if not, not generating the first input instruction.
3. The secure keyboard input method of claim 2, wherein the preset condition comprises that the first operation satisfies a password input behavior, and the password input behavior comprises a first behavior for characterizing a suspected password input behavior and a second behavior for characterizing a correct password input behavior.
4. A security keyboard input method according to claim 2, characterized in that said first mode is transmission by the websocket protocol.
5. A security keyboard input method according to claim 1, wherein the client generates input information in response to a second operation of the user on the security keyboard, comprising:
detecting whether the second operation comprises a password input completion operation or a password input confirmation operation;
if yes, continuing to generate the input information;
if not, the input information is not generated.
6. The secure keyboard input method of claim 1, further comprising:
generating a first hash value and a first code according to the input information;
generating an encryption code and a corresponding decryption code according to the correct password corresponding to the input information;
if the second code is matched with the decryption code, generating a second hash value, and judging whether the second hash value is consistent with the first hash value;
and if the second hash value is consistent with the first hash value, the cloud mobile phone end decrypts the input information.
7. A safety keyboard input device is applied to a cloud mobile phone end, and comprises:
the initial keyboard acquisition module is used for acquiring an initial keyboard, and the initial keyboard is generated on a first interface of the cloud mobile phone end;
the input instruction sending module is used for responding to a first operation of a user on the initial keyboard and sending a first input instruction to the client;
the safety keyboard generation module is used for generating a safety keyboard on a second interface by the client according to the first input instruction;
the input information generating module is used for responding to a second operation of the user on the safety keyboard, and the client generates input information;
and the input information receiving module is used for receiving the input information so as to complete the input operation at the cloud mobile phone end.
8. The security keyboard input device of claim 7, wherein the input instruction sending module is further specifically configured to:
detecting whether the first operation meets a preset condition;
if so, sending the first input instruction to the client in a first mode;
and if not, not generating the first input instruction.
9. An apparatus comprising a memory and a processor; the memory stores application programs, and the processor is used for running the application programs in the memory to execute the operation in the safe keyboard input method of any one of claims 1 to 6.
10. A storage medium storing instructions adapted to be loaded by a processor to perform the steps of a method of secure keyboard entry according to any of claims 1 to 6.
CN202211312820.5A 2022-10-25 2022-10-25 Safe keyboard input method, device, equipment and storage medium Pending CN115967723A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211312820.5A CN115967723A (en) 2022-10-25 2022-10-25 Safe keyboard input method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211312820.5A CN115967723A (en) 2022-10-25 2022-10-25 Safe keyboard input method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115967723A true CN115967723A (en) 2023-04-14

Family

ID=87353388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211312820.5A Pending CN115967723A (en) 2022-10-25 2022-10-25 Safe keyboard input method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115967723A (en)

Similar Documents

Publication Publication Date Title
US20210336780A1 (en) Key updating method, apparatus, and system
EP3493056B1 (en) Information displaying method for terminal device, and terminal device
WO2017118437A1 (en) Service processing method, device, and system
CN110417543B (en) Data encryption method, device and storage medium
CN104580167B (en) A kind of methods, devices and systems transmitting data
CN106778175B (en) Interface locking method and device and terminal equipment
CN110198301B (en) Service data acquisition method, device and equipment
CN104424431B (en) A kind of method and device resetting virtual machine user modification logging
CN108881103B (en) Network access method and device
CN111478849B (en) Service access method, device and storage medium
US20210150050A1 (en) Method for preventing information from being stolen, storage device, and mobile terminal
WO2015078274A1 (en) Devices and methods for password storage
WO2016192511A1 (en) Method and apparatus for remotely deleting information
CN107743108B (en) Method and device for identifying medium access control address
CN108270764B (en) Application login method, server and mobile terminal
CN116541865A (en) Password input method, device, equipment and storage medium based on data security
CN105279433B (en) Application program protection method and device
CN111273955A (en) Thermal restoration plug-in optimization method and device, storage medium and electronic equipment
CN107577933B (en) Application login method and device, computer equipment and computer readable storage medium
CN106709330B (en) Method and device for recording file execution behaviors
CN113923005B (en) Method and system for writing data
CN108737341B (en) Service processing method, terminal and server
CN111444539B (en) Authority processing method and device, storage medium and terminal
US9633227B2 (en) Method, apparatus, and system of detecting unauthorized data modification
CN105791253B (en) Method and device for acquiring authentication information of website

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination